We value our clients’ privacy and security and are committed to protecting you from cybersecurity threats and breaches. We have a dedicated technology team and several outside experts who work together to provide a broad and deeply layered defense for the protection of MRA and our clients. While not all inclusive, here are some of the strategies we have implemented to keep our clients’ information safe and secure:
The latest next generation firewalls are used at every network perimeter to protect against malware and virus threats. All computers and servers have next generation “endpoint security” to detect and contain threats which may evade perimeter defenses. Access to Internet websites known to contain malware and virus threats are blocked.
Data is encrypted both at rest and in transit.
All email messages are scanned to identify and block virus and malware threats. Sophisticated data loss prevention (DLP) is employed to identify and potentially block messages that may contain personally identifiable information.
Sensitive client information is communicated via a secure Internet web portal and encrypted email attachments.
Two-factor authentication is utilized for all remote access to the firm’s network, applications, and data.
Single sign on and transport layer security are utilized to control access and communication with external application, data, and service providers.
Every aspect of the technology infrastructure is monitored continuously on a 24/7 basis with real-time alerts to the technology team.