Compliance Updates
October 01, 2024
Updated Cybersecurity Guidelines for ALL Employee Benefit Plans by the U.S. Department of Labor
Todd Archer, Concierge President
The cybersecurity guidelines released by the Employee Benefits Security Administration (EBSA) in April 2021 are being confirmed by the EBSA to be applicable to all employee benefit programs, including group health plans.
To assist plan sponsors, fiduciaries, service providers, and participants in employee benefit plans in protecting plan data, private information, and plan assets, EBSA released cybersecurity guidelines in 2021. But in the intervening years, service providers for group health plans have informed fiduciaries and EBSA inspectors that this guideline is limited to retirement plans. In 2022, the ERISA Advisory Council of the Department of Labor suggested that EBSA make it clear that health benefit plans are covered by the guidelines. The cybersecurity advice is applicable to all ERISA plans, including group health plans.
The guidance provides the below suggestions.
Best practices for hiring service providers include:
- Asking about the service provider’s information security standards.
- Asking how a service provider validates its practices.
- Evaluating the service provider’s track record in the industry.
- Asking whether the service provider has experienced past security breaches.
- Confirming the service provider has insurance policies that would cover losses caused by cybersecurity and identity theft breaches.
Cybersecurity program best practices include:
- Having a formal, well-documented cybersecurity program.
- Conducting prudent annual risk assessments.
- Having a reliable annual third-party audit of security controls.
- Clearly defining and assigning information security roles and responsibilities.
- Having strong access control procedures.
- Ensuring that any assets or data stored in a cloud or managed by a third-party service provider are subject to appropriate security reviews and independent security assessments.
- Conducting periodic cybersecurity awareness training.
- Implementing and managing a secure system development life cycle (SDLC) program.
- Having an effective business resiliency program addressing business continuity, disaster recovery, and incident response.
- Encrypting sensitive data, stored and in transit.
- Implementing strong technical controls in accordance with best security practices.
- Appropriately responding to any past cybersecurity incidents.
Federal Trade Commission (FTC) Cybersecurity Tips
Protect Your Files & Devices
Update your software
This includes your apps, web browsers, and operating systems. Set updates to happen automatically.
Secure your files
Back up important files offline, on an external hard drive, or in the cloud. Make sure you store your paper files securely, too.
Require passwords
Use passwords for all laptops, tablets, and smartphones. Don’t leave these devices unattended in public places.
Encrypt devices
Encrypt devices and other media that contain sensitive personal information. This includes laptops, tablets, smartphones, removable drives, backup tapes, and cloud storage solutions.
Secure your router
Change the default name and password, turn off remote management, and log out as the administrator once the router is set up.
Use multi-factor authentication
Require multi-factor authentication to access areas of your network with sensitive information. This requires additional steps beyond logging in with a password — like a temporary code on a smartphone or a key that’s inserted into a computer.
Protect Your Wireless Network
Secure your router
Change the default name and password, turn off remote management, and log out as the administrator once the router is set up.
Use at least WPA2 encryption
Make sure your router offers WPA2 or WPA3 encryption, and that it’s turned on. Encryption protects information sent over your network so it can’t be read by outsiders
Make Smart Security your Business as Usual
Require strong passwords
-A strong password is at least 12 characters that are a mix of numbers, symbols, and capital and lowercase letters.
-Never reuse passwords and don’t share them on the phone, in texts, or by email.
-Limit the number of unsuccessful log-in attempts to limit password-guessing attacks.
Train all staff
Implementing a regular schedule of employee training. Update employees as you find out about new risks and vulnerabilities. If employees don’t attend, consider blocking their access to the network.
Have a plan
Have a plan for saving data, running the business, and notifying customers if you experience a breach.
Resources:
The new Compliance Assistance Release issued by the department’s Employee Benefits Security Administration provides best practices in cybersecurity for plan sponsors, plan fiduciaries, recordkeepers and plan participants.
- Tips for Hiring a Service Provider: Helps plan sponsors and fiduciaries prudently select a service provider with strong cybersecurity practices and monitor their activities, as ERISA requires.
- Cybersecurity Program Best Practices: Assists plan fiduciaries and recordkeepers in mitigating risks.
- Online Security Tips: Offers plan participants who check their online retirement accounts with rules for reducing the risk of fraud and loss.
This Compliance Overview is not intended to be exhaustive, nor should any discussion or opinions be construed as legal advice. Readers should contact legal counsel for legal advice. © 2021 Society of Professional Benefit Administrators. All rights reserved.
October 2024