Account View 2.0 Cybersecurity
Keeping your financial data protected and secure
Northwest Financial Advisors and our partner, LPL Financial, take the security and privacy of our shared products seriously. To safeguard our clients’ personal and financial data, LPL advocates for security in the conception, design and implementation of its investor-facing platforms, like Account View 2.0. They strive to build the most innovative, secure, and empowering tools for financial professionals and their clients, and encourage their third-party partners and the industry to join them in that commitment. Security is an evolving journey, and as cybercriminals change their tactics, LPL adapts and accelerates its security posture to stay one step ahead.
One of the benefits of using LPL’s tools, including Account View, is that they’re only available to LPL clients. LPL has designed these tools for a diverse client base, and they meet California Privacy Rights Act (CPRA) and other industry, state and federal regulations. This means that no matter what your background, location or experience, the products are accessible and can be used by anyone.
Strong Security Framework
Two-Factor Authentication
- Account View 2.0 accounts use two-step authentication to verify your identity. Taking an additional step to verify your identity reduces your risk and better protects your accounts from unauthorized access.
Mobile Apps
- Additional security features were implemented to further protect and ease the use of mobile app access, by including Face or Touch ID during initial setup.
- Modern design, architecture and code reviews are performed to ensure industry best practices and adherence to LPL policies to meet security and compliance requirements.
Secure Access Anywhere
- Know you’ll get quick and secure access through any device, feel safe and even more connected when accessing your mobile app or using the web portal.
- Sensitive data is secured, masked and/or encrypted where applicable, to provide a secure experience.
- Regular scanning for vulnerability is done on the environment and supporting infrastructure.
- Penetration testing is performed by third-party experts.
- Recurring patching and modernization are regularly implemented.
- User profiles are placed on alert and fraud lock if suspicious activity is identified.