Welcome to the Cyber Defense Resource

This page provides the information and tools available from DALBAR to assist advisors and financial institutions in maintaining defenses against the growing threat to client assets by cyber-villains.

Client Defense Scoresheet

Download this free personalized spreadsheet that helps advisors to determine how strong defenses are to cyber threats.

Advisors answer 14 questions about defenses at websites, mobile devices, IVRs, Phone Centers and Online Statements. Results are produced for each firm’s point of entry shows whether defenses are:

  • Maximum
  • Moderate
  • Minimum
  • Insufficient

Click here for the free personalized Scoresheet.

State of Authentication in Financial Services – Executive Summary

Dalbar and ThinkAdvisor conducted a survey of leading financial institutions to catalog the authentication practices currently being used across four points of entry into your records, including: websites, mobile devices, interactive voice response units (“IVR”), telephone contact centers, and online statements. This Executive Summary provides an overview of these defenses and allows your organization to compare its own cybersecurity practices to the financial community at large.

Click here for information on how to obtain the Executive Summary.

State of Authentication in Financial Services – Authentication Trends

The Authentication Trends Report assists financial institutions in determining which practices need to be added or enhanced and the sequence for making improvements based on the risk, cost, timeframe and hurdles to overcome. This report breaks down the cyber-defenses currently in place for various points of entry, lines of business and audiences. Potential vulnerabilities are identified, as are specific practices gaining traction and falling out of favor. This report will assist institutions in setting priorities based on risk, cost, timeframe and hurdles to overcome.

Click here for information on how to obtain the Trends Report.

Data breaches of government, business and private records that have already occurred and continue to occur enable cyber-villains to sell and use this information to bypass traditional defenses used to protect electronically held assets.

Threats to financial assets exist at every point of entry, each requiring comprehensive defenses. In the current environment, points of entry to access financial assets include websites, mobile devices, interactive voice response units, telephone contact centers and online statements.