A mortgage lender provides various services and products designed to
help borrowers and brokers originate loans. Lenders also have to package
and sell, audit and/or service loans that they have closed. Finally,
lenders either provide or coordinate ancillary services such as title
policies.
In this capacity, your company has access to a wide variety of sensitive client
personal and business information, including PII on borrowers, tax
returns, financial statements, banking information, credit card numbers,
and credit applications. Additionally, mortgage lenders may
utilize older, legacy mortgage processing software applications that
were not built with security in mind. Therefore, they may be very
vulnerable to hacking and attack. Finally, mortgage lenders' systems are
regularly accessed by many third parties - any of whom could be a threat
- like what happened to Target when their system was breached via a
third-party plumbing company.
Today, lenders must comply with the specific requirments of the
Gramm-Leach-Bliley Act (GLBA) which includes implementation of an
Information Security Plan. Additionally, lenders must meet quickly
changing compliance and regulatory demands of the CFPB, FTC, FDIC,
FFIEC and state regulatory entities.
Your company's reputation would be seriously damaged
if the firm suffered a cyber breach and if the breach was bad enough, it
could possibly threaten your very survivability. Regulators are taking a fresh look at the mortgage lending industry,
and clients are starting to ask basic questions about how companies
protect their information.
The initial goal of your effort is to reach a point where you can
truthfully provide positive answers to the following questions:
1. What are your legal and/or ethical responsibilities to protect
client information?
2. Who in your firm has the ultimate responsibility for protecting
sensitive client information?
3. Are these responsibilities defined in the engagement letter or
contract between you and your clients?
4. Who has access to client information and how does your company control
access?
5. What other steps does your company take to ensure that the information
described above is correctly protected?
6. What are your policies and procedures regarding notifying clients in
case of a cyber breach?
Mortgage Lender Cyber Security Program Components
Risk Assessment. We spend
time with your leadership and any in-house or third-party computer
service providers that your firm uses and ask
some very specific questions. In addition, we identify critical applications,
major data flows, external and remote data access, and other
potential risk areas and apply various external technical tools. We will produce a
prioritized risk assessment document outlining our findings and
recommendations.
Cyber Security Policies. Most
mortgage lenders have no (or inadequate) cyber security policies. We review what you have
and provide you with a set of ten draft cyber security policies
and an associated framework designed to work in a mortgage lending firm
that you can review, edit, approve, and implement. Each
situation is somewhate different, therefore the basic policy list
may vary from firm to firm, but the following list of policies
gives you an idea of what to expect:
-Client Data Protection Policy
-Access Control Policy (includes the Password Policy)
-Security Awareness Training Policy
-Software Patch Management Policy
-Firewall Configuration and Logging Policy
-Encryption Policy
-Remote Access Management Policy
-WiFi Management Policy
-Third Party Vendor Management Policy
-Incident Response Policy
Additional policies are available upon request.
Attorney Architected Privacy Policy. This is a
separate policy because it needs to cover your website and also
your business, and they ultimately need to be "harmonized"
with other organizational documents. The
draft Privacy Policy we will provide to you was written by an
attorney who also holds the following certifications: CISSP
(Certified Information Security System Professional), CIPP
(Certified Information Privacy Professional), and CEH (Certified
Ethical Hacker). This is what you need...starting with anything
short of this, is only asking for trouble later. You will need to
review this policy and make sure it is appropriate for your
organization. This privacy policy needs to be harmonized with your
business practices, data collections practices, and client
contracts. This privacy policy template will provide the framework
to allow your attorney to do this.
Cyber Security Awareness Training.
Your people are always your weakest link--this includes your most
senior partners. Do not fool yourself...everyone must be trained.
We have already vetted tmany cyber security awareness
training programs and have found a great value for you and we
know how to deploy and manage it in the most cost-effective way
possible. In todays world of business
email compromise and phishing attacks, all organizations should be
conducting test phishing email exercises. Our vetted solution
allows you - or us on your behalf - to conduct these test
exercises and see who needs additional training.
Technology Enhancement. We
will make recommendations that allow you to use existing
technology resources to get more security bang for your buck. Our
goal is to help you make meaningful security progress without
spending more money on new systems or personnel.
Mortgage Lender Cyber Security Program Cost Estimate for Up to 25
Staff (see full details
HERE)
Risk Assessment (assuming 25 staff or less)
$2,500
Eighteen Draft Cyber Security Policies
Architected for Mortgage Lending Companies
2,950
Attorney Architected Privacy Policy
1,000
Cyber Security Awareness Training (per year for up to
25
staff)
750
Technology Enhancement
0-2,000
Total Security Program Cost Estimate
$7,850
Additional Services Available Separately
Vulnerability Assessment
Security Development Lifecycle Review for Internally Developed
Software (SDLC)
Application Security Assessment
Cyber Liability Insurance Review
Third-party Vendor Security Monitoring.
We have vetted and are a re-seller for the premier third-party
vendor monitoring solution. This solution generates a daily
security score on any vendor's network without requiring access to
that network.
Penetration Testing
While every situation is different (and your costs may vary), you can see that it is totally
feasible to get your firm to the position where it can truthfully and
positively answer the six client questions above for a very reasonable
sum. Any service above can be purchased on an a la carte basis.
NOTE: Implementing the above program will make purchasing cyber insurance
for your company a whole lot easier. We can also help you navigate the
murky waters of the cyber security insurance world and assist you in
getting the appropriate insurance coverages. Since cyber
insurance is increasingly becoming an important component of risk
management for any law firm, please see our
cyber insurance discussion that
illuminates issues and risks involved.
Please call us TODAY for more information: 303-997-5506