GK8 by Galaxy The future of finance: Transforming finance in the digital age

The 5 Main Challenges When Adopting A Custody Solution—And What To Do

Lior Lamesh breaks down the digital custody technology evaluation process into five clear steps for making an informed decision.

by Lior Lamesh, Forbes Councils Member

The adoption of custody solutions is no longer a niche consideration; it’s rapidly becoming a cornerstone for financial institutions navigating the digital asset space. With more organizations entering the ecosystem and more favorable regulations expected under President Trump’s administration, the urgency to adopt effective custody solutions has never been greater.

As I meet daily with leaders in the digital asset divisions of financial institutions, I hear their concerns firsthand. Whether it’s frustration with the limitations of an existing solution, or uncertainty about selecting the right provider, the challenges are real and often daunting. Institutions face high stakes: safeguarding billions in assets, meeting compliance requirements and maintaining operational efficiency in a fast-evolving landscape.

In this article, I aim to share insights into five critical challenges institutions face when adopting custody technology and offer actionable strategies to address them effectively. Whether you’re deep into implementation or just starting your journey, these considerations can help you overcome the complexities ahead.

1. Protecting Digital Assets: Meet Industry Standards

The security of private keys is paramount. Private keys are the means for institutions to move assets, interact with smart contracts, earn yield through staking and tokenize or manage assets. This immense utility makes their protection critical, as mismanagement or breaches can lead to catastrophic financial loss and eroded trust among clients and stakeholders. Only recently we have seen the result of the massive Bybit hack instill uncertainty and damage consumer confidence. (For a look at the root causes of that hack and ways to prevent it happening again watch GK8’s webinar.)

To tackle this challenge you need to choose custody solutions that meet stringent security criteria, with a proven zero-hack record. Prioritize certifications like ISO 27001 and SOC 2, and opt for Impenetrable Custody, fully disconnected from the internet, even when data from the blockchain is required, to eliminate network-based attack vectors, including man-in-the-middle attacks.

For daily operations and money movement, advanced cryptographic tools like Multi-Party Computation (MPC) can eliminate single points of failure by distributing key control across multiple entities. However, be mindful of the risks associated with online solutions like MPC. Regular security audits, penetration testing and robust recovery protocols are essential to ensure resilience against evolving threats.

For institutions with existing custody solutions, implementing a secondary solution adds an extra layer of protection and further reduces risk.

2. Preventing Internal Fraud: Enforce The Right Controls

I often hear from clients who say that without robust governance, it’s challenging to define and enforce who can access funds, approve transactions or modify security settings. This lack of control creates vulnerabilities, leaving assets—and reputations—at risk. A notorious example is the Mt. Gox breach of 2014, where inadequate security measures, such as a flawed wallet system, allowed hackers to exploit vulnerabilities over time. Initially, the CEO was seen as the victim, but he was later arrested and convicted of data manipulation and falsification of records for his role in the hack.

To mitigate such risks, ensure your custody platform includes advanced policy engines that allow granular control over asset access and transaction approvals. Define clear rules, including multi-step approval processes and user-specific access privileges tailored to operational needs. Your custody solution must also provide full autonomy over policy configurations, ensuring only authorized personnel can adapt governance as your organization evolves—no exceptions, not even for the tech vendor. These measures safeguard against both deliberate fraud and accidental breaches and should remain non-negotiable standards.

3. Detecting Bad Actors: Prevent Illicit Asset Movement

Financial institutions must meet stringent Anti-Money Laundering (AML) and Know Your Customer (KYC) requirements. Regulators demand the ability to identify, freeze, or block assets linked to bad actors in real time. Without the right tools, institutions risk regulatory penalties and reputational damage for failing to prevent illicit activities.

Adopt custody solutions equipped with integrated compliance tools that provide real-time monitoring and reporting capabilities. These tools enable institutions to flag suspicious activity promptly, ensuring compliance with global and jurisdiction-specific regulations.

Moreover, solutions with customizable features supporting compliance efforts ensure adaptability to evolving regulations and organizational needs.

4. Future-Proofing Custody

Financial institutions today need custody solutions that extend beyond secure storage. To stay competitive, you have to support diverse token types, access staking and DeFi opportunities for yield generation and enable on- and off-ramping for fiat currencies.

To take your custody services to the next level, extensive coin coverage and the ability to support emerging blockchain networks are prominent. Ensure your custody solution offers staking tools and access to DeFi protocols, to generate yield and manage liquidity effectively.

Additionally, prioritize platforms with exchange integration, enabling smooth fiat-to-crypto conversions.

5. Overcoming Legacy System Challenges

For many financial institutions, the integration of digital asset custody solutions is hampered by outdated billing systems that were never designed to handle this new asset class. These systems often lack the flexibility to accommodate digital asset workflows, forcing institutions to implement custody solutions as standalone systems. This creates synchronization issues, inefficiencies in operations, and significant challenges in generating accurate, consolidated reports.

It’s crucial that you choose custody solutions that can integrate seamlessly with existing IT infrastructure. One key capability to prioritize is compatibility with Active Directory and other widely used user management systems in the financial sector. By supporting such systems, custody solutions can ensure that user data remains synchronized in real time, simplifying access control, improving reporting accuracy and reducing administrative overhead.

Solutions that integrate with banking systems not only ease deployment but also help institutions maintain operational efficiency while future-proofing their digital asset strategies.

To summarize, choosing the right custody solution isn’t just about ticking boxes—it’s about securing your institution’s future in an evolving digital landscape. Asking the tough questions upfront isn’t a chore; it’s an investment in clarity and control. The best provider will do more than meet your needs—they’ll anticipate them, balancing cutting-edge security with seamless integration and rock-solid governance. By making these priorities non-negotiable, you’re not just managing digital assets—you’re building a foundation for growth and innovation in a world that never stands still.

A version of this article was originally published by Forbes.com.

Continue reading

GK8 Joins Forces With CaixaBank as Part of Its Innovation Program

GK8, a cybersecurity company that offers an enterprise-grade custody solution for managing and safeguarding digital assets, was selected from more than 200 companies and 28 countries by CaixaBank, the leading financial group […]

Threat Analysis: What you need to know about crypto hacking

As economic wealth becomes more digital, leading financial institutions have listened to investors and market forces and now manage vast amounts of digital currency for themselves and others, using blockchain transactions.

5 Common Cold Wallet Myths (or: Why There’s No Real Cold Wallet Out There)

There seems to be some heated debate in the blockchain world between cold and hot wallets. Cold wallets are thought to be more secure but require processing any transaction manually, while hot […]