Financial Architects - July 2019

Take A Break

Keeping Your Data Safe

At Financial Architects, we take cyber security very seriously. Our digital communications with clients often contain sensitive information, and we take every precaution to ensure these details remain private. We work closely with our broker/dealer, The O.N. Equity Sales Company, to ensure that all sensitive and personal information is protected. Email correspondence containing personal information is encrypted, and any emails sent from Financial Architects associates to non-encrypted servers go through a web portal called Smarsh. The receiver will be notified in their regular email address and required to set up a username and password to collect the email within the encrypted Smarsh system. If you use web- based services, such as gmail.com, that offer automatic encryption, you will not need to go through the Smarsh Web Portal. BUT YOU CAN STILL BE AT RISK Of course, sensitive files stored on your computer are still vulnerable to spyware snooping and ransomware attacks. Hackers often target personal devices for these cybercrimes, since they assume individuals will be less cautious and less equipped to fight them off than a financial firm. Statistically, they aren’t wrong — a 2016 survey from BakerHostetler found that nearly a quarter of all security breaches are caused by people making mistakes with their security. Here’s what you can do to avoid these pitfalls. KEEP SOFTWARE UP TO DATE Constantly downloading updates for your operating system and other software may get annoying, but it’s the best way to stay a step ahead of hackers. BACKUP DATA Ransomware and malware are designed to corrupt or delete your files, so keeping multiple copies on several devices is a great failsafe. Experts recommend keeping three different copies of important documents stored on different devices and in cloud storage. FIREWALL AND ANTIVIRUS PROGRAMS Often used interchangeably, these types of security software serve a complementary purpose. Firewalls screen traffic from the internet attempting to gain access to your device, cutting off potential threats. Antivirus software counteracts malware that does manage to find its way onto your device. You should use both of these tools while browsing the web. Communication is a two-way street and so is keeping that communication secure. Together, we can ensure your Financial Architect can give you all the personalized advice you need without putting your data at risk.

Solution on Page 4

PALEO TOMATO BASIL SALAD

The main course on the Fourth of July almost always works with paleo diets, but that isn’t always the case with sides and appetizers. This salad offers a great way to enjoy some paleo fare without having to resort to only eating grilled meats.

INGREDIENTS • 1 small shallot, thinly sliced • 4–5 medium

• 1 tbsp aged

balsamic vinegar • 1 tbsp extra-virgin olive oil • Salt and pepper, to taste

tomatoes, preferably heirloom, seeded and cut into wedges

• 6–10 medium basil leaves, cut into ribbons

DIRECTIONS

1. Place shallots in balsamic vinegar for 15 minutes. Drain and pat dry using paper towels. 2. Assemble tomatoes on a plate, top with basil and shallots, and season with salt and pepper. 3. Drizzle olive oil over top of salad and serve immediately.

Inspired by Nom Nom Paleo

3 888-466-5453

Made with FlippingBook - Online catalogs