Information Security
It is no secret that with the increasing sophistication the internet and IT software provide, there are a greater number of individuals and organizations that seek to use this to their advantage for disingenuous reasons such as identity theft or fraud. We prioritize addressing the risk that client data may be lost or stolen and then used to commit financial crime.
As a company, we take necessary measures to organize and control our affairs responsibly and effectively, with adequate risk management systems. We adopt a risk-based approach to data security and utilize both internal and external expertize to conduct assessments of key risk factors and constantly devise ways of mitigating them, which includes committing adequate resources in support.