Security Procedures

Processes that keep your investments safe

Our security procedures have been carefully designed, tested, and implemented to ensure the safety of your account, personal information, and financial assets.

Our Systems

  • We utilize advanced firewalls to keep unauthorized parties from gaining access to your personal information, as well as anomaly detection and intrusion detection technology to alert us to unusual behavior in your account.
  • Firewalls keep our public web servers separate from the servers that contain your account and personal data, so they can't be accessed directly from the Internet.
  • Our secure website uses 128-bit encryption on the transmission of all data transmitted between our website and your computer.

Our Policies

  • We will never send you an email requesting your account number, UserID, PIN, Password, or other personal information.
  • We require clients to create unique UserIDs and alphanumeric passwords to log on to the secure website.
  • We allow you to log in using your password and a one-time-use security code sent to your phone via text message.
  • We ask you to select four security questions to answer, to be presented to you when it seems an extra check of your identity is warranted, creating an extra layer of security for your account.
  • Internally, access to client information is limited by a well-established computer security approach called "least privilege access" and is firewall-controlled.
  • Our employees are thoroughly trained in our policies and how to uphold them.
  • If we detect suspicious activity in your account, we'll block access until you call us. We do this to validate that the account activity was intended by you, and to protect you in case it was not.
  • Our privacy policy reflects the standards we adhere to.
  • The Asset Protection Guarantee protects your assets in case of unauthorized activity. Learn more.

Our Partners

We partner with leading firms in the security industry to bring you security products to protect your system and your identity.

\\