FinGarde Trust Center
Welcome to the FinGarde Trust Center. Here, we take transparency and security as seriously as you do. Our commitment to safeguarding your data goes beyond industry standards—we treat your assets with the same care we give our own. From robust cybersecurity measures to regulatory compliance, every system we deploy is designed to protect what matters most: your trust. Explore our practices and learn how we're keeping your information secure, every step of the way.
See section
Resources
FinGarde - Service Delivery (Battle Plan)
Description of Managed IT Services and Cybersecurity Plan
Certificate of Liability Insurance
2024 COI
Profit & Loss / Balance Sheet
Profit and Loss Statement and Balance sheet as of 12/31/2023
External Vulnerability Reports
External scans of all active FinGarde IP Addresses.
FAQs
How do you ensure the security of our clients’ financial data?
We prioritize the security of your clients' financial data by implementing industry-leading cybersecurity measures. Our team works tirelessly behind the scenes to protect your sensitive information using the latest in encryption, threat detection, and continuous monitoring. We also regularly update our security protocols to stay ahead of evolving threats, ensuring your data is always safe and secure.
How do you protect sensitive client information from cyber threats?
We employ a multi-layered approach to cybersecurity, combining advanced firewalls, encryption, and threat detection systems to guard sensitive client information. Our systems are continuously monitored 24/7 to detect and mitigate potential threats before they can cause harm. Additionally, we implement best practices in secure authentication, including multi-factor authentication (MFA), to ensure only authorized personnel can access sensitive data.
How do you ensure compliance with cybersecurity regulations, such as SEC and FINRA?
We understand the strict regulations financial advisory firms must adhere to, including those set by the SEC and FINRA. Our cybersecurity protocols are designed to meet or exceed these regulatory requirements. We regularly audit our systems to ensure compliance, and we stay informed on regulatory updates to make necessary adjustments. We also provide documentation and reporting to assist with compliance audits and reviews, making sure your firm is always prepared.
How do you safeguard against phishing, malware, and other common cybersecurity threats?
We use a variety of tools to safeguard your firm against phishing, malware, and other attacks. This includes advanced email filtering solutions, web content filtering, and endpoint protection that blocks malicious software and suspicious activity. Additionally, we offer security awareness training to educate your team about how to recognize and avoid phishing attempts and other social engineering attacks, further reducing your firm’s risk.
What kind of access controls do you have in place to prevent unauthorized access?
We prioritize strict access controls to prevent unauthorized individuals from accessing your systems or client data. This includes implementing role-based access control (RBAC), where each team member only has access to the information necessary for their role. We also utilize multi-factor authentication (MFA) for an extra layer of security, ensuring that even if credentials are compromised, unauthorized access remains difficult. All access logs are monitored regularly for unusual activity.
How do you respond to cybersecurity incidents or breaches?
In the event of a cybersecurity incident, we have a detailed incident response plan in place to contain, mitigate, and resolve the issue as quickly as possible. Our 24/7 monitoring allows us to detect suspicious activity early, and our response team is trained to take immediate action to prevent damage or data loss. Following any incident, we provide a full report, along with recommendations to strengthen security and prevent future breaches.
How do you ensure the effectiveness of the security solutions you recommend to clients?
We believe in the solutions we provide because we use them ourselves. The same robust security systems we deploy for our clients are also in place within our own organization. This means that every firewall, encryption protocol, email filter, and security measure we recommend is tried, tested, and trusted by us on a daily basis. By using the same tools in-house, we gain first-hand experience with their effectiveness, allowing us to optimize and adjust our recommendations to best suit your firm's specific needs.
Subprocessors

Microsoft Azure
Data location: United States
Monitoring
Continuously monitored by Secureframe