Client Icon

Online Security

Last Updated: November 11, 2022

Important: Protect Yourself from Potential Threats and Report Suspicious Activity

At Sauder Global Investment ("SGI"), we prioritize the security of our clients' information. Through our Information Security Program, we utilize advanced technology and processes to safeguard your data. However, you can also take proactive measures to enhance the protection of your information.

This page aims to provide you with valuable suggestions to ensure the security of your personal data. Please consider the following recommendations while conducting your daily business and personal activities:

1. Be aware of potential threats

Stay vigilant and recognize the potential threats prevalent today. Cybercriminals often employ deceptive techniques such as phishing and spoofing to acquire confidential or personal information. They may use emails that appear legitimate, internet pop-ups, or malicious advertisements and websites. To protect your information, keep the following in mind:

  • SGI's official website address is https://www.sgiml.com. Legitimate communications from SGI will always come from a SGI.com domain. Any other sources should be viewed with suspicion. If you have doubts about SGI's website or receive a suspicious SGI link or email, please contact your SGI Relationship Manager or reach out to SGI using the contact details provided on our main website.
  • Exercise caution when receiving emails requesting personal or confidential information. SGI will never contact you unsolicited and ask for your login credentials, electronic banking details, or other personal information.
  • Do not share personal information with individuals you do not know or trust.
  • Regularly access your accounts and monitor them for potential fraudulent activity.
  • Institutional banking clients should periodically conduct information security risk assessments of their related controls as per their institution's applicable programs.
  • Public Wi-Fi networks, especially in cafes, hotels, and airports, are often insecure. Learn how to identify and protect yourself while using these networks.

2. Steps you can take to protect yourself

In addition to being aware of online security threats, you can take several steps to enhance the security of your computer, network, or personal devices. Here are some points to consider:

Securing the Computer

  • Enable automatic updates for security software
  • Activate personal firewalls as a protective barrier between you and the internet
  • Keep your operating system up to date
  • Regularly update patches provided by the vendor
  • Ensure your web browser is updated regularly
  • Configure your web browser to utilize the strongest available encryption
  • Install and update virus protection and anti-spyware software
  • Perform periodic full scans for potential threats
  • Limit access to your device to authorized individuals whenever possible

Securing Wireless Networks

  • Configure wireless networks to use strong encryption and set a password
  • Replace older wireless equipment with more secure models
  • Change default router names and passwords assigned by the manufacturer during installation
  • Disable wireless networks when not in use for extended periods

Securing Personal and Confidential Information

  • Create complex and unique passwords for each account
  • Keep passwords secure and avoid sharing them with anyone
  • Limit sharing personal and confidential information to trusted individuals and use secure websites when required
  • Avoid transmitting personal and confidential information via email, as most email systems are not secure
  • Regularly back up important files
  • Always log out of online sessions to ensure complete termination. Simply closing the browser may not be sufficient.

Securing Mobile Devices

  • Enable the password lock functionality
  • Set an idle timeout to automatically lock the device when not in use
  • Keep operating systems and applications up to date
  • Encrypt data on personal devices whenever possible
  • If disposing of a personal device, permanently delete all personal data from its storage media
  • Use the device's wipe features or specialized disposal products designed for secure data removal

3. Stay Informed

Numerous online resources provide information and tips on staying secure while using the internet. Take the time to stay informed:

The Federal Trade Commission (FTC) website offers resources for both institutions and individuals, providing tips and information on preventative security measures and fraud response. Visit https://www.consumer.ftc.gov/topics/privacy-identity-online-security for more information.

The Department of Homeland Security (DHS) website covers various topics and provides useful tips and information sources regarding their responsibilities, including cybersecurity. Explore more at http://www.dhs.gov/cybersecurity.

4. Reporting Fraud or Suspicious Activity to SGI

If you have any questions regarding SGI correspondence or suspect any suspicious or fraudulent activity, please contact us at any of our locations or directly reach out to your SGI Relationship Manager. You can find our locations here: https://www.sgiml.com/en-us/contact-us/office-locations.