Barron's 4.5 Stars 2014 Open an Account Button Contact Us Login Log In Log into
 

Place Trade Strength and Security: How We Protect Your Account

 

 Account Protection Login Protection  Privacy  

Secure Login  Your Account  Best Practices    

 

How We Protect Your Account

 

From the moment that you log in, our account protection features are there to ensure that your account remains secure. Through the combined strength and security that both Place Trade and that which our clearing firm provides, our clients enjoy state of the art technology along with the strongest security.available to protect their accounts..

 

   

Two Factor Authentication

Factor One: Each account requires a unique username/password combination for access. Never give your password to another individual!

Factor Two: Secure Login System. Participants receive a personal security device which provides a randomly-generated security code. This code is used in conjunction with the username and password to access secure areas. Click here for additional details on the Secure Login System.


Secure Socket Layer

  • PT deploys 2048-bit EV Certificates, TLS 128-bit or higher encryption to establish a secure connection and ensure the confidentiality and integrity of information passed between your computer and our systems. Activate SSL by checking the "Use SSL" box on the TWS login dialog. Using SSL may impact the performance of your PC depending on its capabilities.
  • Automated monitoring systems to ensure only strong encryption algorithms are used.
  • We enforce all website traffic to use encryption.
  • EV (Extended Validation) technology verifies that you are on a protected website.


Limit Login via IP Restrictions

Restrict access to TWS to a specific list of IP addresses. In cases where multiple traders have access to an account, these restrictions can be set at the individual trader level.

 

 

   

Failed Login Attempts

We restrict account access following a specified number of failed login attempts.


Automatic Logoff

We have built in an auto-logoff feature that logs you out of the application after a specified period of inactivity.


Statements

All reports, statements and tax forms are accessed through secure login to Account Management.


Security Monitoring

We employ state-of-the-art transaction monitoring systems and maintain a dedicated security team that is responsible for detecting suspicious activity.

If an unusual or suspicious transaction is noted, a member of this team may contact you to confirm the validity of the transaction. The person may identify him/herself as being from our security team or from our clearing firm (IB).

If contacted, you will absolutely never be asked to provide your password and we encourage that you call us back and request to speak to the security team employee via our toll free number or you may call our clearing firm directly at 1–877-442-2757 in order to first confirm our team member's identity.

If you believe that your account has been compromised, you should notify us immediately via our toll free number 1-800-50-5227 or directly to our clearing firm at 1–877-442-2757.

 

 

 


 

 
 

  

It is Important to Understand and Defend Against Threats

 

 

 

Spyware 

 

 

Phishing

 

 

Viruses, Worms & Trojan Horses

 
 

 

This refers to software inadvertently downloaded from the Internet when you visit certain websites. Spyware covertly gathers information from your computer without your knowledge. Once installed, spyware monitors user activity on the Internet and transmits that information (including usernames and passwords) to an unauthorized recipient. You should install anti-spyware software on your computer to detect and remove spyware.

 

Spoofing

Hackers will send an email using what looks like a valid email address of someone that you know or a business that you may (or may not) actually work with that looks completely legitimate yet has nothing to do with the the person or company showing in the email. You should run your anti-spyware / anti-virus software on your computer often because even if you do not open spoofing and phishing emails or click on their links, if the related email is still in your email account it may still impact your system.

 

 

 

Thieves use "phishing" to obtain sensitive information by masquerading as a trustworthy institutions or even your friends.They will copy company logos and even your address book to send phony emails to unsuspecting individuals. Most likely you have seen these types of emails before coming from what appear to be your friends' accounts however you may not immediately realize when a company has been "spoofed" because hackers work very hard to fool you.

Phishing is typically carried out via an email that contains a link to what appears to be an authentic website. These counterfeit sites prompt you to enter your personal information, which the thieves then use to access your accounts. 

Please note that Place Trade will never send an email requesting sensitive information such as your password or social security number. If you receive a suspicious email which identifies itself as originating from either Place Trade or our clearing firm (IB) do not respond, and immediately notify our security team by calling toll-free in the US at (800) 50-PLACE or direct at  919-719-7200. 

 

 

 

These malicious programs can cause severe and irreparable damage to your hardware, software or files, and in some cases can open your system to unauthorized access and possibly allow confidential information to be compromised.

These programs, which differ on how they spread and replicate, are best controlled by first ensuring that your operating system is up-to-date and then installing anti-virus software, making sure that you frequently download updates to obtain the latest fixes. 

 

  

  

 

 

 

 

 

 

 

 


 


For further information about securing your home computer and protecting your privacy see:

 

  CERT® Coordination Center Home Network Security   Security Focus - Securing Privacy Part Three: Email Issues
       
  Security Focus - Securing Privacy, Part One: Hardware Issues   Security Focus - Securing Privacy Part Four: Internet Issues
       
  Security Focus - Securing Privacy, Part Two: Software Issues    
 

 


 

 

Always be vigilant when it comes to your security!

Never, ever assume that hackers will not be interested in your computer, cell phones, printers or other electronic devices (including as far as baby monitors) because knowing that so many people assume they are not a target is exactly why the hackers know that you may be the perfect target! 



 

s5box


Learn more about retirement planning by visiting some of the links below:

Roth IRA

SEP IRA

SIMPLE IRA

Traditional IRA

Qualified Plans

Rollover IRAs

Find out how Place Trade can help you get the most out of your college planning by visiting some of the links below:


Coverdell ESA

529 College Savings Plans

UGMA/UTMA Accounts