Under Attack: When Bad Hacks Happen To Good Advisors – InsuranceNewsNet

InsuranceNewsNet — Your Industry. One Source.ℱ

Sign in
  • Subscribe
  • About
  • Advertise
  • Contact
Home Now reading INN Weekly Newsletter INN Exclusives
Topics
    • Life Insurance News
    • Annuity News
    • Health/Employee Benefits
    • Property and Casualty
    • Advisor News
    • Washington Wire
    • Regulation News
    • Sponsored Articles
    • Monthly Focus
  • INN Exclusives
  • NewsWires
  • Magazine
  • Webinars
  • Free Newsletters
Sign in or register to be an INNsider.
  • Exclusives
  • NewsWires
  • Magazine
  • Webinars
  • Free Newsletters
  • Insider Pro
  • About
  • Advertise
  • Editorial Staff
  • Contact
  • Newsletters

Get Social

  • Facebook
  • Twitter
  • LinkedIn
INN Daily Newsletter INN Exclusives
INN Weekly Newsletter INN Exclusives RSS Get our newsletter
Order Prints
January 17, 2017 INN Weekly Newsletter INN Exclusives No comments
Share
Share
Tweet
Email

Under Attack: When Bad Hacks Happen To Good Advisors

InsuranceNewsNet

By Chris Moschovitis

It started with a friend’s request for help.

“Advice please: One of my email accounts has been hacked five times in the last week. I keep changing the password using the complicated passwords that are computer generated and now it seems like I'm getting hacked even more. What can I do to make this stop?”

Related stories

  • Five Minutes With A Medicare Expert: Trends To Watch For In 2022
  • Prudential Scores Winning 2Q With FlexGuard

I often wondered how a doctor feels when delivering a bad diagnosis to a friend or family member. This, of course, is not a life-and-death case, nor am I a doctor. However, when your professional life depends on information technology, getting a bad diagnosis can be injurious to your financial well-being. My friend is a successful insurance advisor whose business requires a great many email transmissions.

I replied online that his computer most likely is compromised by a type of malware (nasty little critters of software) that can record what one types, what’s on one’s computer screen, even what is transmitted. As a result, remedial options were limited.

Assuming that the advisor had a good, uninfected backup, he would have to “burn” his computer by wiping it completely and re-installing the operating system and application from original media.  While he did all this, he would need to monitor all of his accounts (email accounts, social media accounts, financial institutions, on-line services, etc.) for any unauthorized activity.  Then, he would need to find a “clean” computer - ideally outside his compromised network environment - to change all his passwords again, and immediately institute two-factor authentication across the board.

And Then, More Comments

The comments from my friend and his colleagues and associates started streaming in:

“So does that mean my phone and iPad are compromised? And does that mean I can't just wipe the hard drive clean and reinstall a backup from time machine because that likely means I'll reinstall the malware, right? What's the best way to "burn" my computer?”

“This is horrifying. just the idea...” typed another.  “Isn't there a way to remove that type of malware from the computer?”

Yes, there is, but it will not be worth the cost. Trying to remove this type of malware requires hours of uninterrupted and expensive “fun.” Moreover, never underestimate hackers. Your “going in” assumption should be that they are brilliant, persistent, and cunning. They need to succeed only once.  You need to defend thousands of times and multiple entry points.

Bottom line: Surgical removal of malware should be considered very carefully, done by experienced cybersecurity people, and it can never be 100-percent guaranteed. One typically faces this type of solution when backup is inadequate.

What is an adequate backup? Like most solutions, there is no such thing as “one size fits all.” It depends on the data, the sensitivity of the information, its life expectancy (yes, data has a life), usage, etc. Is it encrypted to begin with? Should it be? And so on.

You hear people talking about “disk-to-disk-to-cloud” solutions, “time machine” and half a dozen different vendors and products. They all have pluses and minuses. You should have a conversation with both your information technology and your cybersecurity professionals (they are not, and should not be, the same person), and arrive at a strategy and a solution that lets you sleep at night. Always remember:  You’re the only one who can accept risk! No product or consultant can do this for you.

The comments kept streaming in


“I've got a malware program that sweeps my computer numerous times a day for malware
”

“I just installed a second one, for good measure!”

Preventing the ‘Flu’

The majority of antivirus and antimalware programs available are what is called “signature based.”  What this means is that they work about as good as your flu shot.

Flu shot effectiveness varies year by year, strain by strain. Why?  Because a flu vaccine is made by taking last year’s viruses and, after making them inert, creating a vaccine whose job is to tell your body to attack any virus that looks like the vaccine. If you’re lucky, this year’s vaccine “looks like” last year’s and the inoculation works!  If not, then you spend a few weeks sneezing and wheezing in misery.

It’s the same story with antivirus programs for computers. There are, of course, more sophisticated answers, programs that look for behaviors, for example, or those that use artificial intelligence algorithms to guess whether a piece of software is good or bad. Are they right for your environment? Perhaps. It all depends on your risk appetite, type of data and budget.

What’s the bottom line here? Be vigilant. Have reliable backups. Use strong passwords.  Encrypt your stuff and your internet sessions (use websites whose url addresses begin with https whenever possible). Use two-factor authentication. Keep your computers, phones, tablets and other connected gadgets up to date.

Chris Moschovitis is co-author of History of the Internet: 1843 to the Present as well as a contributor to the Encyclopedia of Computers and Computer History and the Encyclopedia of New Media. He is working on his latest book “How I Stopped Worrying and Learned to Love the Hackers.” Chris can be contacted at [email protected].

© Entire contents copyright 2017 by InsuranceNewsNet.com Inc. All rights reserved. No part of this article may be reprinted without the expressed written consent from InsuranceNewsNet.com.

Older

Gathering Firewood: 401(k) Advice In A Post-Fiduciary World

Newer

Higher Interest Rates Are Welcome News To The Industry

Advisor News

  • How to rekindle your fizzling 2023 financial resolutions
  • Establishing trust with LGBTQIA+ clients
  • Wall Street rises as Fed rate move nears, earnings ramp up
  • Retiree medical costs are soaring
  • For some, nothing to fear from taking RMDs, professor says
More Advisor News

Annuity News

  • Investors scrambling to lock in rates propel annuity sales to record highs
  • North American and Annexus launch new fixed index annuity
  • Producers stew as insurers slow to process life and annuity applications
  • Substitute teacher wins massive lottery drawing in North Carolina. ‘Too good to be true’
  • Brad Rhodes: An annuity product many have never heard of
More Annuity News

Health/Employee Benefits News

  • 25 people charged in fake nursing diploma operation
  • Charron: Idaho will spend $78M more if Medicaid expansion ends
  • April 1 change could remove estimated 375,000 from Medicaid in North Carolina
  • Retirement plans take center stage in the war for hiring talent
  • Many New Jerseyans could lose Medicaid coverage soon
More Health/Employee Benefits News

Life Insurance News

  • Alex Murdaugh's murder trial begins with cellphones, bullets and gunshot residue
  • 1st officer: Alex Murdaugh didn't cry over dead wife and son
  • Cetera to acquire Securian’s retail wealth business
  • What does Curtis 'Cousin Eddie' Smith know in Murdaugh case?
  • Alex Murdaugh's murder trial starts with cellphones, bullets
Sponsor
More Life Insurance News
The time is 01:41:24pm test

- Presented By -

Top Read Stories

  • Will ChatGPT, artificial intelligence replace financial professionals any time soon?
  • Producers stew as insurers slow to process life and annuity applications
  • LETTER: FEMA flood insurance is all but worthless
  • North Carolina businessman pleads guilty in multi-million tax fraud case
  • Just what improvements qualify for Florida’s $10,000 home-hardening grant?
More Top Read Stories >

FEATURED OFFERS

Grow life insurance sales in 2023 with middle-market clients

Tap a new source for sales and referrals with Allianz Life Insurance Company of North America.

Don't Miss ICMG 2023

When the success of your business depends on making the right connections, ICMG is the place to be.

How to Write For InsuranceNewsNet

Find out how you can submit content for publishing on our website.
View Guidelines

Topics

  • Life Insurance News
  • Annuity News
  • Health/Employee Benefits
  • Property and Casualty
  • Advisor News
  • Washington Wire
  • Regulation News
  • Sponsored Articles
  • Monthly Focus

Top Sections

  • Life Insurance News
  • Annuity News
  • Health/Employee Benefits News
  • Property and Casualty News
  • AdvisorNews
  • Washington Wire
  • Insurance Webinars

Our Company

  • About
  • Editorial Staff
  • Magazine
  • Write for INN
  • Advertise
  • Contact

Sign up for our FREE e-Newsletter!

Get breaking news, exclusive stories, and money- making insights straight into your inbox.

select Newsletter Options
Facebook Linkedin Twitter
© 2023 InsuranceNewsNet.com, Inc. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • AdvisorNews

Sign in with your Insider Pro Account

Not registered? Become an Insider Pro.