At Winthrop, we help our clients live life in the moment while boldly exploring and imagining possibilities for their future. Our approach enables us to explore every aspect of your life so that we can design a big-picture plan and investment solutions that balance practicality with opportunity.
Whoever you are, and wherever you are on your journey, our multi-generational team has all the tools and experience to help you pursue your financial goals—and live your life to the fullest.
From fast-growing startups and closely held family businesses to multi-generational enterprises, we will help empower you to operate more efficiently day-to-day, while laying a foundation for navigating the future.
We work closely and collaboratively with our endowment and non-profit clients to provide investment programs and hands-on portfolio management services pursuing global opportunities while seeking to ensure alignment with key business objectives.
We’re committed to seeking out and sharing the trends influencing markets and the outlooks that might inform our investment approach. In an industry like ours, being open to multiple viewpoints and fresh perspectives is a critical part of how we add value, and help our clients imagine all the possibilities.
In the world of finance, things change fast and there’s always more to learn. We’ve created a series of tools that will help you stay educated and keep you informed about the things that matter most.
Perspectives | October 17, 2022
Identity theft compromises the personal data of millions of Americans every year. There are steps you can take to minimize your online risk and protect your sensitive data from cyber-attacks.
Identity theft is a growing concern that impacts millions of Americans every year. According to a recent study, 11 more than 14 million Americans fell victim to online theft in 2018, with 23% of those incurring unreimbursed personal expenses, up three-fold from just two years prior.
Identity theft occurs when a thief obtains your personal information — account numbers, Social Security number, personal ID and password, banking information — and uses that information to commit fraud. They can use that information to steal money from your accounts, take out credit cards or obtain loans in your name, and commit various other types of financial fraud.
Thieves can steal your personal information both offline and online, and their attacks are growing increasingly sophisticated, making them more difficult to identify and prevent.
Cyber-attacks continue to dominate news headlines and have been responsible for compromising the data of millions of Americans. There are two primary methods that cyber thieves use to steal personal information — social engineering and phishing.
Social engineering happens when a thief tricks online users into performing an online action that gives them access to your system and its data. They may send a text message that includes a link that when clicked, leads the user to a website where the thieves then collect personal information.
A phishing attack happens when the cybercriminal lures a victim to a website that appears to be legitimate, but in fact is a front that tricks the victim into entering their personal information.
During these and other attacks, cyber criminals can infect your system with malicious code via email attachments, infected search engine results, and documents on social networking sites. They can also attack smartphones by corrupting otherwise legitimate apps that when installed, provide the criminals with access to the device and its information. They can even sometimes control the device remotely.
Protect Your Devices and Personal Information
The Federal Bureau of Investigation offers a number of tips to help protect yourself from cyber-attacks:
If you discover that your identity has been compromised, ask the credit bureau to enter that information into your credit report.
Finally, review any solicitation from an email or text message for you to update your personal information, activate an account, or enter your personal information. Be careful, too, when downloading any attachment or file from the Internet. And make sure that your computers are protected with cybersecurity software.
This material was prepared by LPL Financial, LLC.