SlideShare a Scribd company logo
1 of 12
Download to read offline
Data Security in
Financial Services:
WHAT YOU NEED TO KNOW
Lock Down That Data
Today, some financial professionals store or share terabytes
of electronic information including quarterly reports, billing
statements or even sensitive personal data of your clients. With
that in mind, here’s why you should rethink your data security.
You have a responsibility to your clients.
Your clients trust you with lending, investing and managing their
wealth, so they expect a reasonable effort to prevent unauthorized
disclosure or access to their information.
You must comply with government regulations.
Various federal, state and industry guidelines regulate the exchange of
sensitive information.
You should protect your reputation.
A data security breach at your office or a branch will almost certainly
result in the loss of clients and possibly generate negative publicity.
Common Challenges
Airtight data security is hard to achieve. For small and midsize
financial practices, the task can be overwhelming. Also,
technological changes mean that security measures can
become obsolete in a matter of months.
Financial professionals can address these challenges with a
step-by-step plan.
Security: Step by Step
Get Ready
Data security is only achievable if you’re ready to lead the charge and
make some changes.
Assess Risk
Security vulnerability occurs via your physical work environment,
network security and mobile communication. How do you guard each
area? Take the following actions.
++ Make workstations inaccessible to the public.
++ Lock away your routers and servers.
++ If possible, incorporate industry standard protocols such
as magnetic doors and keycard access.
++ Maintain protection against natural disasters.
++ Archive data offsite.
++ Replace aging physical equipment.
Physical Vulnerability
++ Configure your firewalls correctly.
++ Use strong, proven antivirus and antimalware software.
++ Keep your software current.
++ Password protect your network or make it invisible.
++ Don’t transmit private data on public networks.
Unsecured Networks
++ Make sure your device doesn’t scan for and hook
up to open Wi-Fi networks.
++ Transfer files via secure software, such as file-sharing apps
that encrypt data, rather than email.
++ Enable security features such as remote wipe and automatic
file deletion if you lose your phone.
++ Don’t lose your phone!
Mobile Device Weaknesses
Research Regulations
Depending on the kind of data you’re storing and transferring,
you could be subject to more regulations than you know.
These include:
++ The U.S. Securities and Exchange Commission (SEC)
++ The Consumer Financial Protection Bureau’s (CFPB) data
security guidelines
++ Various state data security laws
++ Records disposal laws and protocols
++ Industry standards such as Financial Industry Regulatory
Authority (FINRA) rules
Set Policies and Procedures
Now that you understand what you need to do, decide how
to do it. Develop a data security program, train any staff
members and enforce protocols reasonably. For instance, if
you cannot secure data onsite, look for offsite storage services
that offer you features like advanced encryption methods.
Stay Ahead of the Game
Serve clients to the best of your ability by staying current
with your security. It’s not possible to eliminate risk, but
you can decrease it significantly by becoming aware of
your security issues, learning everything you can and being
proactive in your responses.
www.ShareFile.com
© 2015 Citrix Systems, Inc. All rights reserved. Citrix and ShareFile are trademarks of Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be
registered in the U.S. Patent and Trademark Office and in other countries. All other trademarks are the property of their respective owners.
Want to find out how you can
securely send documents and data?
Visit www.ShareFile.com to learn more.

More Related Content

Viewers also liked

Viewers also liked (15)

Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...
Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...
Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...
 
SYN 321: Securing the Published Browser
SYN 321: Securing the Published BrowserSYN 321: Securing the Published Browser
SYN 321: Securing the Published Browser
 
SYN002: General Session
SYN002: General SessionSYN002: General Session
SYN002: General Session
 
SYN 305: Architecting Citrix on Microsoft Azure
SYN 305: Architecting Citrix on Microsoft AzureSYN 305: Architecting Citrix on Microsoft Azure
SYN 305: Architecting Citrix on Microsoft Azure
 
SYN 220: XenApp and XenDesktop Security Best Practices
SYN 220: XenApp and XenDesktop Security Best Practices SYN 220: XenApp and XenDesktop Security Best Practices
SYN 220: XenApp and XenDesktop Security Best Practices
 
SYN 103: Learn What’s New with XenServer
SYN 103: Learn What’s New with XenServerSYN 103: Learn What’s New with XenServer
SYN 103: Learn What’s New with XenServer
 
12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning
 
Perché la DISTRIBUZIONE DELLE APPLICAZIONI conta nell'economia digitale
Perché la DISTRIBUZIONE DELLE APPLICAZIONI conta nell'economia digitalePerché la DISTRIBUZIONE DELLE APPLICAZIONI conta nell'economia digitale
Perché la DISTRIBUZIONE DELLE APPLICAZIONI conta nell'economia digitale
 
Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?
Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?
Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?
 
Pourquoi la MISE A DISPOSITION D’APPLICATIONS joue un rôle important dans l’é...
Pourquoi la MISE A DISPOSITION D’APPLICATIONS joue un rôle important dans l’é...Pourquoi la MISE A DISPOSITION D’APPLICATIONS joue un rôle important dans l’é...
Pourquoi la MISE A DISPOSITION D’APPLICATIONS joue un rôle important dans l’é...
 
How to Build an All-Star Virtualization Team
How to Build an All-Star Virtualization TeamHow to Build an All-Star Virtualization Team
How to Build an All-Star Virtualization Team
 
Waarom APPLICATION DELIVERY belangrijk is in de digitale economie
Waarom APPLICATION DELIVERY belangrijk is in de digitale economieWaarom APPLICATION DELIVERY belangrijk is in de digitale economie
Waarom APPLICATION DELIVERY belangrijk is in de digitale economie
 
15 Tips for Citrix Synergy First Timers
15 Tips for Citrix Synergy First Timers15 Tips for Citrix Synergy First Timers
15 Tips for Citrix Synergy First Timers
 
Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
Unified Endpoint Management: Security & Productivity for the Mobile EnterpriseUnified Endpoint Management: Security & Productivity for the Mobile Enterprise
Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
 
Desktop Virtualization Deployment Insights eBook
Desktop Virtualization Deployment Insights eBookDesktop Virtualization Deployment Insights eBook
Desktop Virtualization Deployment Insights eBook
 

More from Citrix

More from Citrix (20)

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital Workplace
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
 
XenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideXenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment Guide
 
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformDeploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
 
Workforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityWorkforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & Productivity
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch Notes
 
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
 
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesSynergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
 
Who Are Citrix Customers?
Who Are Citrix Customers?Who Are Citrix Customers?
Who Are Citrix Customers?
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital Workspace
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration
 
Citrix Paddington
Citrix PaddingtonCitrix Paddington
Citrix Paddington
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 

Data Security in Financial Services: What You Need to Know

  • 1. Data Security in Financial Services: WHAT YOU NEED TO KNOW
  • 2. Lock Down That Data Today, some financial professionals store or share terabytes of electronic information including quarterly reports, billing statements or even sensitive personal data of your clients. With that in mind, here’s why you should rethink your data security.
  • 3. You have a responsibility to your clients. Your clients trust you with lending, investing and managing their wealth, so they expect a reasonable effort to prevent unauthorized disclosure or access to their information. You must comply with government regulations. Various federal, state and industry guidelines regulate the exchange of sensitive information. You should protect your reputation. A data security breach at your office or a branch will almost certainly result in the loss of clients and possibly generate negative publicity.
  • 4. Common Challenges Airtight data security is hard to achieve. For small and midsize financial practices, the task can be overwhelming. Also, technological changes mean that security measures can become obsolete in a matter of months. Financial professionals can address these challenges with a step-by-step plan.
  • 5. Security: Step by Step Get Ready Data security is only achievable if you’re ready to lead the charge and make some changes. Assess Risk Security vulnerability occurs via your physical work environment, network security and mobile communication. How do you guard each area? Take the following actions.
  • 6. ++ Make workstations inaccessible to the public. ++ Lock away your routers and servers. ++ If possible, incorporate industry standard protocols such as magnetic doors and keycard access. ++ Maintain protection against natural disasters. ++ Archive data offsite. ++ Replace aging physical equipment. Physical Vulnerability
  • 7. ++ Configure your firewalls correctly. ++ Use strong, proven antivirus and antimalware software. ++ Keep your software current. ++ Password protect your network or make it invisible. ++ Don’t transmit private data on public networks. Unsecured Networks
  • 8. ++ Make sure your device doesn’t scan for and hook up to open Wi-Fi networks. ++ Transfer files via secure software, such as file-sharing apps that encrypt data, rather than email. ++ Enable security features such as remote wipe and automatic file deletion if you lose your phone. ++ Don’t lose your phone! Mobile Device Weaknesses
  • 9. Research Regulations Depending on the kind of data you’re storing and transferring, you could be subject to more regulations than you know. These include: ++ The U.S. Securities and Exchange Commission (SEC) ++ The Consumer Financial Protection Bureau’s (CFPB) data security guidelines ++ Various state data security laws ++ Records disposal laws and protocols ++ Industry standards such as Financial Industry Regulatory Authority (FINRA) rules
  • 10. Set Policies and Procedures Now that you understand what you need to do, decide how to do it. Develop a data security program, train any staff members and enforce protocols reasonably. For instance, if you cannot secure data onsite, look for offsite storage services that offer you features like advanced encryption methods.
  • 11. Stay Ahead of the Game Serve clients to the best of your ability by staying current with your security. It’s not possible to eliminate risk, but you can decrease it significantly by becoming aware of your security issues, learning everything you can and being proactive in your responses.
  • 12. www.ShareFile.com © 2015 Citrix Systems, Inc. All rights reserved. Citrix and ShareFile are trademarks of Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered in the U.S. Patent and Trademark Office and in other countries. All other trademarks are the property of their respective owners. Want to find out how you can securely send documents and data? Visit www.ShareFile.com to learn more.