Kestra Redesigns its Technology Platform for Advisers

Advisers can now access AdvisorComplete from any device and personalize its menus, widgets and landing pages.

Kestra Financial has redesigned its proprietary technology platform, AdvisorComplete, which is its centralized hub for advisers and their staff.

Advisers can now access the platform from any device and personalize its menus, widgets and landing pages. Kestra also added a new search engine, more than 370 pages of informational material and new integrated tools. Furthermore, Kestra configured the platform to run 70% faster than the previous version.

Kestra also added an Entreda security agent to complement existing antivirus, anit-malware and encryption software.

Also added is a mobile application from CellTrust that enables advisers to compliantly text their clients. Kestra has also eliminated 80% of the paperwork needed to onboard with a digital onboarding portal.

Kestra notes that since it earlier added eMoney’s wealth management and financial planning platform, Kestra Financial advisers have leveraged its document value, client portal and account aggregation tools.

“We are committed to empowering adviser success, and technology is a key component of our offering,” says Kevin Witt, chief technology officer at Kestra Financial. “As part of our technology enhancements, we collected feedback from hundreds of advisers to design an integrated, customized solution that would improve the day-to-day adviser experience, starting from onboarding on day one.”


SPARK Clears Up Definitions for Retirement Plan Cybersecurity

The SPARK Institute's Data Security Oversight Board (DSOB) worked with definitional examples from national cyber standards, international regulations, state privacy laws, and client contracts and gathered insights from the plan consultant representatives on the board.

Reading the words “cyber security breach” and “cyber fraud” on the news, email, or in general can alone cause panic. But what constitutes a security breach, and how a recordkeeper should inform a plan sponsor about cyber-related events continue to be unclear throughout the industry.

Never miss a story — sign up for PLANADVISER newsletters to keep up on the latest retirement plan adviser news.

 

As plan sponsors are growing their emphasis on cyber security safety, “security breach” and “cyber security” are becoming key issues in recordkeeping contracts, says The SPARK Institute. To develop better understanding on the terms and its meanings, the company, through the work of its Data Security Oversight Board (DSOB), has developed common definitions for these terms, made publicly available.

 

“It’s important to keep in mind that these definitions serve as guidelines and do not supersede state and/or federal laws, legislation, or regulation”, says Dennis Lamm, a member of SPARK’s DSOB from Fidelity Investments, who headed up the task force responsible for developing these definitions. “Our objective was to create a reasonable approach consistent with best practices and industry standards that will serve to protect participants, simplify discussions and get to an agreement more quickly.”

 

According to SPARK, over 11 months, the DSOB Task Force worked with definitional examples from national cyber standards, international regulations, state privacy laws, and client contracts and gathered insights from the plan consultant representatives on the board.

 

“As Plan Fiduciaries evaluate their third-party vendors, cyber security measures and standards have become increasingly relevant,” says Rasch Cousineau, a senior consultant with the Hyas Group. “These definitions provide a level platform for vendor evaluation as it relates to cyber security breach and fraud.”

 

The set of definitions includes two examples, Security Breach and Cyber Fraud, according to the report. For illustrative purposes, examples of a Security Breach include: “A successful attack on a recordkeeper’s network or information system which results in authorized acquisition of participant records,”; “An intrusion into a recordkeeper’s external cloud account that results in the attacker acquiring unencrypted personal data stored within the environment;” and more.

 

Cases behind Cyber Fraud include participants disclosing account usernames and passwords via phishing email links; and compromised computers holding forms of keystroke logging malware.

 

SPARK makes it clear in their report that definitions are “not intended to supersede state and/or federal laws, legislation, or regulation, but are meant to establish a base of communication between recordkeepers and plan sponsors regarding Security Breaches and Cyber Fraud events.”

«