- Our licensee just sent us a new cybersecurity annexure to sign. What do we actually need to action?
- Read it once, line by line, with someone who knows the controls. Most annexures ask for the same eight-ish things: phish-resistant MFA across every account, EDR on endpoints, managed patching, cybersecurity awareness training at fortnightly cadence, a zero-knowledge password manager with SSO, written onboarding and offboarding procedures, a documented incident response plan, and tested backups. We map the annexure against what you're already running, close the specific gaps, and document the controls so your licensee audit is a conversation about facts rather than intent. Faster is better; licensees tend to ask again 12 months later.
- Our platform (Netwealth / HUB24 / Praemium / Macquarie Wrap) just sent us a third-party risk questionnaire. How do we answer it?
- Honestly, and with specifics. Platforms run these questionnaires to document third-party oversight for their own regulators and insurers; they read the answers. The common questions: what controls are in place, who operates them, what's the incident response process, how is access governed, how are ex-staff offboarded. We've completed enough of these for financial-services firms to know which answers need to be specific (you have MFA, but on every system not just email) and which need evidence attached. We fill them in with you, not for you.
- We're a 4-person advisory firm. Is this level of IT really necessary?
- For most practices yes, because the obligations don't scale with headcount. A 4-person firm handles the same category of client data as a 40-person firm. The licensee's annexure asks the same questions. The insurer's renewal questionnaire asks the same questions. The platform's third-party review asks the same questions. What scales is the cost of getting it wrong: at 4 people an incident can end the practice, at 40 it's survivable.
- Our cyber insurance renewal questionnaire keeps getting longer. Can you help?
- Yes. Broker questionnaires now run 20 to 40 pages for mid-sized financial-services firms and directly affect premium, excess, and coverage. We've completed enough of them to know which answers the broker actually scores, which trigger follow-up (and sometimes a declined quote), and where "yes" is a lie that bites at claim time. We fill them in with you, not for you.
- Can our staff use Microsoft 365 Copilot, ChatGPT Enterprise or Claude for Work on client financial data?
- Yes if you're on an enterprise tier with the right data-handling terms, and you've governed how it's used. The risk isn't the model; it's what data enters it and whether the tool trains on inputs. We help clients pick the enterprise tier that fits the rest of the stack, write an acceptable-use policy aligned to AFSL and ASIC guidance, and block consumer tiers (free ChatGPT, free Claude, free Gemini) at DNS level so "just don't use AI" isn't the whole answer. Blanket bans don't hold; governance does.
- What should we do if we think an adviser or admin staff member clicked a phishing link?
- Right now: don't click anything else, don't delete the email, ring us. The first hour of containment is where most of the damage is prevented. We isolate the account, verify whether credentials were entered or session cookies harvested, check for forwarding rules or OAuth grants that wouldn't be caught by a password reset, and document the timeline. If it was nothing, we close the ticket with a written record you can show your licensee if asked. If it was real, the 72-hour ransomware reporting clock starts immediately for firms above $3M turnover.
- We use XPLAN / AdviserLogic / Iress / Practifi / MyProsperity / Class / BGL. Does that change the IT conversation?
- Not fundamentally. Those are your practice or administration applications; we manage the environment they run inside: Microsoft 365 tenant, device configuration, identity, backup, network, offboarding. Application-level workflow support stays with the software vendor, but we own the boundary. We also track the vendor's own security posture (breach history, certifications, data residency) as part of your vendor register, because your licensee, your broker and your platform all expect that oversight now.
- We're a small AFSL with outsourced everything. Is that safer or riskier?
- Both, depending on how it's managed. Outsourcing reduces attack surface you manage directly; it increases attack surface a third party manages on your behalf. CPS 234 and ASIC guidance both require oversight of third parties, which means regular reviews of their security posture, access, and breach history. We perform that oversight and maintain the paperwork for it.