Money Centered Blog — Center for Financial Planning, Inc.

A Privately Held Wealth Management Firm for Generations Form CRS Newsletter Signup

Jim Brown

FireEye, SolarWinds, and The Center

James Brown Contributed by: James Brown

Print Friendly and PDF
Center for Financial Planning, Inc. Retirement Planning

The Center Armor

As the Senior I.T. Manager at The Center, I would like to let our clients know that Cybersecurity and protecting our client’s information is of the highest priority in our technology department. Our security structure encompasses a multi-vendor firewall protected network and off-premise connections are made via secure multi-factor authentication across a virtual private network. The desktop and laptops used at The Center are protected with multiple real-time scanners for viruses, malware and unauthorized applications.

SolarWinds

The SolarWinds attack was a software supply chain attack that could allow malware to be loaded and provide a remote threat agent with access to network data. The breach at FireEye did result in the theft of Red team tools that could cause a problem in the future. The SolarWinds attack compromised government agencies, providers as well as private sector organizations. Though providers and companies began quarantining and patching their systems in the days after the discovery, we are bound to learn more about the effect and depth of the attack.

Attacks such as these often lay dormant but we are confident that our firm data and systems have not been impacted by this attack. Along with our vendors 24 hours a day, 365 days a year monitoring, we perform endpoint analysis to monitor our Internet traffic to look for any anomalies that could be a sign of an exploit.

Defense against the Known and Unknown

Vigilance is the only defense against cyber threats. We will continue to monitor our network and endpoints but we also recommend that our clients stay vigilant and take precautions to protect themselves and their data.

  • Monitor your social media and financial accounts for unauthorized changes.

  • Use complex passwords, PINs and answers to security questions.

  • Enable two-factor authentication on all financial accounts.

  • Do not share personal identifying information on social media, email or a Web site.

  • If you receive a link in an email about your online account information, do not click on it. A better practice is to go the normal login page that you use for that institution and login with your two-factor authentication as you normally do.

James Brown is a Senior IT Manager, at Center for Financial Planning, Inc.® With more than 30 years of technology experience, he manages The Center’s technology resources.

Share

Webinar in Review Blog: Staying Safe with Best Practices

Contributed by: James Brown James Brown

In today’s technology environment, information is just a click away. Sadly, bad guys looking for your information are just a click away also. Good security practices can protect you from becoming prey while you are on the Web.

The Center for Financial Planning, Inc.® offers some best practices on how to protect your accounts and your information.

Basic Security Hygiene: (Minute 1:15)

  • Prevention

  • Updates

  • Firewalls

  • Safe Browsing

Mobile\Wireless Security: (Minute 6:50)

  • Limit your transactions

  • Make sure the network is the right network

  • ·Turn off what you are not using

Passwords: (Minute 11:10)

  • Bad Practices

  • Good Practices

Final Solution: (Minute 25:00)

  • Your Backup Plan

  • Backup best Practices

James Brown is an IT Manager at Center for Financial Planning, Inc.®

Share

Webinar in Review: Protect Your Data

Contributed by: James Brown James Brown

It is not just Personal Information Identifiers such as a social security number that the bad guys are after. Personal information like your email address, mailing address and preferred store is a sample of some of the information that can be used for identity theft. More devices are connecting to the Internet; more companies are experiencing data breaches; more cyber-attacks are becoming increasingly sophisticated and we all have a larger cyber footprint. The Center for Financial Planning, Inc. and Raymond James protects the information we have about you and offer some best practices on how to protect your data.

Some of the ways the Center for Financial Planning, Inc. protects:

  • Encrypted drives

  • Secure access

  • Encrypted messaging

Some of the ways Raymond James Financial protects:

  • 24/7 Real-time Monitoring

  • Dedicated Analysts employing 74 security solutions to provide protective services

  • Enhanced authentication and encryption for Raymond James Financial services transactions

Take a holistic approach. Make sure that your computer is receiving the latest updates from manufacturers. Many of the software and hardware vendors will release fixes to security holes that are found in the products as soon as they are discovered. Also, use a personal firewall to prevent unwanted traffic from entering or leaving your computer. Backup your data because sometimes, things just go wrong.

Consider two-factor authentication. Many web sites offer two-factor authentication. It usually takes the form of entering a password and a one-time code that is sent to your phone. It is a little extra work to log in to the site but adds a significant layer of protection.

Use strong passwords and change them often. Hackers are smart and they use tools that can easily break through an account that uses a word that is in the Dictionary. Consider using a phrase rather than a word and substitute some of the letters for characters (such as @ for the letter a). Never use the same password across sites. If you use a lot of different web sites, consider using a password manager.

James Brown is an IT Manager at Center for Financial Planning, Inc.®


The information has been obtained from sources considered to be reliable, but we do not guarantee that the foregoing material is accurate or complete.