A client recently asked: “I just read that cybersecurity is now part of our fiduciary duty for our 401(k) plan. What does that mean for us?”
It’s a fair question. Many retirement plans were set up years ago, long before cybersecurity was a daily topic. Vendors were selected, the plan went live and the operational details faded into the background. If your plan has been running on autopilot, you’re not alone. But that needs to change.
The Department of Labor (DOL) has made its position clear: plan sponsors have a fiduciary duty to prudently select and monitor service providers, and that includes evaluating their cybersecurity practices. The DOL’s cybersecurity guidance establishes that fiduciaries must take steps to address cybersecurity risk — not just at the outset, but on an ongoing basis.
A recordkeeper or third-party administrator with solid security practices five years ago may have fallen behind. That’s why ongoing engagement matters.
You don't need to become a cybersecurity expert. However, it's important to ask reasonable questions, evaluate vendor responses and document your decisions.
Retirement plans hold large balances and follow predictable processes, which makes them attractive to bad actors. Account takeover fraud and illegal fund transfers happen more often than most plan sponsors realize. The features designed to make participant accounts easy to access can also make them easier to exploit.
When an incident occurs, plan sponsors could experience financial loss, prohibited transaction issues, corrective contributions and regulatory scrutiny. Even strong vendor contracts don’t prevent lawsuits or stop participants from seeking damages.
The DOL’s Cybersecurity Program Best Practices outlines what service providers should have in place:
You don’t need to be fluent in all of the specifics, but you should be able to ask your vendors to demonstrate they are.
A straightforward starting point is to add cybersecurity as a standing agenda item in your annual service provider reviews. It creates a documented record of oversight and keeps the topic from getting lost in day-to-day operations.
TrueNorth’s Cyber Consulting Practice can help you develop an oversight framework, evaluate current vendor practices and document your fiduciary decisions. Reach out to get started.