Skip to main content
Information Security

Outline of security systems and policies

Chelsea Flood avatar
Written by Chelsea Flood
Updated over 2 years ago

We take security very seriously for all users of Bridge: advisors and end-clients alike. This documentation will tour the three major cornerstones of our secure systems and

policies:

  • Data policies

  • Limited account relationships

  • Secure software architecture

Data Policies

Whenever possible, any sensitive or personally identifiable information (PII) received from financial institutions is either thrown away or masked. For example, our software immediately replaces social security numbers with randomized 9 digit numbers to act as placeholders. Account numbers are stored but generally masked; for example only the last few digits of the account number is visible on client invoices.

Limited Account Relationships

All the data received by Bridge is strictly on a read-only basis. We don't take discretion over accounts and as a result, no financial institution would allow us to modify or transact with an account. We offer trade execution services; when trading is offered for clients we still aren't taking discretion on accounts or managing them; we only execute instructions provided by wealth and asset managers.

Secure Software Architecture

Our software is built securely from the core. We're hosted on Amazon Web Services, the industry leader in cloud computing technology with the strictest security protocols in place. Our backend processes and data storage reside in containers completely isolated from the internet that are only capable of communicating with our frontend web application. Moreover all communication between your browser and our backend is fully encrypted over a TLS 1.2 connection, the latest security protocol governing web-based communication.

Recommendations

Because Bridge is a 3rd party with read-only access to data, there is virtual no chance an account could be compromised due to the use of any of our products. We do recommend being as secure as possible, for both yourselves and clients, following these simple recommendations:

  • Use a password storage manager like Dashlane or 1password to generate and storage secure passwords. Often times data is obtained because someone uses the same password for multiple accounts, websites or other applications. If one of those sites is compromised, hackers can try to login to other accounts and websites using the same email / password.

  • Enable MFA (multi-factor authentication) wherever it's supported

  • Do not share usernames and passwords with anyone

  • Inquire about security policies and systems at your financial institution

On Request, we are able to provide

  • Our Information Security Platform

  • Our latest Application Security Test Results

Did this answer your question?