How advisers can protect clients' data from fraud

With a versatile and secure digital signature, advisers can strengthen their fraud mitigation efforts.
MAR 16, 2017
By  Pem Guerry

Financial advisers work with their clients on a large volume of high-value transactions, which generally contain sensitive information, including Social Security numbers, account numbers, personal information and more. As wealth management services have moved to digital platforms, advisers are faced with the added responsibility of protecting their clients' data in an increasingly threatening environment. Clients trust their advisers to not only give them prudent financial advice but to also protect the sensitive data they disclose to them — that's why it's distressing that at least 88% of broker-dealers and 74% of advisers report they have been targeted in cyberattacks, according to the Securities and Exchange Commission. In an effort to better safeguard clients' data and prevent fraud, many advisers have turned to cloud-based digital signatures — a secure, convenient technology that gives both clients and advisers peace of mind that their data is protected. (More: 8 ways to protect your advisory firm from cyberattacks) To effectively defend against fraud and meet industry regulations, the right digital signature for advisers should include the following components: 1. Identity authentication To protect the integrity of a sensitive document, you must be able to verify the identity of the signer. According to the SEC, 25% of cybersecurity incidents in wealth management that led to losses were a result of employees not following stated identity authentication procedures. Different identity authentication methods are available, and many firms require signers to utilize two or more authentication methods before accessing private documents, a process known as multi-factor authentication. Some of the most common identity authentication methods include: • Email authentication: The signer receives an email with a link to access the document, proving his identity by having access to the email account. • Knowledge-based authentication: Before accessing the document, the signer is given multiple questions about information found in 30 years of public records, including credit reports, town hall records and more. The signer must correctly answer a certain number of questions within a designated time frame in order to gain access to the document. • Short message service authentication: SMS authentication requires the signer to supply a one-time passcode sent to his mobile phone before he can open the document. 2. Tamper evidence and tamper proofing Tamper evidence detects any unauthorized change to any part of the document and gives proof that tampering has occurred. Some e-signature technologies provide this once the document is final, but a true digital signature should apply a tamper-evident seal with each and every signature, making every version of the document tamper evident throughout the signing process. (More: Watch for this new cybersecurity scam, IRS warns) Additionally, select digital signature technologies can also apply a tamper-proof seal, which turns off all future editing capabilities within the document. This gives you peace of mind that the final document cannot be altered in any way after execution. 3. Legal evidence If your clients' e-signatures are ever challenged in court, you want to have evidence to support your claim that they are valid and legally binding. With digital signatures, the evidence of the signature is permanently embedded into the signed document—meaning you own the evidence and are not dependent on your relationship with the vendor to prove the validity of a document, even years after the transaction has taken place. The most legally defensible e-signature products provide a comprehensive audit trail that captures information from the entire signing process, including the date and time a document was submitted for signature, the signer's consent, the IP address of the signer and each step of the entire signing process. With a versatile and secure digital signature, advisers can strengthen their fraud mitigation efforts and take advantage of the technology in ways that best suit their clients' needs. A standalone, cloud-based digital signature platform can be activated and used immediately. Or for a more automated process, a digital signature can be integrated into existing platforms to create ready-to-sign documents, allowing you to limit manual preparation, incorporate your own branding, take advantage of document workflow features and more. (More: Adviser's data breach offers cybersecurity lesson) Pem Guerry is executive vice president of SIGNiX.

Latest News

The 2025 InvestmentNews Awards Excellence Awardees revealed
The 2025 InvestmentNews Awards Excellence Awardees revealed

From outstanding individuals to innovative organizations, find out who made the final shortlist for top honors at the IN awards, now in its second year.

Top RIA Cresset warns of 'inevitable' recession amid tariff uncertainty
Top RIA Cresset warns of 'inevitable' recession amid tariff uncertainty

Cresset's Susie Cranston is expecting an economic recession, but says her $65 billion RIA sees "great opportunity" to keep investing in a down market.

Edward Jones joins the crowd to sell more alternative investments
Edward Jones joins the crowd to sell more alternative investments

“There’s a big pull to alternative investments right now because of volatility of the stock market,” Kevin Gannon, CEO of Robert A. Stanger & Co., said.

Record RIA M&A activity marks strong start to 2025
Record RIA M&A activity marks strong start to 2025

Sellers shift focus: It's not about succession anymore.

IB+ Data Hub offers strategic edge for U.S. wealth advisors and RIAs advising business clients
IB+ Data Hub offers strategic edge for U.S. wealth advisors and RIAs advising business clients

Platform being adopted by independent-minded advisors who see insurance as a core pillar of their business.

SPONSORED Compliance in real time: Technology's expanding role in RIA oversight

RIAs face rising regulatory pressure in 2025. Forward-looking firms are responding with embedded technology, not more paperwork.

SPONSORED Advisory firms confront crossroads amid historic wealth transfer

As inheritances are set to reshape client portfolios and next-gen heirs demand digital-first experiences, firms are retooling their wealth tech stacks and succession models in real time.