logo

Online Security

Last Updated: November 2024

Be aware of potential threats, steps you can take to protect yourself, staying informed and reporting Fraud or Suspicious Activity to Seedvest.

At Seedvest, the security of our client’s information is paramount. As part of our Information Security Program, we employ technology and processes to protect our clients’ information. However, there are steps you can take to help further protect your information.

The purpose of this page is to provide you with suggestions regarding actions that you can take to ensure the protection of your information.

Be aware of potential threats

To protect your information, it is important to be vigilant to the potential threats that exist today. Cyber criminals looking to obtain confidential and/or personal information from an individual or company often employ deceptive techniques to “trick” people into readily handing over such information (i.e., phishing) or unwittingly opening themselves up for security attacks (i.e., spoofing). These techniques can include, but are not limited to, emails appearing to be from legitimate sources, internet “pop-ups”, and online advertisements hiding malicious viruses or malware, fake websites, etc.

In today’s world, it is critical to be cautious when accessing and sharing your personal and confidential information online and in your daily interactions. The following are some important considerations to be mindful of while performing your daily business and personal routines:

Steps you can take to protect yourself

In addition to being aware of potential online security threats, there are several steps that can be taken to enhance the security of computer, network or personal devices. Below are some points to consider for protecting the integrity of personal and confidential information on these devices. For additional information, please refer to the Stay Informed section below.

For all internet-capable devices, refer to your device's security protocols for a complete list of security related options, and consider the following:

Securing the Computer

Securing Wireless Networks

Securing Personal and Confidential Information

Securing Mobile Devices

Stay Informed

Reporting Fraud or suspicious activity to Seedvest

If you have a question regarding any Seedvest correspondence, or suspect any suspicious or fraudulent activity, please contact us by calling your Seedvest Relationship Manager directly or reaching us through email publicrelations@seedvests.com.