Data Security at Independent Financial Partners

As a financial Broker Dealer, information security is our foremost concern.

01

Information Security Program

Our Cyber Security Team is continuously evaluating ways to improve the security and safety of our firms data and PII.  Our Cyber policies and procedures are shared with all employees.

Legal

Privacy Policy

02

Internal Security Measures

Personnel Security
We conduct comprehensive background checks on new hires, including employment verification and criminal checks for U.S. employees.

Identity and Access Management
All employees are assigned unique login IDs, with access determined by their job functions.

Encryption
Our laptops, and desktops, are managed, have encrypted hard drives, and are monitored with Endpoint Detection and Response.

Access to Data
Access to client data is limited to authorized individuals who require it for their job.  There are no corporate resources or additional privileges from being on our network.

Passwords
Password complexity policies are designed to deter unauthorized users by increasing the number of possible passwords. The IFP password complexity policy is enforced, and new passwords must meet strict guidelines. We also utilize Multi-factor Authentication.

Physical Security
Our home office utilizes a keycard access system for all doors.  We have a Security camera system that observes and captures all internal movement and doors.

Network Security
Our internal data network is located inside a locked computer room. We use several in-depth measures and practices to secure the network.

Security Awareness
All our employees upon hire receive security awareness training and have to complete awareness courses throughout the year.

Independent Assessments
An external firm conducts annual cybersecurity assessments, including penetration testing and vulnerability scanning.

Proactive Security Monitoring
We use various cyber applications to monitor data traffic, emphasizing cybersecurity monitoring.

Cyber Insurance

Incident Response
Our Cyber Security Team is prepared with an Incident Response Plan for any security issues involving PII, data, or client concerns.

03

Best Practices

Below are some best practices that you can use to help protect yourself from becoming a victim of a Cyber hack.

  • Create a complex password for your account.  It should consist of upper case, lower case, numbers, and special characters.
  • Utilize Multi-Factor Authentication where possible.
  • Never click on suspicious link.
04

Contact

For questions or further information, please contact us.