Partnering with you to protect your digital information.

At Wealth Enhancement Group, safeguarding your digital account information is at the forefront of our operational design and delivery.

How We Protect Your Digital Information

To protect your information and assets, Wealth Enhancement deploys several security measures, including consistent education and regular tech-based updates. Our team actively reviews and modifies our policies and procedures to respond to new threats and to adapt to changes in technology. While it's inadvisable to fully disclose all we do to protect the personally identifiable information (PII) of our clients, here are just a few measures we take:

Privacy Policies


Employee Policies & Procedures

  • Two-factor or multi-factor authentication is required for all employees to log in to core systems.
  • Limited Access Policy helps ensure client data is only accessible by those who need it.
  • Client PII is either encrypted or utilizes other compensating controls throughout our core systems to protect your data.
  • Regular vulnerability assessments are performed to ascertain and patch any potential weaknesses.
  • Annual mandatory cybersecurity training and providing frequent security awareness for all employees.


Client Policies & Procedures

  • Wealth Enhancement Client Portal requires two-factor authentication.
  • Secure messaging and file transfer is available through the Wealth Enhancement Client Portal.
  • Verbal confirmation of instructions is provided.


Custodial Partnerships

  • We communicate with our custodial partners using TLS encryption.
  • Several of these custodians offer guarantees to cover losses due to unauthorized activity.
  • Schwab Security Guarantee covers losses due to unauthorized activity.
  • Fidelity Customer Protection Guarantee reimburses for losses from unauthorized activity in Covered Accounts occurring through no fault of your own.

How You Can Protect Yourself

You are a critical part of helping us protect your data. Learning cybersecurity best practices and remaining vigilant against cybersecurity threats can help you protect yourself. Read on to acquaint yourself with some best practices:

 

Use Strong Passwords/Passphrases

  • Strong passwords have 16+ characters, contain words not found in the dictionary, and use a combination of numbers and non-letter characters. A phrase only you would know ensures you do not have to write it down.
  • Aim to have different passwords for all your accounts. Password vaults can help with generating complex, unique passwords and tracking your passwords by providing another layer of security.
  • Use two-factor or multi-factor authentication like an authenticator application or SMS (text messages) to provide another layer of protection.
     

Know Common Traits of Phishing Emails

  • How to Protect Yourself Against Email Scams provides a good example of phishing emails.
  • One of the most common scams looks like a package delivery notification from recognizable and trusted brands like FedEx or UPS; other common scams appear to come from trusted financial institutions like your bank, brokerage firm or financial advisor.
  • Email text contains misspellings and/or bad grammar
  • Email domains do not match (e.g. login-bank[.].com, secure-google-login[.].com)
     

Steps to Take if You Suspect Phishing:

  • Instead of clicking on links in emails, try typing the address directly into your browser. This will help further protect you from fraudulent links and phishing attempts.
  • Never open an email attachment unless it comes from a trusted source.
  • Be suspicious of emails that claim you must click, call, or open an attachment immediately.
     

Know Common Traits of Smishing (SMS Phishing)

  • A fraudulent message sent to your SMS number with an enticing offering or an urgent alert about your financial services or other sensitive information
  • A congratulatory message with a link or a phone number to obtain your prize
  • Messages sent at unusual times, as legitimate organizations will send a text during normal business hours
     

Steps to Take if You Suspect Smishing:

  • Call the company directly from their official website rather than the one provided to you via SMS.
  • Never click unsolicited text links.
  • Report smishing attempts to your financial institution.
     

Know Common Traits of Verbal Social Engineering (Vishing or Voice Phishing)

  • Fraudulent phone calls to trick victims into providing sensitive information
  • Threats of immediate account closures, legal action, or arrest
  • Promises of large rewards
     

Steps to Take if You Suspect Verbal Social Engineering:

  • Avoid answering unsolicited calls and calls from unknown numbers.
  • Hang up the moment you feel suspicious of the caller.
  • Never share sensitive data over the phone.
  • Ask for proof of identity.
     

Be Suspicious of Any Unsolicited Request for Personal Information

  • Don't give out personal information through any channel (phone, email or otherwise) unless you've initiated the contact and have confirmed you know the other party.
  • Do not transfer funds without calling a known telephone number on file (not the number the solicitor provides).
  • If you receive an unsolicited request related to your Wealth Enhancement account, contact your financial advisor right away via phone or secure message.
     

Email Is Not Secure

  • Email is transmitted in clear text. You should expect that anything you send via email could be read by unauthorized parties.
  • Never send personal information via email to anyone.
  • Never request financial transactions via email.Always use verbal communication or secure messaging provided by your financial institution, bank, financial advisor, etc.