From the moment you log in, our account protection features are there to ensure that your account remains secure.
Factor One: Each account requires a unique username/password combination for access.
Factor Two: Secure Login System. Participants receive a personal security device which provides a randomly-generated security code. This code is used in conjunction with the username and password to access secure areas. Click here for additional details on the Secure Login System.
EV (Extended Validation) technology verifies that you are on a protected website.
Restrict access to TWS to a specific list of IP addresses. In cases where multiple traders have access to an account, these restrictions can be set at the individual trader level.
IBKR restricts account access following a specified number of failed login attempts.
We have built in an auto-logoff feature that logs you out of the application after a specified period of inactivity.
All statements are accessed through secure login to Client Portal.
We employ state-of-the-art transaction monitoring systems and maintain a dedicated security team that is responsible for detecting suspicious activity. If an unusual or suspicious transaction is noted, a member of this team may contact you to confirm the validity of the transaction. If contacted, you will never be asked to provide your password and we encourage that you call back and request to speak to the security team employee via our toll free number 1–877-442-2757 in order to first confirm their identity. If you believe that your account has been compromised, you should notify IBKR immediately via our toll free number 1–(877)-442-2757.
This refers to software inadvertently downloaded from the Internet when you visit certain websites. Spyware covertly gathers information from your computer without your knowledge. Once installed, spyware monitors user activity on the Internet and transmits that information (including usernames and passwords) to an unauthorized recipient. You should install anti-spyware software on your computer to detect and remove spyware.
Thieves use phishing to obtain sensitive information by masquerading as a trustworthy institution. Phishing is typically carried out via an email that contains a link to what appears to be an authentic website. These counterfeit sites prompt you to enter your personal information, which the thieves then use to access your accounts. Note that IBKR will never send an email requesting sensitive information such as your password or social security number. If you receive a suspicious email which identifies itself as originating from IBKR do not respond, and immediately notify our security team by calling toll-free in the US at (877) 442-2757 or direct at (312) 542-6901.
These malicious programs can cause severe and irreparable damage to your hardware, software or files, and in some cases can open your system to unauthorized access and possibly allow confidential information to be compromised. These programs, which differ on how they spread and replicate, are best controlled by first ensuring that your operating system is up-to-date and then installing anti-virus software, making sure that you frequently download updates to obtain the latest fixes.
For further information about securing your home computer and protecting your privacy see:
CERT® Coordination Center Home Network Security
Security Focus - Securing Privacy, Part One: Hardware Issues
Security Focus - Securing Privacy, Part Two: Software Issues