Our Family of Companies
western & southern financial group logo
western & southern life logo
columbus life logo
eagle realty group logo
Fabric by Gerber Life
fort washington logo
gerber life logo
integrity life logo
lafayette life logo
national integrity life logo
touchstone investments logo
w&s financial group distributors logo
Business professional utilizing cybersecurity techniques.

Cybersecurity Program

To help us achieve and maintain the highest level of security, Fort Washington partners with its parent company, Western & Southern Financial Group, to uphold a comprehensive cybersecurity program that maximizes the latest technology and emphasizes associate education and awareness.

Program Controls

Businessman working to analyze graphs and financial reports in documents and the computer.
Our cybersecurity program is based on the National Institute of Standards and Technology Cybersecurity Framework and includes policies, processes, and controls that are regularly assessed for ongoing risk. Management monitoring, external vulnerability assessment, penetration testing, ongoing risk assessment, and audits are used to control effectiveness and emerging risks. Risk remediation is prioritized through oversight from executive risk committees.

The program includes controls to prevent and correct potential issues related to:

Protecting Data and Assets

  • System configuration
  • Data encryption and classification
  • Access management
  • Physical security
  • Hardware and software inventory

Limiting Exposure

  • Records retention
  • Vendor assessments
  • Employee training

Monitoring and Responding

  • Vulnerability assessment
  • Network and systems monitoring
  • Incident response procedure

Incident Response Plan

Our cybersecurity team specializes in incident detection and response. Should a cybersecurity event occur, our Incident Response Plan, which is tested regularly, may be deployed.

Business professionals analyze data on the computer.

This Plan Outlines Our Commitment to:

  • Promptly and effectively respond to cybersecurity incidents.
  • Protect the confidentiality and privacy of associates, clients, and vendor-sensitive information.
  • Allocate appropriate resources to manage cybersecurity incidents in compliance with Fort Washington’s mission and legal obligations to its clients.
  • Manage the impact of cybersecurity incidents and minimize any damage to clients, associates, and business partners, as well as to our reputation and financial stability.

Robust Associate Training

Our associates are our first line of defense against cyberattacks. That’s why we focus on continuous cybersecurity education. Through our internal channels, we share dozens of communications about relevant industry data breaches, phishing scams, and preventive measures each year. Our associates play a significant role in the success of our risk management efforts and complete required training concerning various topics on an annual or biennial basis.

Connecting With the Cybersecurity Community

Western & Southern Financial Group developed a Security Awareness Roundtable for companies in the Greater Cincinnati region to encourage cybersecurity knowledge sharing. This group is composed of cybersecurity experts from several companies in the area. They meet on a monthly basis to share ideas, experiences, and best practices to assist in expanding security awareness and strategy.
Professional expert speaking to an audience.
Cybersecurity Experts
We partner with government organizations, like the FBI and the IRS, to host educational webinars for our associates throughout the year. Cybersecurity experts from these institutions add tremendous value to our awareness campaigns by sharing real-world examples of cybercrime and insight into potential scams.

Phishing Awareness

Phishing, which is the practice of sending fraudulent emails to an individual in an attempt to obtain confidential information, is one of the top security risks companies face today. Learn more about phishing and other common cyber scams.
Businessman declining action with a phishing email. Phishing awareness concept.
Associate Preparation
To ensure our associates are adequately prepared to recognize phishing attempts, our cybersecurity team runs periodic campaigns that send associates imitation phishing emails. The team supplements the tests with additional training, if needed. Through persistent testing, these efforts are proving beneficial.

Explore More About Cybersecurity

How Clients Can Protect Themselves

Explore tips to enhance your cybersecurity, become aware of the common scams, and learn about actions to take if you become a victim of a cyberattack.
Learn How To Protect Yourself

Cybersecurity Checklist

Defend yourself from the new risks and vulnerabilities of cyberattacks. This checklist outlines multiple strategies in several key areas to improve your cybersecurity.
Explore Cybersecurity Checklist

How Fort Washington Protects Clients

We partner with our parent company, Western & Southern Financial Group, to ensure information security is a top priority.
Learn About Client Protection
Additional resources 
To learn more about cybersecurity, how to protect yourself, or to report an issue, visit the Cybersecurity & Infrastructure Security Agency (CISA) website. CISA leads the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure.

If you identify suspicious activity or believe you are a victim of a cybersecurity attack that impacts your financial information, please contact Fort Washington at 888.244.8167. Furthermore, if you receive unusual communications identified as Fort Washington that seem fraudulent, contact us to verify the communications. If Fort Washington is unable to verify the communication or you feel certain it is fraudulent, you may file a report with the FBI using this link: Internet Crime Complaint Center(IC3) | File a Complaint
Fort Washington Investment Advisors is not liable for any data, information, or cyber threats that may affect you, based on the contents of this document. The sole purpose of this material is to inform and is not intended to be construed as cybersecurity advice. Clients should consult with cybersecurity experts before making decisions regarding the safety of their personal information.