Practically Speaking.


We can’t touch your money.

Yes, you heard us right – your money is held securely by a trusted, independent custodian, where your account is protected in strict accordance with the Securities and Exchange Commission’s rules on client assets and money.

We verify you are who you say you are.

We do this to check it is you accessing your account and no one else. Withdrawals are only allowed back into the account from which you funded the investment, inline with anti-money laundering regulations.

We are available to you, anytime you need us.

We are nationwide and online, yet our offices, people and communications are everywhere you need us. If you're ever in doubt you can get in touch anytime.

Technology.


Industry best practices

We apply current security best practice throughout all of the technology we use, the companies we choose to partner with and the way we store and transmit your data.

Secure Protocol

We force all interactions over the internet to be via a secure protocol.

Limit Access

We lock down our service so only the people and systems we trust have access to data, and only ever to the smallest amount they need.

Encrypted Data

We strongly encrypt your data as a final measure of security.

Continual Improvement

We use software and advice from security specialists to provide additional measures. Experts test our security and make recommendations on anything we can do better.

What you can do.

Security is a two way street. While we’ve put precautions in place, here are some sensible steps to follow to ensure your account remains secure.

Don't reuse passwords.  If someone gets hold of a password associated with your account from another account and you've used it on multiple websites, they can gain access.

Be cautious of emails and text scams - especially when clicking links or attachments; even those that appear to be from an organisation or person you know. Malicious links can often give hackers access to your browser and sometimes your computer or phone.

Make sure the operating systems, browser and security software you use is regularly updated to the latest versions.

Use added security measures, like two factor authentication, when you can.  Two factor authentication is turned on/off for each website or app you use, and requires you to prove your identity with your phone and your password.

Be patient!  If a website implements security procedures, like ours, we try to make them as convenient as possible for you.  And while we understand that they can feel frustrating, they are in place to help protect you!

What we think.


Security is a moving target and there is no such thing as perfect, based on how fast the industry moves. That’s why we’ve started with practical measures and backed them up with a modern, well-designed, secure cloud infrastructure. It’s also why we make sure to utilize software and expertise from security specialists and testers.
We focus on security from day one and dedicate time to it on an ongoing basis.