Smith Wealth Smith Wealth

Online Security and What You Need to Know

As email becomes the way we communicate in our personal and business lives, it is important to consider the security of your email and ways to protect your online identity.

A client of Smith Wealth Partners recently had their email hacked and a request for a withdrawal of a large sum was sent to our office from their email account. We responded to this email with further questions regarding the withdrawal, and just as suspicions were being raised, we received a phone call from our client who was holidaying in London, who advised us they had been hacked!

Smith Wealth Partners and our business partners all have security measures in place to ensure that you and your accounts are protected from scams. For example, all Asgard Super, Investment and Allocated Pensions need to have a nominated bank account linked to the account, before a withdrawal can be processed. This requires you to sign an original nominated bank account form and post with certified ID to the Asgard offices before the nominated bank account will be linked to your account. This can be frustrating for some clients as it can sometimes delay the process, but these procedures are in place to protect you and your money!

Although the scammers attempts in this case were futile (due to the nominated bank account procedures), it was still an eye opening situation.

We have included a few tips below to protect your online security:

1. Use cryptic passwords that can’t be easily guessed, and protect your passwords.

2. Beware of scams.

3. Protect information when using the Internet and email.

4. Make sure your computer is protected with anti-virus and all necessary security “patches” and updates.

5. Secure laptop computers and mobile devices at all times: Lock them up or carry them with you.

6. Shut down, lock, log off, or put your computer and other devices to sleep before leaving them unattended, and make sure they require a secure password to start up or wake-up.

7. Protect information on portable and mobile devices.

8. Don’t install or download unknown or unsolicited programs/apps.

9. Make backup copies of files or data you are not willing to lose.

10. Remove applications and programs you never use.


Share this post

← Back to all posts