Security Center

Because your computer can store your personal information, it’s important to take steps to protect yourself against potential security threats on the Internet. Discover what you need to know below, and follow these precautions:

  • E-mail Security
    Exercise caution when responding to e-mail requests for your personal information. Don’t enter any information in e-mails or pop-ups, and don’t open e-mails from unknown senders.

  • Password Security
    Avoid using nicknames, birthdates, anniversaries, pet names or words found in the dictionary (hackers can crack this). Passwords are case sensitive, may include spaces and special characters with a minimum of eight characters and a maximum of 32 characters. Never write down, tell or e-mail anyone your password. Periodically change it, too.

  • PC Security
    Use a legally-licensed operating system and keep it up to date. Be careful when using third party computers and disable file sharing on your computer. If you decide to keep this feature, apply appropriate security measures by backing up your files regularly to CDs, DVDs or an external hard drive. The backup files should be stored separately from your computer.

  • Surf & Shop Safely
    Get into the habit of clearing your browser’s cache on a regular basis.

  • ATM/Debit Card Safety
    Exercise caution when using your ATM/Debit card online, at an ATM machine or retail location. Never share your password with anyone, only access ATMs located in well lit spaces, and take steps to ensure password entry is not viewable by other parties, including using your body to block potential access. In addition, review your account balances and statements regularly and immediately report suspected fraud.

  • While Logged On To Scottrade
    Review all transaction history forms under the “My Account” tab in the transaction history section. Always log off your Scottrade account and close your browser when you’re done. Keep your e-mail up to date and review your last login time, (above the top tabbed navigation). Don’t leave your computer unattended while logged in.

How We Protect You

Awareness is critical. That’s why we’ve developed these guidelines:

Identify Theft Schemes

Arm yourself against an attack by learning about potential threats.

  1. Phishing is a scheme to collect personal information via e-mail or pop-ups which seem legitimate. Pharming is a hacker's attempt to redirect a website's traffic to another, bogus website. Both are common ways hackers collect personal information.

  2. Trojan horse - a program that installs bad code that’s hidden or harmless until an action occurs, such as clicking a link. When this happens, a hacker can access your keystrokes to get passwords or other personal information. Trojan horses are spread through e-mail or embedded in Web pages, spyware, and worms via “free downloads.”

  3. Detect spyware – keep your operating system updated by enabling the automatic Windows updates or by downloading Microsoft updates regularly. It’s the best defense against spyware installation

Protection Against Identity Theft

Guard against theft by installing security software that includes a firewall to prevent viruses and worms, and block unauthorized access to and from your computer or network.

Our Privacy Statement

Your privacy is our priority. Learn how we collect and protect your personal information.

If you encounter fraudulent activity in your Scottrade account, we provide protection and reimbursement through our Online Security Guarantee.