Changing with the Times: Cybersecurity in Collection

July 13th, 2017

Before the age of digital interactions and the development of computer software to handle the vast majority of our transactions, the U.S. economy relied on rolodex’s hard-copy storages for business operations. As the digital age progressed and people increasingly used credit cards and electronic forms of storage, business processes needed to change to maximize operational efficiency and to better protect from new, online risks. Before, a major risk was ruining a paper copy of a piece of confidential data; now, businesses have to worry about online vulnerabilities, as hackers are seemingly able to retrieve confidential information at will, which was recently displayed by the major global Windows Operation Systems hacks back in May. Maintaining adequate IT security is incredibly important in the 21st century, especially for ARM companies – whose entire business operation is centered on maintaining proper and confidential consumer information. Additionally, the ARM industry has become extremely technologically-advanced, with businesses utilizing complex products, such as IVR systems and CRM software, among other things, to run more efficiently. Lastly, with the CFPB and other government compliance agencies creating the enhanced compliance environment, it’s critical for ARM companies to monitor their cybersecurity infrastructure.

This point is further emphasized as U.S. consumers have become much more reliant on electronic forms of payment (e.g., debit or credit cards) in lieu of cash, as shown in the following graph. As additional confidential data is logged onto electronic software and devices, consumers and businesses become increasingly more vulnerable to cyberattacks.

Additionally and unfortunately, cyberattacks are quite prominent and, like a virus, are constantly transforming and growing to bypass our defenses. Let’s put this into perspective. In 2013, Deseret News reported that Utah’s secure government networks experienced upwards of 20 million attacks per day, up nearly 20-fold from “just” 1 million per day in 2011. Considering that massive two-year growth, please realize that this was already four years ago. Hackers and their technology have only gotten smarter and better since. Additionally, back in 2014, North Korea was accused of hacking into Sony’s database and leaking several confidential pieces of information, which led to President Obama enforcing sanctions against the country in response to the cyberattacks. In recent months, the WannaCry ransomware attack spread to computers in more than 150 countries, as more than 200,000 people fell victim to the outbreak. And lastly, as many of you are presumably well aware, U.S. intelligence and many members of Congress are confident and sure that Russia hacked into various election systems and software to help suede the 2016 presidential election in some way to favor Donald Trump. It is safe to say that the world sees hundreds of millions of cyberattacks each and every day. Take a look at the attacks happening in real-time (data varies between each site):

Specifically to ARM, attacks against the industry have been on the rise in recent years. Collection agencies have a lot of valuable information that hackers are looking to get their hands on, including customer credit card information and social security numbers, among other things. Another motive for the attacks against the industry could be anger towards debt collectors – a seemingly everlasting stigma. Many people are upset with how the industry allegedly treats consumers and, with new technology readily available and increased cyber/computer literacy among the populous, even amateurs may be taking a crack at it.

Long story short, just as it is important to have a fire exit strategy in your building or other business safety precautions, it’s critically important to have clear policies and procedures set and an adequate cybersecurity infrastructure in place to protect you from any kind of digital attack. With new innovations, there are always new risks and vulnerabilities to worry about. Welcome to the future ladies and gentlemen. Not as glamorous as you thought, huh?

Leave a Reply

LATEST BLOGS

Options Abound for Sellers of Lower Middle Market Businesses

July 18, 2017

There is no shortage of buyers for a selling company in the lower end of the middle market. Sorting through all prospective buyer candidates to find the very best for your business is a challenge that any owner shouldnt take lightly.....

» see this post    » all posts


Changing with the Times: Cybersecurity in Collection

July 13, 2017

Collection agencies have a lot of valuable information that hackers are looking to get their hands on. Are you protected?....

» see this post    » all posts


Is Your Business Prepared for a Sale?

July 11, 2017

Preparing a business for a potential sale is not only a defensive move that an owner can take, but it is also prudent to business. Here are a few ways to make sure you're prepared.....

» see this post    » all posts


RECENT ANNOUNCEMENTS

Kaulkin Ginsberg Moves Its Market Intelligence Online

June 8, 2017

Kaulkin Ginsberg is changing the way busy owners, executives, and senior leaders access strategic market intelligence with the launch of KG Prime. KG Prime is a comprehensive and easy to use web-based service that provides users with economic, market segment, and other forms of strategic research.....

» see more




AXIAL FORUM - Publishes "Succession Planning - A Critical Missing Element in Many Family-Owned Businesses"

June 7, 2017

AXIAL FORUM, a web-based strategic mediator for the M&A industry, recently published an article succession planning by Topline Valuation Group. This article was co-authored by members of the Topline Valuation Group and Kaulkin Ginsberg team....

» see more




ACA of Texas Publishes "Three Critical Healthcare Industry Trends for Outsourced Business Services" in its Winter 2017 Magazine

March 16, 2017

The ACA of Texas Publishes "Three Critical Healthcare Industry Trends for Outsourced Business Services" by Kaulkin Ginsberg in its Winter 2017 Magazine. Kaulkin Ginsberg details its belief that the growth in patient lending and financing programs, clinical integration networks, and physician quality reporting systems for the Centers for Medicare and Medicaid Services (CMS) could have profound effects on companies focused on servicing healthcare providers in 2017 and beyond.....

» see more