Skip to main content

Cyber security

At Brooks Macdonald we take security seriously. We do our utmost to protect our systems, employees and clients. 

Collage illustration

Policies and practices

We have invested in market leading security products from the most established and respected security services in the world to ensure our websites, email domains, endpoints (servers, PCs and mobile phones) and data receive the best protection available.

Our commitment

Our commitment

To demonstrate our commitment to protecting our clients, we have worked hard to gain certification in the National Cyber Security Centre’s ‘Cyber Essentials Plus’ accreditation. This involves an on-site technical assessment by a licenced auditor. This government program is designed to help organisations achieve a high level of cyber and data protection against a wide range of cyber threats. You can read more about the scheme and find us listed on the National Cyber Security website.

Cyber essentials plus certification logo
Email and web security

Email and web security

Security measures we have put in place:

  • Our cloud security platform actively protects against advanced threats like business email compromise and credential phishing.  
  • Our domains use the highest level of authentication. 
  • We employ multiple layers of email protection against malware, ransomware and phishing. All email transport channels are encrypted and we have a fully encrypted email service for sensitive information. 
  • All staff use multi-factor authentication  
  • We employ various threat intelligence tools and services which monitor and protect our estate against current threats. 
Endpoint security

Endpoint security

  • All servers are housed in secure facilities.
  • All servers are monitored closely and adhere to strict patching processes to ensure vulnerabilities are quickly remediated. 
  • All desktops, laptops and servers are monitored and protected 24/7 by our cloud security tools. 
  • We use enhanced security policies and threat data to stop unusual or high risk access attempts on devices and accounts. 
Third party security management

Third party security management

  • CREST certified third parties thoroughly test our services and infrastructure on a regular basis. 
  • We perform a detailed security risk assessment on every third-party vendor we work with to ensure their security standards are consistent with ours. 
Staff training

Staff training

  • All of our people are trained and pass cyber training courses. 
  • Regular security simulations are conducted, with mandatory training.
  • Close collaboration with industry bodies 
  • We share security threat data with the Investment Association, the National Cyber Security Centre (NCSC) and other industry bodies.
Close collaboration with industry bodies

Close collaboration with industry bodies

We share security threat data with the Investment Association, the National Cyber Security Centre (NCSC) and other industry bodies.

What to do if you think you’ve been a victim of fraud

What to do if you think you’ve been a victim of fraud

The Financial Conduct Authority (FCA) should be your first port of call for reporting a suspected scam, unauthorised firm or individual. Please visit the Report a scam to us page on the FCA website.

You can also use the FCA warning list online tool to check the validity of any investment opportunity you have suspicions about.