We recognize that maintaining the confidentiality of this information is essential to fulfilling our commitment to supporting our clients' wealth management objectives. We take every precaution to safeguard our clients' assets and personal information and are dedicated to providing a secure environment for them to conduct their financial activities.

To accomplish this, Baird's Information Security Program takes a risk-based approach to manage cyber risks and aligns with NIST frameworks. We engage an independent firm to perform annual SOC 1 audits of Baird’s controls related to the custody of client assets. We also strive for continuous program improvement, leveraging internal yearly risk assessments, bi-annual penetration tests with rotating vendors, and regular network vulnerability scanning.

Baird is committed to protecting you and your family by investing in cybersecurity and fraud protection technology. Our IT Security and Information Security teams consist of some of the best cybersecurity experts in the industry, allowing us to maximize the impact of our cybersecurity spend and tailor our security technology and practices to the current cyber risk landscape. In addition to our in-house cyber defense organization, we also work with industry and government partners to further enhance our security efforts. This combination of technology and human expertise allows us to provide the confidence and security you expect from your trusted wealth management firm.

Defense in Depth

Baird has adopted a Defense in Depth strategy as part of our technical architecture. This approach involves implementing multiple layers of defenses to protect our most critical systems and enable close monitoring of system access and data movement. Utilizing this strategy, we aim to enhance the security of our systems and protect against potential threats.

Safeguarding Your Information

The rapidly evolving nature of the cybersecurity field requires proactive measures to defend and monitor our systems. Our fraud protection and cybersecurity program include various measures to anticipate potential issues and respond effectively when they occur. By staying ahead of potential threats, we can better protect our systems and the information they contain.

At Baird, we prioritize security and implement various measures to protect your personal information and assets. We use a combination of different cybersecurity, fraud protection, and regularly reviewed security processes to ensure the safety of your online transactions and communications. Some of the security measures we employ include:

  • Strong encryption protocols to protect data.
  • Continuous monitoring to detect and prevent fraudulent activity.
  • Multi-Factor Authentication options for all client communication channels.

We also emphasize training our employees on cybersecurity and fraud protection policies and procedures to ensure our team is equipped to respond to and effectively address any suspected cybersecurity or fraud events. We are committed to working closely with our clients to resolve these issues and protect their sensitive information.

Our program benefits from meaningful investment in cybersecurity using the best-in-class fraud-prevention technology and business partners. To maintain a comprehensive and robust security posture, we:

  • Routinely test systems and security protocols for potential vulnerabilities.
  • Ongoing investment in new safeguards and security technology.
  • Contract with independent security firms for biannual testing of systems and applications.

Enhanced Security Features

Baird is committed to providing enhanced security features to protect your information when managing your account on Baird Online or the Baird Mobile App. As cybercrime becomes increasingly sophisticated, Baird continues to develop new ways to help you access your account more securely. These features are designed with your needs in mind, ensuring you can confidently manage your account.

Multi-Factor Authentication (MFA)

Baird offers Multi-Factor Authentication as a risk-based solution to enhance the verification process. As a Baird client, you have this additional layer of authentication for Baird Online and the Baird Mobile Application, in addition to your usual login credentials. This added security measure helps to protect your account and ensure that only authorized users have access to your information.

Notifications and Alerts

Baird may contact you to verify the validity of specific transactions or changes to your account. Please carefully review any notifications you receive.

Secure Login/Password Complexity Indicator

Baird offers guidelines to assist in the creation of secure passwords. We will evaluate whether the password you choose meets our recommendations. It is essential to use unique credentials for your Baird Online account and not reuse the same username or password for other online accounts. This helps to protect your personal information and ensure the security of your interactions with Baird.

Threat Landscape Monitoring

At Baird, we work closely with trusted vendors and actively participate in industry information-sharing forums to stay informed about the latest developments in the cybersecurity and fraud landscapes. We use this knowledge to continuously improve our defenses and protect our clients' assets.

Common Fraud Schemes

Fraudsters constantly develop new tactics to obtain personal information and compromise online security. To protect yourself from falling victim to these social engineering schemes, you must stay informed about the common methods used by fraudsters to manipulate individuals into sharing sensitive information. By being aware of these tactics, you can identify malicious activity and take steps to protect yourself. Staying informed is the first step in protecting yourself from becoming a victim of fraud.

Click a topic below to learn more.
  • Charity Fraud

    Fraudsters often pose as fake organizations, particularly during times of increased public awareness and activity, such as during holidays, awareness months, and large-scale emergencies such as hurricane relief efforts. Thoroughly research a charity and request detailed information to ensure it is a legitimate organization.

  • Computer Technician Scheme

    Scammers may pose as software company IT representatives to gain remote access to your device. They may call you directly or present a pop-up on your device prompting you to call and claim your system has a critical issue that requires immediate attention. Be cautious and only grant access to your device after verifying the request's legitimacy. If you are unsure, it is best to contact the company directly using contact information from a trusted source.

    To avoid falling victim to computer technician schemes:

    • Do not give out personal, computer, or account information to a third party via email or phone.
    • Request identification from the caller, such as their employee ID and department.
    • If you have a malfunctioning device, contact the legitimate vendor for assistance using the number provided at the time of purchase.
  • Elder Abuse

    Fraudsters often exploit the vulnerabilities of the elderly, such as cognitive impairment and lack of familiarity with technology, to collect their personal and financial information for financial gain. We encourage you to educate yourself and your loved ones on monitoring accounts and reporting any suspicious activity.

  • Email Account Takeover

    A potential fraudster can compromise your personal email account, search your email history, or look for conversations between you and your financial advisor. This individual may then imitate your previous communications to appear legitimate and subsequently request a transfer of funds (typically via wire transfer) to an external account under their control.

    Be cautious when handling emails. Clicking on unknown links can result in malware being installed on your device, leading to email compromise — exercise caution to avoid falling victim to such attacks.

    If you fall victim to an email account takeover, follow these simple steps to protect your information.

    • Change your email passwords along with the passwords of any accounts tied to your email addresses.
    • Enable multi-factor authentication.
    • Check your email settings for changes to forwarding rules.
    • Scan your device for malware or take it to a reputable place for professional assistance.
  • Familial Scheme

    In this type of scam, the perpetrator will impersonate a family member or friend needing urgent financial help to avoid dire consequences. This scam can be carried out through a phone call, email, or social media message, exploiting the relationship between the victim and their loved one to facilitate the quick transfer of funds without raising suspicion.

    To avoid falling victim to a familial scheme:

    • Ensure any monetary assistance is provided to legitimate family members or friends by confirming their circumstances by contacting them through known and legitimate communication channels.
  • Identity Theft

    Identity theft is a type of fraud involving the unauthorized use of an individual's personal information to commit crimes. This can include obtaining personal information from mail or trash, installing malware on a victim's device, and hijacking personal accounts such as email or social media accounts. It is important for individuals to be aware of how their personal information may be vulnerable and to take steps to protect themselves from identity theft.

    Baird also partners with InfoArmor for identity theft protection. For more information, contact your financial advisor.

  • Phishing

    Phishing messages are fraudulent attempts to obtain sensitive information such as personal details and login credentials by disguising oneself as a trustworthy entity. These communications often include urgent requests for action and may contain attachments with malware. Malware, short for malicious software, can take various forms and infect a victim's device through multiple means, such as clicking on unverified links in emails, social media posts, and websites. One common type of malware is ransomware, which encrypts a victim's files and demands payment to unlock them.

    To avoid falling victim to phishing:

    • Be cautious of emails with a strong sense of urgency that request your personal information.
    • Watch out for misspellings, grammar mistakes, and incorrect terminology in emails.
    • Do not click on unknown links, requests, or attachments in emails or texts.
    • If you are asked to provide personal information via email, verify the request by contacting the company directly by phone using a number obtained from a trusted source.
  • Romance Scheme

    Fraudsters often use social media and dating websites as platforms to initiate communication and establish trust with potential victims. These scams are typically characterized by a desire for private communication, such as through email or phone, to strengthen the relationship and manipulate the victim into sending money or other aid forms. The stories and narratives presented by the fraudster are designed to evoke emotional responses and make the victim more receptive to their requests. Remain vigilant and cautious when communicating with individuals online, especially when they ask for personal information or financial assistance.

    To avoid falling victim to romance schemes:

    • Do not disclose personal information to people you meet online.
    • Do not send money to anyone you do not know or have a relationship with, including online acquaintances.
  • SMiShing

    SMiShing is a cyber attack using social engineering techniques to trick individuals into visiting malicious websites or disclosing personal information. This attack typically occurs through text or SMS messages and may be delivered through other messaging apps such as WhatsApp. It is similar to phishing and vishing in that it relies on psychological manipulation to lure victims into divulging sensitive information.

    To avoid falling victim to SMiShing:

    • Do not respond or click on a link in a message from an unknown number.
    • Do not share private information on an unknown or unverified website.
    • Do not share private information in response to texts from unknown senders.
  • Vishing

    Vishing, also known as voice phishing, is a scam where fraudsters use the phone to impersonate legitimate organizations and trick individuals into revealing sensitive personal or financial information. This is done by creating a sense of urgency and panic, leading individuals to make rash decisions and share information they otherwise would not. Remain vigilant and never share personal information over the phone unless you know the caller's identity.

    To avoid falling victim to vishing:

    • Do not share personal information over the phone unless you have initiated the request.
    • If you receive an unexpected call, hang up and contact the organization using official contact details from your account statements, credit card, or the organization's official webpage to verify the caller's identity.

How Clients Can Protect Themselves

As a leading provider of financial services, Baird takes every precaution to safeguard our clients' assets and information from cyberattacks. However, it is important for our clients to take active steps to protect themselves from fraudulent activity. With the increasing volume and sophistication of cyberattacks, individuals and families must be vigilant in defending against these threats. Working together can help ensure the safety and security of our clients' assets and information.

Activate Multi-factor Authentication (MFA)

We strongly encourage taking advantage of multi-factor authentication where available to help improve the security of your online accounts. As a Baird client, your online and mobile Baird Online account security benefits from having MFA. MFA adds another layer of protection to online accounts in addition to your username and password. MFA is offered by a range of companies, including social media platforms, financial institutions, and tech giants, to help keep user accounts secure. This additional security measure will provide added protection for your account and personal information.

Avoid Using Public Wi-Fi

Exercise caution when accessing sensitive information on public Wi-Fi networks. These networks are often not secure and can expose personal information or passwords to potential cyber threats. To protect yourself, it is recommended to create a personal Wi-Fi hotspot with your phone and use it to log in to sensitive sites. This will ensure your information remains secure and protected from potential risks. It is always better to err on the side of caution when protecting your personal information online.

Be Careful of What You Post on Social Media

Be cautious when sharing personal information on social media. This includes your birth date, birthplace, phone numbers, and any financial information such as credit card and bank account numbers. This type of information could potentially be used to guess passwords or security questions, so it is best to keep it private.

Choose Strong Passwords

It is essential to regularly update your passwords and keep them private to maintain the security of your accounts. Implementing a strong password strategy is crucial in protecting against potential cyber threats. Your passwords should be long and have a unique combination of uppercase and lowercase letters, numbers, and special characters. Length trumps complexity. Additionally, it is best practice to avoid using the same password across multiple accounts. Following these guidelines can effectively secure your online information and reduce the risk of unauthorized access.

Enroll in Account Alerts and Notifications

By enrolling in alerts and notifications for your account, you can effectively manage and monitor your accounts, enabling you to detect any suspicious or unfamiliar activity in a timely manner.

Install the Latest Anti-virus Software

Anti-virus software protects your device by detecting and blocking the latest viruses that could steal your personal data and information. This software provides a critical layer of security to help keep your sensitive information safe from cyber threats. The software can provide effective protection against the latest viruses and malware by regularly updating the virus definitions.

Monitor Your Credit

Cyberattacks can happen to anyone, even the most careful individuals. To protect yourself from potential fraud, it is important to regularly monitor your accounts for any signs of unauthorized activity or identity theft. You can help prevent financial loss and protect your personal information by staying vigilant.

Shred Account Documents

Shred sensitive documents, including tax records, before disposal to protect personal information.

Use the Latest Operating Systems and Software

Ensuring your web browser and operating system are kept up-to-date is essential for your device's optimal performance and security.