Newport firm closes amid alleged embezzlement
Relax & Co., which provided an array of services to property owners in the Lake Sunapee area, had already been forced to lay off workers earlier this month.
Employers commonly utilize online cloud services to administer employee benefits and payroll. Those services entail the collection and management of huge amounts of highly sensitive information about employees and their dependents, including SSNs, governmental IDs, financial accounts, and health information. Those activities also routinely involve significant financial transactions, including for payroll, retirement, and insurance and other benefits payments. As a result, online benefits and payroll services are valuable targets for cyberattacks — and successful attacks almost always result in huge losses and liabilities for employers.
Hackers commonly deploy a one-two-punch when attacking an employer’s online benefits or payroll system.
First, they divert a large financial transaction (such as a payment to a retirement fund) or a series of smaller financial transactions (such as payroll payments) from the legitimate recipient accounts to their fraudulent accounts, and then rapidly withdraw those funds from the fraudulent accounts to avoid having them clawed back by the transferring financial institution or frozen by the recipient institution.
Second, they simultaneously steal highly sensitive personal information from the benefits or payroll system, so they can demand a ransom payment from the employer to refrain from selling the information on the dark web, and threaten to demand ransom from the employees if the employer refused to pay.
Employers often assume that the providers of these systems must have incorporated safeguards into to prevent such attacks. That assumption is often incorrect, or the systems may contain some such safeguards but the employer has not activated them or configured them appropriately.
Here are five safeguards that all high quality online benefits and payroll systems should include, and should have properly activated and configured.
More sophisticated and user-friendly MFAs employ certificates that the employer installs only on computers used by employees authorized to access benefits and payroll systems, and such applications have the added benefit of being transparent to users.
For example, multi-user notification could be configured so that, when the profile information for an employee is changed (e.g., by someone using the credentials of a HR person or the employee), a second person would receive a notification of the changes (e.g., a different HR person or an accounting employee). Similarly, multi-user authorization could be configured so that, when the financial account number for one or more recipients is changed, a second person (e.g., a system administrator) receives a notice and must log in to the online system to authorize the changes.
Finally, benefits and payroll services should enable employers to encrypt either their entire databases or sensitive information within the databases, even while the data is at rest. Thus, if hackers are able to steal that information, they will unable to decrypt it.
Employers cannot just assume that their online cloud employee benefits and payroll services providers are adequately protecting them from cyberattacks. To avoid the potentially huge losses and liabilities that result from such attacks, employers must take responsibility for protecting the huge amounts of sensitive information and the significant financial transactions collected and managed in those benefits and payroll systems.
Cam Shilling, founder and chair of McLane Middleton’s Cybersecurity and Privacy Practice Group, assists businesses and private clients in improving their information privacy and security protections.