Call :+1 718-393-5343

Building a Secure Foundation

Part 2 of 5: The Written Information Security Program (WISP) and Data Access Controls

For financial professionals in New York, securing sensitive data isn’t just a best practice; it’s a legal obligation. 23 NYCRR 500, the NY SHIELD Act, and WISP—as defined in the Gramm-Leach-Bliley Act—all require organizations to maintain comprehensive data security protocols. Establishing a WISP that integrates these requirements can seem daunting, particularly for smaller firms, but it’s essential for developing a compliant cybersecurity framework.

This post explores the essentials of a WISP, the importance of data access controls, and how a Managed Service Provider (MSP) like CDML Computer Services can simplify and strengthen these areas.


What is a Written Information Security Program (WISP)?

A WISP is a formal document that outlines the policies and procedures an organization uses to safeguard sensitive data. For financial firms, this includes protecting client financial records, Personally Identifiable Information (PII), and proprietary business data. A well-constructed WISP covers several core areas:

  1. Data Security Policies – Guidelines on data handling, sharing, and disposal.
  2. Access Control – Measures to limit data access to authorized personnel only.
  3. Incident Response – Steps to take in case of a data breach or other cyber incident.
  4. Employee Training – Ensuring all staff understand cybersecurity risks and procedures.

The NY SHIELD Act also mandates a written security program with reasonable safeguards, aligning closely with WISP requirements. Compliance with SHIELD and WISP provides a strong foundation for meeting broader regulatory requirements, like 23 NYCRR 500.


Real-World Scenario: Data Exposure Due to Weak Access Controls

Consider a small insurance brokerage that experienced a data breach because client records were accessible to all employees, regardless of their role. Without proper access control policies, sensitive data was compromised when a phishing attack targeted an untrained employee, resulting in financial loss and damaged client trust.

This scenario highlights the importance of access control—a core element of WISP and SHIELD compliance—in ensuring sensitive information is only accessible to those who need it.


Key Elements of Access Control

Effective access control is essential for limiting data exposure. By restricting access to authorized personnel only, firms can prevent unauthorized parties from viewing or altering sensitive information. Here’s what that entails:

  • Multi-Factor Authentication (MFA): MFA adds a layer of security by requiring multiple forms of verification, such as a password and a unique code from a mobile device, to access sensitive data.
  • Password Management: A strong password management system ensures that employees use secure, unique passwords that are regularly updated.
  • Role-Based Access: Employees should only have access to the information necessary to perform their job duties. Limiting access helps protect data from unnecessary exposure.

These practices align with 23 NYCRR 500, SHIELD, and PCI DSS requirements, emphasizing the need for robust access control and data security measures.


Solutions for Implementing WISP and Access Control

Creating and maintaining a WISP with strong access controls can require specialized expertise. For smaller firms, partnering with an MSP like CDML Computer Services provides affordable, scalable solutions. Here’s how CDML can assist:

  • Managed SonicWall Firewall: CDML’s network security devices offer advanced threat protection and secure network traffic management, with options for secure VPN connections for remote work.
  • LastPass Password Management and MFA: LastPass enhances password security and integrates MFA, ensuring only authorized personnel access sensitive data while simplifying employee logins.
  • Microsoft 365 Premium: Microsoft 365 includes built-in email encryption and Defender for 365, protecting sensitive communications and reducing the risk of unauthorized access.
  • Secure Cloud Storage and IaaS: CDML’s secure cloud storage and Infrastructure as a Service (IaaS) options provide scalable solutions for securely handling, storing, and managing sensitive data.

WISP Compliance Requirements and Key Solutions

To comply with WISP, SHIELD, and 23 NYCRR 500 requirements, financial firms need to implement these core elements effectively. Partnering with CDML Computer Services ensures that compliance measures are tailored to each firm’s needs, with robust, affordable solutions.


What’s Next?

A WISP serves as the foundation of an organization’s cybersecurity program, and access control is one of its most critical components. In the next post, we’ll cover Risk Management, Encryption, and Continuous Monitoring, exploring how each plays a role in achieving full compliance with 23 NYCRR 500 and related regulations. With the right guidance and solutions, even smaller financial firms can create a secure, compliant environment for handling client data.


This post is the 2nd part of a 5-part series on the compliance and technology challenges facing financial professionals in New York. In this series, we explore the key components of cybersecurity and data protection required to meet 23 NYCRR 500, WISP, PCI DSS, and the NY SHIELD Act.

The series includes:

  1. Understanding 23 NYCRR 500 – Technology and Compliance Challenges and Solutions for Financial Professionals in New York
  2. Building a Secure Foundation – The Written Information Security Program (WISP) and Data Access Controls
  3. Strengthening Cybersecurity with Risk Management, Encryption, and Continuous Monitoring
  4. Preparing for the Unthinkable – Disaster Recovery (DR) and Incident Response (IR) Plans
  5. Comprehensive Compliance and Security with CDML Computer Services

Comments are closed.