Cyber security isn’t just an IT problem — it’s a core business risk for every financial-advice practice.

As custodians of sensitive client data and regulated financial transactions, advisers must understand how even a small lapse can create large-scale harm

Why Cyber Security Matters

As custodians of sensitive client data and regulated financial transactions, advisers must understand how even a small lapse can create large-scale harm.

Business Impact What it means for advisers
Financial loss Ransomware, fraudulent fund transfers and remediation costs can quickly eclipse annual revenue.
Regulatory penalties ASIC can issue infringement notices or commence civil proceedings for inadequate controls.
Reputation damage Losing client trust is often irreparable; referrals dry up and retention plummets.
Client harm Identity theft or misuse of personal data can derail clients’ financial plans and well-being.

Key policy insight

“Human errors, hacker attacks and system malfunctions could cause great financial damage and may jeopardise our company’s reputation.” IIP Cyber Security Policy…

Keeping cyber security “top of mind” is therefore essential to protect both clients and the broader IIP community

IIP Cyber Security Policy at a Glance

Section What you need to know
Aim of the policy Provides “guidelines and provisions for preserving the security of data and technology infrastructure.”
Who it applies to All representatives, employees, contractors and anyone with permanent or temporary access to IIP systems or hardware.
Your core responsibilities Keep devices password-protected, install antivirus, use secure networks, leverage password managers and immediately report breaches.
Email hygiene Be wary of unexplained attachments, click-bait subject lines and unusual sender details.
Password management Use strong, unique passwords, enable 2FA and avoid sharing credentials unless absolutely necessary.
Secure data transfer Avoid moving client data off-platform; never send confidential information over public Wi-Fi; always confirm recipient authority.
Remote work Apply the same encryption and protection standards when working from home or engaging remote staff.
Incident reporting Raise breaches in the Compliance Hub or email your Compliance Manager without delay.

Real-World Scenario

Phishing in Practice
An adviser receives an email titled Urgent: Client Portfolio Update containing a link to a “secure document”. The domain name is misspelled (e.g., iipdealergorup.com). Clicking the link installs malware that captures keystrokes, giving attackers access to XPlan and client bank details.

Lesson: Always inspect sender addresses and URLs, and follow the “Keeping emails safe” checklist before opening any attachment or link.

Adviser Checklist

  1. ✅ Use a password manager (e.g. iC2 Password Management or LastPass).

  2. ✅ Turn on two-factor authentication for every cloud service.

  3. ✅ Update operating systems and browsers monthly — sooner when critical patches appear.

  4. ✅ Lock your screen whenever you step away.

  5. ✅ Never forward client data to personal email accounts.

  6. ✅ Report any suspicious activity to your Compliance Manager within 30 minutes of discovery.

Key Takeaways

  • Cyber security is a strategic imperative, not a technical afterthought.

  • The IIP Cyber Security Policy sets clear, actionable standards for everyone.

  • Advisers are the first line of defence; most breaches begin with human error.

  • Immediate reporting limits damage and fulfils regulatory obligations.

Remember: A secure adviser is a trusted adviser. Keep cyber security at the centre of your daily practice.

1. Which Australian law governs how IIP handles personal information?




2. Which of the following is not listed as a business impact of poor cyber security?




3. The IIP Cyber Security Policy applies to:




4. When working on public Wi-Fi, policy requires you to:




5. The IIP Privacy Policy requires the organisation to take ______ steps to protect personal information from misuse and unauthorised access.