Cyber Security: Guarding Your Data

Cyber security has been around for a while, first coined in 1992, shortly after the Internet became publicly available in 1991. Along with the Internet, a new crop of criminals was born. Since then, data breaches, ransomware and campaign hacking have made headlines regularly. Keeping your account information private takes a partnership between you and us.

Committed to Security

Knowing that the financial industry is often the target of cyber criminals, we take the necessary precautions to protect clients' hard-earned assets. That's the collective goal of our dedicated cyber security team: to retain your trust.

Below we highlight ways to proactively guard against the threat of cyber criminals. Some of those start with you. Others are shouldered by us. Let’s explore some of the controls we have in place to safeguard your personal information and your investments.

Using Technology to Fight Back

Strong, multifactor authentication is one of the most important steps we can take to protect you and your account. With that in mind, we recently enhanced the login process when you access your account information online.  

This provides an extra layer of security to your account. It prevents someone else from logging in to your account—even if they have your password—by requiring extra identity verification using a security code sent to your phone.

The code provides extra security when you log in to your account. It’s generated separately from and helps us verify your personal information. This process better protects your account by requiring something you know (your username and password) as well as something you have (a code on your phone) when you log in.

Are You Fortified With Multifactor Authentication?

If you haven’t logged in for awhile or if you’ve never set up online access, you’ll be asked to set up multifactor authentication in four simple steps:

1.     Enter your username (at the top right corner of this page)
2.     Answer a challenge question
3.     Choose a new password
4.     Choose a login code option (NEW)

A number of other technical controls are in place throughout our computing systems, including encryption, firewalls, intrusion detection, security event monitoring and anti-virus. Our information security specialists design and maintain technical security systems; in addition, we hire outside firms to augment the testing of our controls.

Common Sense Administration

One of the ways we can secure private information is to put in place internal controls, in terms of company policy. Here's how we do that:

  • Job duties are separated to avoid the possibility of an individual employee being able to transact without oversight.
  • We restrict access to client records to those whose job function requires it to perform their duties, and we review those permissions regularly.
  • We have implemented a multi-step approval process for granting an associate access to sensitive data.

What Can You Do?

Just as strong as our commitment is to the security of your financial information, it also requires some best practices on your part. Some of these include not sharing login information with anyone, installing and maintaining recommended software updates on your computers and devices, and frequently checking account communications and transaction history are among them.

Visit our security center for more information about the steps we take for you and what you can do both online and offline.

The opinions expressed are those of American Century Investments (or the portfolio manager) and are no guarantee of the future performance of any American Century Investments' portfolio. This material has been prepared for educational purposes only. It is not intended to provide, and should not be relied upon for, investment, accounting, legal or tax advice.

American Century Investments is not responsible for and does not endorse any comments, content, advertising, products, advice, opinions, recommendations or other materials on or available directly or via hyperlinks to third party applications or websites. Logos or icons used are registered trademarks of their respective owners.