Statistics show that family offices are growing targets for carefully crafted cyberattacks.
High Contrast
Statistics show that family offices are growing targets for carefully crafted cyberattacks.
Threat actors use social engineering tactics to take advantage of known vulnerabilities.
Protective measures include safeguarding sensitive data by practicing good cyber hygiene.
In today’s rapidly evolving cyberthreat landscape, many ultrahigh net-worth individuals and families are prime targets for carefully crafted cyberattacks.
Family offices, including virtual and single-family offices, can serve as unknowing gateways to sensitive data and personal information of family members due to their extensive financial dealings and relatively low maturity in cyber preparedness. In addition, family offices have a human element in their operational risk controls that can be leveraged by criminals. These vulnerabilities make them attractive targets to threat actors, who may not even need sophisticated hacking skills to compromise a family’s security.
Family offices typically work to keep a low profile, placing an understandably high value on privacy and discretion; however, this doesn’t make them immune to cybercrime. Consider these statistics released by the 2021 RBC/Campden North America Family Office Report:
RSM’s 2022 US Middle Market Business Index Cybersecurity Special Report, which leveraged data from over 400 senior executives at middle market companies, showed 45 per cent of respondents had outside parties attempt to manipulate employees by pretending to be trusted third parties or company executives. Twenty-seven per cent of these companies ultimately suffered cybersecurity attacks.
Threat actors can come from inside or outside the family office and use social engineering tactics to take advantage of unsuspecting targets. To aid in their manipulation, threat actors may harvest family and staff members’ personal information from open and closed sources to access public and private data.
In our experience working with affluent clients across their family enterprise to help mitigate cybersecurity risk, we have found it critical for family offices to regularly monitor for all types of social engineering attacks, including:
As a precautionary measure, family offices may want to consider performing a cybersecurity assessment to get a holistic view of potential risk. When there are data security concerns specific to a family member, consider a threat intelligence investigation to identify sources of exposure. If the family member is a key member of the family office enterprise, we recommend widening the scope of the investigation to include immediate and extended family members, as personal information is often exposed through innocent third parties.
The investigation should consider assessing open sources, such as social media, news platforms, people-search websites, location services, and public records. Searches should also extend to closed sources of information, including dark web marketplaces, underground forums and chatrooms, and other non-indexed web content.
Threat actors are always on the hunt for personal information. In our experience working with family offices, personal information of family members can often be obtained simply by searching online for:
It can become especially cumbersome to keep the above data safe, especially when you consider the role mobile devices and social media play in our lives. Keep in mind that many platforms make a profit from sharing your information.
What can family offices do to protect personal information from getting in the wrong hands? Practice good cyber hygiene by regularly performing:
While there are simple steps that family offices can take to safeguard sensitive information, RSM can help take them further by designing and executing a holistic cybersecurity strategy to effectively manage risk across the family enterprise. This strategy may consist of multiple measures, including general cybersecurity assessments and forensic analyses that evaluate the integrity of systems such as internal and external communications, billing and payment systems, integrated technology, and third-party relationships. Taking proactive security measures that consider users, devices, networks, and data is the best defense against becoming another cyberattack statistic.