Discover the latest TIAA thinking on other retirement topics.

Explore our insights

TIAA TMRW

Big ideas. Better retirements.

Safeguard retirement plans from cyberattacks

Recordkeepers and other service providers are expected to protect retirement plan assets, access, and data—but that doesn’t mean employers are off the hook.

Time to read: 6 minutes

Key takeaways

  • Americans lost a record $16.6 billion due to cyberattacks in 2024. Criminals are increasingly targeting retirement plans for their vast personal and financial data.
  • Regulators say employers are accountable for retirement plan cybersecurity, but it’s far from a solo effort. Vendors play a critical role helping employers put the right protections in place.
  • Why this matters: Because retirement savings is often employees’ primary source of wealth, employers have not only a fiduciary responsibility but a moral one to protect the plan—and everyone needs to do their part.

IN MID-2023, a major data breach rocked the retirement plan industry. Hackers targeted a widely used file transfer application called MOVEit, exploiting a software vulnerability to access participant data. Names, Social Security numbers, and account information from multiple recordkeepers fell into hackers’ hands, who held it for ransom, threatening to release the data broadly if they weren’t paid off.

Considered a “hydra-headed” breach, the effects rippled across digital supply chains, hitting several key vendors. The effects were immediate and far-reaching: The personal information of more than 80 million people at over 2,500 organizations was compromised, and access to retirement plans went down in multiple states.1 Harder to measure is the loss of trust by hardworking employees and damage to the reputations of employers and the companies entrusted to help manage their plans.

The MOVEit breach was a wake-up call for many organizations with retirement plans. Employers typically outsource plan administration, but under ERISA, they still have a fiduciary duty to manage their plans for the benefit of employees and participants. And based on the latest guidance from the U.S. Department of Labor (DOL), that includes getting serious about safeguarding their plans against cybersecurity risks.

The cyberthreat landscape

While MOVEit was stunning in its scope, it was hardly an isolated incident. In its 2025 Data Breach Investigations Report, Verizon Business reported more than 1,500 confirmed breaches involving data disclosures in the health care industry, 900 in the financial and insurance industries, and about 850 in education.2 The FBI cited a record $16.6 billion in losses nationwide reported to them in their 2024 Internet Crime Report.3

A “hydra-headed” breach describes an attack that targets multiple systems or vendors at once, spreading rapidly and triggering widespread damage.

“Personal data is extremely attractive to hackers,” says Ron Barthel, an information security expert at TIAA. “It can be sold, used to steal identities, or held to extort ransom from employers.” Another target is the money itself; criminals will attempt to defraud participants directly by duping them into transferring their funds into accounts controlled by the bad actors. Finally, disrupting system availability can be a hacker’s primary goal—because a downed system can be used to extort ransom from an employer—not just the byproduct of a data hack. Barthel says systems can be compromised on a limited or industry-wide scale: “When criminals attack a supplier all recordkeepers rely on, suddenly you’ve got millions of participants who can’t log in to their retirement accounts.”

Any of these attacks puts participants at risk for identity theft, and they can lose years of savings if they’re defrauded. As plan fiduciaries, employers may face lawsuits for breaches if they don’t have an adequate cybersecurity program for their retirement plan. Big data breaches can also attract the attention of the media, damaging the organization’s reputation.

Losses upon losses

As cyber losses grow, no industry goes untouched. In 2024 alone:

  • $16.6B total losses nationwide
  • 1,500 breaches in health care
  • 900 breaches in the financial and insurance industries
  • 850 breaches in education

Sources: Verizon Business, April 2025; FBI, April 2025

Cyberattacks in 2024 cost U.S. citizens a record $16.6 billion. More than 900 attacked financial and insurance companies, 850 education, and 1,500 health care organizations.

Who owns retirement plan cybersecurity? A cyber chain of custody

Employers and plan sponsors may see the onus for retirement plan security as largely falling on vendors, but effective cybersecurity is a team sport, says Barthel. If plan data is a football that gets passed between many players—including recordkeepers, third-party administrators (TPAs), and custodians—there are lots of opportunities for a fumble, and any point of failure can lead to a catastrophe without effective protocols in place.

The buck stops with the employer, who’s responsible for hiring vendors and assessing their cybersecurity practices on a recurring basis. But retirement plan committees may not even know all the questions they should ask or have the expertise to thoroughly vet them in the first place.

To provide a framework for combating these threats—and signal how seriously they take it from a regulatory perspective—the DOL issued guidance that includes a 12-point list of Cybersecurity Program Best Practices. The guidance, issued in 2021 and further clarified in 2024, applies to ERISA-covered retirement plans as well as health and welfare plans. Some recommendations, like documenting a cybersecurity program, apply to both employers and service providers. Others are primarily relevant for service providers. But as the party responsible for hiring and overseeing them—and as the party ultimately accountable for the retirement plan—employers benefit from being well-versed in all of them.

Building a retirement plan cybersecurity program

The idea of tackling cybersecurity can feel daunting to employers with a lot on their plates and not enough resources. Barthel encourages a crawl, walk, run approach. At the minimum level, he says plan committees need to talk to their service providers and do basic due diligence at least once a year, “because the landscape is always changing.” The next level requires plan sponsors to dive deeply into the DOL recommendations with all plan vendors and make sure they’re fully covering all the bases. But he notes committees without IT representation may struggle: “Committees typically include human resources personnel, perhaps economics experts, and an investment officer—and that’s at bigger organizations—but there's no one there from tech or security. ‘Walking fast’ would have tech be part of the conversation.”

For a deeper dive into digital fraud, see Retirement in the age of cyberscams

In the optimal state, Barthel sees “running” employers as those whose chief information security officer (CISO) meets with plan service providers on a recurring basis. The CISO will know the probing questions to ask and be able to assess whether providers, contracts, and financial guarantees in the event of a breach are meeting minimum standards. They’ll also have the experience to identify what the plan could be doing better on the security front.

It’s also key for employers to educate participants on cybersecurity and fraud awareness, Barthel adds. When doing so, they need to consider their entire participant base—not just active employees. He cautions that many companies drop the ball on including those who have retired, which “can result in retirees and older adults being more susceptible to cyber and fraud attacks.” As a recordkeeper, TIAA supports these efforts with quarterly participant emails to educate and raise awareness about cybersecurity threats, and maintains a Security Center with relevant content participants can explore.

Kara Speciale, CISO at Children’s Mercy, a Kansas City, Mo., pediatric hospital, says that to make cybersecurity training stick, persistence and variety are key because not everyone absorbs information the same way: “Some people want something in writing they can read on their own time. Others want to watch a funny training video.”

Proactive cybersecurity measures are half the battle

Safeguarding a retirement plan is like strengthening a fortress: Recordkeepers and third-party service providers build and guard the walls, but employers must coordinate the defense. Even the best preparation can’t guarantee a breach won’t occur, but with vigilant vendor vetting and oversight, participant engagement, and proactive cybersecurity planning, you can sleep better at night knowing you’ve turned your plan into a well-guarded stronghold.

Retirement plan cybersecurity: steps employers can take

  1. Vet cybersecurity vendors before you hire. Ask service providers about their risk assessments, audit results, penetration testing outcomes, and breach history. Verify their data-handling protocols are up to snuff.
  2. Review cybersecurity contracts. Make sure each vendor’s timeline for issuing breach notifications is spelled out and that they carry adequate cyber insurance. Require remediation plans and third-party audits.
  3. Monitor cyber efforts regularly. Meet with vendors at least once a year for detailed cybersecurity updates and discussions. Include your technology team at the table.
  4. Patch your own cyber gaps. Ensure strong system access controls are in place. Train your team and participants regularly on cybersecurity awareness and what to do when they spot threats. Make a breach action plan. And be sure to write down and formally document your cybersecurity program.

Next article

New treatments for health care’s talent shortage

Health care institutions are creating new talent recruitment and retention strategies, which are helping reduce turnover and spark passion.

Read more Explore Edition 6
A help wanted sign is posted on the doors to an emergency room.

Like what you read?
Get more retirement insights.

Sign up

4743248