- Boost login protections
- Monitor accounts and raise concerns in a timely manner
- Look out for suspicious emails
- Take precautions at home
- Browse with vigilance
- Contact us, cooperate with security measures, and stay informed
55% of consumers say companies should have primary responsibility for the security of their online and mobile accounts. TeleSign Consumer Account Security Report, 2016.
Looking to be better informed about cybersecurity? Do you want to know if your provider is taking all the steps necessary to protect your data? We’ve compiled the 10 critical cybersecurity questions to ask.
Our security strategy is informed by frequent board and committee briefings, executive tabletop sessions, periodic security briefings and an established business continuity plan.
Our associates are carefully vetted and thoroughly trained in security awareness and primary incident protection.
We employ advanced network and data protection, identity, and access management, plus cybersecurity data analysis.
Ongoing risk assessment management and testing are vital parts of our best practises.
We continuously monitor plan and transaction activity, around the clock, every day of the year.
The T. Rowe Price Account Protection Program is designed to assure plan sponsors and participants that their accounts are protected in the event of fraud. Under the Program, we’ll restore eligible account losses caused by unauthorized activity* when plans and participants follow some best practices.
Maintain access to T. Rowe Price systems
Use secure methods to send files and download data
Take precautions to protect assets
Employ strict vendor controls
* Plan sponsors and participants should contact us immediately if they suspect a potential breach or fraudulent activity. All reported concerns will be thoroughly investigated to determine program applicability. The Account Protection Program may not apply if the security best practices outlined in this document are not followed.
Multi-Factor Authentication provides an additional layer of security to normal login requirements and call center interactions. It requires participants to provide information that only they have access to: a code they must enter to authenticate their log in.
Multi-Factor Authentication will be required of all participants before the end of 2019.
The voice biometrics process passively authenticates callers as they naturally engage with the call center. This new tehnology evaluates several criteria for each caller, including voice, caller behavior, call location, and device, beginning with their first interaction with our call center. If the call seems suspicious, the system will automatically trigger additional authentication procedures.
Contact your T. Rowe Price representative to find out how we can take your plan to the next level.