Skip to main content
Compliance & Risk

Cybersecurity Fundamentals Every Financial Services Firm Should Have in Place

Financial services firms are among the most targeted organizations for cyberattacks — and among the most scrutinized by regulators. Here's the baseline security stack that every firm should have before the next examination, incident, or insurance renewal.

February 2026

Why Financial Services Firms Face a Higher Bar

Financial firms hold what attackers want most: money and the credentials to move it. A compromised wealth management firm or registered investment adviser doesn't just lose data — it loses client assets, regulatory standing, and the trust that took years to build.

Regulators understand this. The SEC's Regulation S-P now explicitly requires written incident response policies for registered investment advisers and broker-dealers. FINRA Rule 4370 requires business continuity planning. The NYDFS Cybersecurity Regulation (23 NYCRR 500) is one of the most prescriptive state-level cybersecurity frameworks in the country, and it's influencing similar regulations in other jurisdictions.

For smaller independent RIAs, broker-dealers, insurance firms, and wealth management practices — many of which operate with small IT teams or none at all — meeting these requirements without the right foundation is nearly impossible. The controls below are not optional best practices. For most regulated financial firms, they're the baseline the regulators expect to find.

The 8 Baseline Controls Every Financial Firm Needs

1

Multi-Factor Authentication (MFA) — Everywhere

MFA on email, remote access, client portals, and any system holding client data or financial information. This is no longer optional. Both regulators and insurance underwriters treat MFA as a minimum standard, and its absence is an immediate red flag in examinations and claim investigations.

Regulatory note: SEC Reg S-P and FINRA exam staff specifically ask about MFA deployment scope. "We have it on email" is not sufficient — they want to know it's on all systems with access to customer records.

2

Advanced Email Security

Financial firms are primary targets for business email compromise (BEC) and wire fraud. Native Microsoft 365 or Google Workspace protections are insufficient. You need a dedicated email security layer that catches AI-generated phishing, impersonation attacks, and malicious attachments that bypass default filters.

Regulatory note: FINRA has flagged BEC and email account compromise as leading causes of customer harm in small broker-dealer examinations over the past three years.

3

Endpoint Detection and Response (EDR)

Behavioral-based endpoint protection that detects threats that traditional antivirus misses. EDR provides the visibility and containment capability you need if malware reaches a workstation or server — including the ability to isolate a compromised machine without losing evidence.

Regulatory note: Cyber insurance applications now ask specifically whether you use EDR. Firms without it face higher premiums or declined coverage.

4

Immutable, Tested Backups

Backups are your last line of defense against ransomware. They must be immutable (cannot be encrypted or deleted by ransomware), stored offline or in a separate environment, and tested regularly — not just assumed to work. Quarterly restore tests are the minimum standard.

Regulatory note: SEC Reg S-P requires safeguards for customer records. A firm that loses client data to ransomware because backups weren't working has a disclosure problem as well as an operational one.

5

Incident Response Plan

A documented, tested incident response plan that defines who does what, in what order, when an incident occurs. Should include contact lists, escalation procedures, regulatory notification timelines, and communication templates. It must be reviewed and updated at least annually.

Regulatory note: SEC Reg S-P (updated 2024) explicitly requires covered entities to have written policies and procedures for detecting, responding to, and notifying customers of security incidents.

6

Security Awareness Training

Regular, documented security training for all employees with access to client data or financial systems. Training should include phishing simulations that reflect current attack techniques. Annual completion rates should be tracked and verifiable.

Regulatory note: FINRA Regulatory Notice 19-18 emphasized training as a key component of anti-money laundering programs and cybersecurity practice. Examiners ask for training records and completion documentation.

7

Vulnerability Management and Patching

Regular vulnerability scanning across all systems, prioritized remediation for critical findings, and documented patch deployment SLAs. Unpatched systems are the leading cause of network-level compromises. Critical patches should be deployed within 24-48 hours of release.

Regulatory note: The SEC has cited inadequate patch management in enforcement actions. A known vulnerability that goes unpatched for weeks or months is difficult to defend in a post-incident review.

8

Compliance Documentation and Evidence Collection

Security controls only protect you during an examination or incident if you can prove they're in place and working. This means maintaining logs, policy documents, training records, vulnerability scan reports, and incident documentation — organized and accessible, not scattered across email threads.

Regulatory note: Both SEC and FINRA examiners request documentation during sweeps. The inability to produce evidence of controls you claim to have is treated as a gap, not an administrative oversight.

SEC and FINRA: What They're Actually Looking For

SEC exam staff and FINRA examiners aren't looking for perfection — they're looking for evidence of a risk-based, documented, and actively maintained cybersecurity program. That means written policies, not just technology.

SEC

Regulation S-P: Safeguards for Customer Records and Information

  • Written information security program (WISP) covering administrative, technical, and physical safeguards
  • Incident response policies with defined customer notification procedures
  • Annual review and update of the WISP
  • Vendor oversight — third parties with access to customer data must have contractual security obligations
  • Documentation of risk assessments and control testing
FINRA

FINRA Rule 4370 and Cybersecurity Best Practices

  • Business continuity plan that addresses cybersecurity scenarios
  • Firm-specific risk assessment identifying threats and vulnerabilities
  • Written supervisory procedures covering cybersecurity
  • Vendor and third-party risk management program
  • Employee training program with verifiable completion records

The Documentation Gap: Where Most Firms Fall Short

The most common finding in SEC and FINRA cybersecurity examinations isn't missing technology — it's missing documentation. Firms often have reasonable security practices in place but haven't written them down, tested them, or tied them to a formal policy.

At minimum, every financial firm should have documented and dated versions of the following:

Written Information Security Program (WISP)

A comprehensive policy covering how you protect, monitor, and respond to threats to customer information. Must be reviewed and updated annually.

Incident Response Plan

Step-by-step procedures for responding to a security incident, including roles, notification timelines, and regulatory reporting requirements.

Business Continuity / Disaster Recovery Plan

How your firm recovers operations after an outage or data loss event. Must address cybersecurity scenarios, not just physical disasters.

Vendor Risk Assessments

Documented review of third-party vendors with access to customer data or firm systems, including their security posture and contractual obligations.

Security Awareness Training Records

Completion records for all employees, including dates, training content, and phishing simulation results.

Vulnerability Scan Reports and Remediation Records

Evidence that you scan for vulnerabilities regularly, prioritize findings, and track remediation to completion.

Access Control and Privileged Account Audit

Current list of who has access to what systems, with evidence of regular review and termination of access for departed employees.

Cyber Insurance and Financial Firms: Raising the Floor

Cyber insurance underwriters for financial services firms have tightened their requirements significantly since 2022. Wire transfer fraud, social engineering coverage, and funds transfer fraud riders now come with explicit control requirements — not just attestations.

Many policies now require that firms demonstrate MFA on email and remote access, verified backups that are tested quarterly, security awareness training with documented completion rates, and an incident response plan that's been reviewed in the past 12 months. Failing to maintain these controls after a policy is issued can result in claim denial.

Learn what cyber insurance underwriters are specifically looking for and how to ensure your security program supports your coverage — not just at renewal time, but year-round.

Building Toward a Risk-Based Program

The controls above are the floor. Regulators and sophisticated underwriters increasingly expect firms to demonstrate a risk-based program: one that identifies your specific risks, prioritizes controls accordingly, and continuously monitors for gaps.

1

Conduct a formal risk assessment

Identify your firm's specific risks based on the data you hold, the systems you run, and the regulatory requirements that apply to you. Generic risk assessments don't satisfy regulators who know your business model.

2

Map controls to your risk register

For each identified risk, document which controls address it, whether those controls are in place, and how you verify they're working. This is the foundation of a defensible security program.

3

Establish continuous monitoring

One-time assessments go stale quickly. Ongoing monitoring — vulnerability scanning, log review, policy compliance checks — ensures you know about gaps before an examiner or attacker does.

4

Test your response procedures

Tabletop exercises that simulate a ransomware attack or data breach reveal gaps in your incident response plan before you need it in a crisis. Regulators increasingly expect evidence of testing, not just documentation.

5

Build an audit evidence trail

Collect and retain evidence that your controls are working: training completion logs, patch deployment records, scan reports, access review documentation. This is what protects you during an examination.

Frequently Asked Questions

Does our small RIA really need all of these controls?

Yes. Regulation S-P applies to registered investment advisers of all sizes. FINRA-regulated broker-dealers are subject to Rule 4370 regardless of headcount. Examiners don't scale their expectations based on firm size — they scale their engagement, but the baseline requirements are the same. Small firms are also proportionally more at risk because they have fewer resources dedicated to security.

What's the penalty for not having a written incident response plan?

The SEC has taken enforcement action against firms for inadequate cybersecurity policies and procedures, including failures to maintain required safeguards under Regulation S-P. Penalties range from censures and civil fines to disgorgement and bars. Beyond regulatory penalties, a firm without an IRP that experiences a breach faces significantly greater operational damage and client loss.

How does a managed security provider help with compliance?

A qualified MSSP with financial services experience can provide the technical controls (EDR, email security, vulnerability management), the monitoring (24/7 SOC), and the documentation (security reports, evidence collection) that support your compliance program. They can also map their services to your regulatory requirements so you have a clear picture of what's covered. See our financial services checklist for a full breakdown.

How often do we need to update our WISP?

At minimum, annually — and whenever there is a material change to your business, systems, or the threat landscape. The SEC expects annual review to be documented, including who reviewed it, what was changed, and why. A WISP that hasn't been updated in three years is a liability, not a protection.

Financial Services Checklist

Download the Financial Services Security Checklist

Our free checklist maps the security controls financial firms need against SEC, FINRA, and cyber insurance requirements — so you know exactly where you stand before your next examination or renewal.

VC

Vantz Stockwell

Co-Founder & CFO

Vigil Cyber provides 24/7 managed security operations for small and mid-sized businesses across the Southeast. Our team combines rigorous operational discipline with enterprise security expertise.

Stay Ahead of the Threat Landscape

Get monthly cybersecurity insights, threat intelligence, and compliance updates delivered to your inbox. No spam. Unsubscribe anytime.