Cybersecurity and fraud continue to be a top priority in the financial industry. As hackers become more sophisticated with their tactics, our methods of protecting your information must evolve.
What We Do:
We are committed to putting your interest first, which includes safeguarding your information. We use a third-party Information Technology (IT) team to implement a vulnerability management plan, perform daily data backups, and monitor as well as restrict the ability to transmit unencrypted confidential information. Our IT provider also helps ensure our firewalls and anti-virus software are up-to-date so your information is protected.
We have worked extensively on a Cybersecurity Plan that helps drive our efforts to assess, manage and mitigate threats. As part of our plan, we conduct periodic cybersecurity risk assessments of vendors and other third parties with access to the firm’s networks, client data or other sensitive information.
We have strict internal policies and procedures in place. We require quarterly employee training and participate in quarterly phishing campaigns. We utilize a secure email system whenever we send client-sensitive information electronically. Multifactor authentication is required in the office and from remote locations. All paper-based documentation containing client non-public information must be stored in a secure location, and information housed electronically is encrypted and available only to those who need to service your account. Sharing your information with a third party requires your approval. If you request a financial transaction, a password reset or an address change via email, expect a phone call from one of our associates verifying it was actually you who made the request.
What You Can Do:
Protecting yourself from cybercrime can seem daunting, so we’ve compiled a list of things that you can do to help protect your information from being compromised.
- Be aware of unsecured wireless networks. Rather, consider creating a personal Wi-Fi hotspot to connect your laptop to your mobile phone’s cellular signal.
- Don’t click on a link if you aren’t confident it is from a trusted site. Security breaches of ten occur because people click on bad links in phishing emails. Criminals create a tailored scam that looks legitimate, including calling you by name.
- Create strong passwords that contain a combination of upper- and lowercase letters as well as numbers and symbols. Keep your login IDs and passwords confidential. Create different passwords for each website and change them periodically.
- Never write down or share passwords. Remembering many complex passwords may be difficult. Some people find a password manager program or app helpful. While it is possible for a master password to be compromised, many users choose this solution because there is only one password to remember.
- Do not send personal, non-public information via email that is not secure.
- If you suspect your email has been hacked or compromised, act sooner than later. Report the issue to the necessary institutions, run an antivirus/ antispyware system scan, change your passwords and email addresses, and visit ftc.gov to report identity theft. The sooner the issue is reported, the greater the likelihood of a potential recovery.
We work closely with our IT team and our custodian to develop a strong culture of risk management. Helping protect your investments is part of what we do—helping protect your identity and financial information is also high on our list. Should you suspect your information has been compromised, call us. We are here to help.