Broker Check

Security Is Our Priority

We take security very seriously and are committed to providing safe and secure tools that you can trust.

Data Security

The data collected in this process is encrypted on different levels to ensure the highest level of protection. The encryption of data starts with a secure connection to and from our software partner's servers via 256-bit SSL encryption. Data is further encrypted at rest and stored in secure databases.

Data collected can only be accessed by you and us. Our software partner does not have access to sensitive client data. Their technical support staff is only allowed to access client data with our explicit permission and only with the purpose of solving issues or bugs.

Physical Security

The servers involved are housed in nondescript facilities located in the United States of America. These critical facilities have extensive setback and military grade perimeter control berms, as well as other natural boundary protection. Physical access is strictly controlled, both at the perimeter and at building ingress points, by professional security staff utilizing video surveillance, state of the art intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication no fewer than three times to access data center floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff.

Ongoing Commitment to Security

We are committed to constant improvement of the security of our the tools and processes we utilize at Lauer Financial. The software provider for this particular tool works closely with external security experts who perform penetration tests and audits on their systems. Their development team ensures that industry best practices are followed with all new features they deploy. All code is reviewed and tested before deployment to production.

In addition, they use a number of different tools that constantly scan their code, servers, and database infrastructure to ensure that the data stored in their system is secure and that, in the event of an intrusion, they are immediately notified so that any necessary steps can be taken.