How Security Savvy Is Your Firm?

By Jim Boomer, CEO, Boomer Consulting, Inc. – November 4, 2016
How Security Savvy Is Your Firm?

Security continues to be a top priority for firms today. Clients trust CPAs with some of their most sensitive data, and it’s our responsibility to do everything possible to protect it.

While most wish there was a magic bullet that would guarantee 100 percent security and keep the bad guys out, the reality of today’s environment makes that notion unrealistic. The fact remains that even if we do everything possible to try to eliminate security risk we are only as strong as the savviness of our people.

Security Starts on the Front Lines

Whether it’s securing a perimeter in a war zone or an accounting firm, the strength of defense is only as robust as the front lines. In your firm, the front line is your people who are handling sensitive client data on a daily basis. An informed and diligent workforce is your best protection against an attack.

Have you invested the proper amount of training to make sure they are prepared for that responsibility? Are they skeptical of suspicious-looking links in emails? Do they report potential security issues as soon as they occur? Do they avoid over sharing on public sites and social media? If not, your firm needs to invest in security awareness training for your entire team. But where do you start?

Where to Start

The first step is determining where you are today. To do so, you probably need to bring in an outside party to perform a security assessment that includes penetration testing, social engineering and a complete review of your security infrastructure, as well as your team’s knowledge.

Many of the firms we work with have had an assessment done in the last few years and the results have identified vulnerabilities that were previously blind spots. While some were the result of inadequate technology, the majority were caused by the human factor.

Training the Front Lines

The only way to mitigate against the risks of uninformed and careless individuals is to provide them with ongoing security awareness training. Although programs may vary, here are some of the key characteristics you should keep in mind:

  • Include everyone. Security awareness training applies to everyone in the firm. Leadership should not be excluded. In fact, top level executives are some of the most vulnerable individuals. Criminals have become more sophisticated and regularly target those who have access to the most sensitive and valuable information.
  • Link it to their personal lives. Most, if not all, of the best practices apply to your employee’s behavior in both their professional and personal lives. The more you can show how it impacts them individually through personal examples, the better it will stick.
  • Protect people from themselves. The more IT can do at the desktop level to not allow people to place themselves or the firm at risk, the better. Make it so people can’t do the things that get us in trouble.
  • Make it an ongoing process. Security awareness training is not a one-time event; it’s an ongoing process. Make sure you are continually testing, training and reinforcing best practices.
  • Hold people accountable. Holding people accountable is the best way to reinforce desired behaviors, and get individuals back on track if they forget or stray off course.

Risk Based Approach

Gartner lists Adaptive Security Architecture in its Top 10 Strategic Technology Trends for 2016 and states, “Relying on perimeter defense and rule-based security is inadequate. IT leaders must focus on detecting and responding to threats, as well as more traditional blocking and other measures to prevent attacks.” This indicates we need to think differently about security than we have in the past. Traditionally, organizations have spent the majority of their security budget on eliminating risk. In today’s environment, you must balance your resources between proactive prevention and reactive response. In other words, we must view security from a risk management perspective rather than risk elimination.

Conclusion

If you are currently relying on technology alone to prevent cyberattacks, you are likely exposing your firm and clients to unnecessary risk. Make sure you address the weakest link in most organizations — the people. Educating them on the best practices and proper behaviors is the best way to protect yourself against the bad guys. At the same time, invest appropriate resources to prepare your firm to respond to a security event. Start the journey today to make your firm more security savvy.


Jim Boomer

Jim Boomer is the CEO at Boomer Consulting, Inc. He is also the director of the Boomer Technology Circles, The Producer Circle, The CIO Advantage and an expert on managing technology within an accounting firm. He also serves as a strategic planning and technology consultant and firm adviser to CPA firms across the country.

Reprinted with permission of Boomer Consulting, Inc.