New DOL Guidance on Blocking Retirement Plan Cyberattacks

Kirsch CPA Group

Jul 21, 2021

The U.S. Department of Labor (DOL) is becoming alarmed by the growing prevalence and sophistication of cybercrime. In response to this mounting threat, the agency recently released a cybersecurity program best practices guide for employers and companies that provide services to their retirement plans.

Benefits of Prompt Compliance

Attorneys specializing in retirement plan matters advise plan sponsors to heed the new DOL guidelines. Failure to do so could make your company vulnerable if litigation erupts following any kind of cyberbreach of its retirement plans — even if most of the plan’s administration is handled by service providers. ERISA plan fiduciaries generally must take reasonable steps to protect plan assets from cyberattacks.

Even without a legal dark cloud hovering above, employers don’t want to see their employees’ retirement savings wiped out in a breach. Moreover, management could transfer the knowledge gained from implementing the DOL’s recommended cybersecurity protocols to other potential areas of vulnerability, including the company’s financial systems.

Creating Your Cybersecurity Plan

Compliance with the DOL guidance begins with a comprehensive security plan. “A sound cybersecurity program,” the guidance states, “identifies and assesses internal and external risks that may threaten the confidentiality, integrity, or availability of stored nonpublic information.”

The plan needs to feature policies, procedures, guidelines and standards in the following areas:

  • Approval by top management,
  • An annual review of the program,
  • Education for relevant parties about the program,
  • Documentation of the framework(s) used to assess the security of your systems, and
  • Periodic audits by an outside expert to ensure that your plan is being followed.

The DOL expects your external security audit to include, among other things, audit reports, files, penetration test reports and supporting documents. Auditors also should document corrections of any cybersecurity weaknesses identified during the audit.

In addition to periodic external audits, the DOL recommends a fresh annual cybersecurity risk assessment. That’s because cybercriminals are constantly developing new tactics to break through your defenses.

“Employees are often an organization’s weakest link for cybersecurity,” according to the guidance. So, employers need a comprehensive cybersecurity awareness program that sets expectations for employees and teaches them to “recognize attack vectors, help prevent cyber-related incidents, and respond to a potential threat.”

Controlling Data Access

To manage the threat of employees inadvertently opening the door to cybercriminals, the DOL guidance calls for strong access control procedures. Examples include:

  • Customizing who’s granted access to systems according to the role of individuals involved, such as general users, plan administrators, third party administrators and IT personnel,
  • Using multifactor identification whenever possible, especially to access the internal networks from an external network,
  • Reviewing access privileges at least every three months and, when necessary, disabling access according to your access policies,
  • Monitoring the activity of authorized users and detecting unauthorized access or inappropriate actions,
  • Creating a process to ensure that any sensitive information about a participant or beneficiary in the service provider’s records matches the information that the plan maintains about the participant, and
  • Confirming the identity of the authorized recipient of any funds that are dispersed from the plan.

The DOL guidance addresses particular areas of risk associated with data stored on the cloud. The guidance points out: “In the cloud, data is stored with a third-party provider.” So, transparency and control over the data may be limited. Consider the following steps to help maintain scrutiny over cloud storage practices by third-party providers:

  • Require a risk assessment of the provider,
  • Establish minimum cybersecurity practices for the provider, and
  • Ensure that guidelines and contract provisions are as robust as those you hold your retirement plan services providers to.

Post-Incident Protocols

The DOL guidance also recommends putting together a business “resiliency” plan. It’s important to have an incident response plan in place to help IT staff detect, respond to and recover from security incidents.

Post-incident best practices also include recommended actions, such as notifying law enforcement and your insurance carrier, and providing information about the breach to affected participants “to prevent or reduce injury.”

Fortify Your Defenses

Adhering to the DOL guidance can dramatically decrease the risk of a cyberattack on your company’s retirement plan. Plus, if your retirement plan does get hacked and you can prove compliance with the DOL guidance, you’ll probably have a much easier time dealing with your plan’s service providers and insurance carrier to ensure that any harm to participants is rectified — but not at your expense.

For more information, contact your legal and financial advisors. These professionals can help you update your company’s existing retirement plan cybersecurity protocols to comply with the rigorous new DOL guidelines.

 

We can help you tackle business challenges like these – schedule an appointment today.

 

© Copyright 2021. All rights reserved.

About The Author

Kirsch CPA Group is a full service CPA and business advisory firm helping businesses and organizations with accounting,…

Read More


Sign Up for Email Updates


Accounting & Financial News

7 Tax Breaks for Business Buildings

Businesses are returning to their regular work premises in droves. About 65% of U.S. businesses expect to implement return-to-office policies…

How To Handle the Changes to R&E Tax Treatment

The Tax Cuts and Jobs Act (TCJA) included a significant — but delayed — change to the tax treatment of…

Preserve Your Business Legacy with Proactive Succession Planning

Running a business requires a lot of hard work. As a business owner, you may be so focused on managing…