Barron's 4.5 Stars 2014 Open an Account Button Contact Us Login Log In Log into
 

Place Trade Strength and Security: Client Best Practices

 

 Account Protection Login Protection  Privacy  

Secure Login  Your Account  Best Practices    

  

How Can You Help to Protect Your Account?

 

Account security is our top priority and we take great lengths to ensure that your account is secure. You can help to increase your account security by following these Best Practices which may provide another layer of safety from online security threats:

 

   

Practice Safe Computing!

 

Always use the same level (at a minimum) of caution when it comes to protecting your computer as you would with your own wallet or purse! 

 

Here are a few of the minimum steps that you should take to protect your computer... Even within your own home. 

 

  • Lock your computer if you're leaving it for a period of time by setting up a password protected screensaver. Always turn off your computer when you have finished using it.
  • Avoid accessing your account from public computers which may have been targeted by hackers and keystroke-capture software. If you must use a public computer, remember the following:
    • Use the virtual keyboard on the login window to avoid having your keystrokes captured.
    • Log out after accessing your account.
    • Never leave the computer unattended while logged in.
    • Clear the browser cache after logoff so that no sensitive information remains stored on the computer.
    • Do not share files unless it's absolutely necessary. It's a smart idea to disable the Windows file and printer sharing features, but if you decide to use these, make sure that you configure the access permissions with strong passwords, and only share for specific users.
  • Pop-ups: We recommend that you turn on your pop-up blocker and set the filter to the highest possible level. Then either add the PT web site to your list of "trusted" sites, or disable your pop-up blocker while using this site.
  • Regularly check for security updates and patches for your operating system and use the most current version of your browser.
  • Run your updated security software regularly (at least once a week). You could own the best security software on the market however it is completely worthless if you do not use it. 
  • Use email safely, and delete messages that don't originate from a trusted source as they may contain harmful attachments or may be an attempt to fraudulently obtain sensitive information. Turn off the "preview pane" in your email system as this function can allow some viruses to be executed even if you never open the email.

 

 

Create a Strong Password

 

  • Use the maximum characters available and avoid simple or duplicate alphabetic and numeric sequences or passwords containing personal information.
  • Do not use common words that can be found in the dictionary (in any language) as hackers have software that can easily detect these words and access your passwords. At a minimum you should replace similar looking numbers and letters;
  • Do not share your password with anyone.
  • Change your password frequently and do not use the same password for multiple systems.
  • Do not leave notes on your monitor, keyboard or desk to help you remember your passwords.
  • Do not enable any application features that would automatically log you in or pre-fill the username or password fields.
 

 

     
 

Would you ever knowingly leave your wallet or purse alone in a public place?

If you are not fully protecting your computer you may be doing exactly that without even realizing it!

Please keep in mind that even if you have software on your computer, that is meant to protect against malicious and unscrupulous attacks, if you do not update it AND USE it regularly you may not be protected! 

 
     

   

Install, Update and USE Security Software


Use/install security tools as noted below:

  • You should install both a hardware and software Internet firewall on your computer to control the flow of traffic to your computer. This is especially important if you are operating with a broadband connection and therefore maintaining continuous Internet access.
  • Use antivirus software to identify and eliminate viruses you may have downloaded to your computer accidentally. As new viruses are constantly being created, you need to update your antivirus software regularly.
  • Use anti-spyware software to detect and remove spyware programs which can collect various types of personal information, monitor your browsing activity and interfere with the control of your computer.

 


Monitor Your Account

 

  • Regularly check your account balances and positions through TWS and the daily statements available in Account Management.
  • Immediately report anything suspicious toll free in the US at 1-800-50-5227 or direct at 919-719-7200.

 


Maintain Accurate Account Information

In the event that we detect unusual or suspicious activity relating to your account, being able to contact you is essential. Accordingly, you should always ensure that the contact information you have provided (e.g., telephone numbers, email address) remains accurate. To update any personal information, please log into Account Management and select the Manage Account and then User Information menu options.

If you believe that your account has been compromised, you should notify us immediately via our toll free number 1-800-50-5227 or directly to our clearing firm at 1–877-442-2757.

 

     
 

That was easy! 

Did you know that you can pick up a virus as easily as watching on a video online? One innocent click and you may have opened your world up to cyberspace where cyber criminals can access your personal information including your passwords (as you type them), your files, pictures and nearly anything that you have or do online including accessing as well as using your personal accounts as if they were you.

Do not give cyber criminals the keys to your world! Protect yourself every day!

 
     

 

 

 


 

 
 

  

It is Important to Understand and Defend Against Threats

 

 

 

Spyware 

 

 

Phishing

 

 

Viruses, Worms & Trojan Horses

 
 

 

This refers to software inadvertently downloaded from the Internet when you visit certain websites. Spyware covertly gathers information from your computer without your knowledge. Once installed, spyware monitors user activity on the Internet and transmits that information (including usernames and passwords) to an unauthorized recipient. You should install anti-spyware software on your computer to detect and remove spyware.

 

Spoofing

Hackers will send an email using what looks like a valid email address of someone that you know or a business that you may (or may not) actually work with that looks completely legitimate yet has nothing to do with the person or company showing in the email. You should run your anti-spyware / anti-virus software on your computer often because even if you do not open spoofing and phishing emails or click on their links, if the related email is still in your email account it may still impact your system.

 

 

 

Thieves use "phishing" to obtain sensitive information by masquerading as a trustworthy institutions or even your friends. They will copy company logos and even your address book to send phony emails to unsuspecting individuals. Most likely you have seen these types of emails before coming from what appear to be your friends' accounts however you may not immediately realize when a company has been "spoofed" because hackers work very hard to fool you.

Phishing is typically carried out via an email that contains a link to what appears to be an authentic website. These counterfeit sites prompt you to enter your personal information, which the thieves then use to access your accounts. 

Please note that Place Trade will never send an email requesting sensitive information such as your password or social security number. If you receive a suspicious email which identifies itself as originating from either Place Trade or our clearing firm (IB) do not respond, and immediately notify our security team by calling toll-free in the US at (800) 50-PLACE or direct at  919-719-7200. 

 

 

 

These malicious programs can cause severe and irreparable damage to your hardware, software or files, and in some cases can open your system to unauthorized access and possibly allow confidential information to be compromised.

These programs, which differ on how they spread and replicate, are best controlled by first ensuring that your operating system is up-to-date and then installing anti-virus software, making sure that you frequently download updates to obtain the latest fixes. 

 

  

  

 

 

 

 

 

 

 

 


 


For further information about securing your home computer and protecting your privacy see:

 

  CERT® Coordination Center Home Network Security   Security Focus - Securing Privacy Part Three: Email Issues
       
  Security Focus - Securing Privacy, Part One: Hardware Issues   Security Focus - Securing Privacy Part Four: Internet Issues
       
  Security Focus - Securing Privacy, Part Two: Software Issues    
 

 


 

 

Always be vigilant when it comes to your security!

Never, ever assume that hackers will not be interested in your computer, cell phones, printers or other electronic devices (including as far as baby monitors) because knowing that so many people assume they are not a target is exactly why the hackers know that you may be the perfect target! 



 

s5box


Learn more about retirement planning by visiting some of the links below:

Roth IRA

SEP IRA

SIMPLE IRA

Traditional IRA

Qualified Plans

Rollover IRAs

Find out how Place Trade can help you get the most out of your college planning by visiting some of the links below:


Coverdell ESA

529 College Savings Plans

UGMA/UTMA Accounts