Steps to securing your account
If you notice any unfamiliar activity on your account, there is a chance someone else is using it without your permission. The following steps are ways to identify suspicious activity, regain access to your account, and further protect your account.
How to spot suspicious activity
Suspicious activity is considered to be the following:
Your account is unexpectedly suspended.
Your account has signed in from an unfamiliar location, IP address, or device.
You notice unrecognized activity (ie. getting a notification for an action you did not perform).
If you experience any suspicious activity, we recommend that you continue to monitor your account. If you suspect someone has gained access to your account, we advise you to change your password, security questions and answers immediately.
How to regain access to your account
If you suspect your password has been compromised:
Try signing in with your current password, if you are not able to do so, proceed to the next step. If you are able to sign in with your current password, we advise you to reset your password and read "How to spot suspicious activity".
Reset your password by clicking the “Forgot’s name match.
Check if the email is authenticated.
Check the email content for anything suspicious. Things to be aware of include:
Poor grammar and spelling - fraudulent emails tend to have poor spelling and grammar.
Conflicting signatures - different names and signatures may appear, lacking consistency.
A sense of urgency - fraudulent emails will try to cause panic so that you act rashly.
Hover over any links before you click on them. If the URL of the link does not match the description of the link, it might be leading you to a phishing site. Note that any links to your client portal should always start with "your organization".piersight.com.
Check the message headers to make sure the “from” header isn’t showing an incorrect name.
If you suspect an email is suspicious do not click any links or open attachments. If you are unsure of the legitimacy of an email, please contact your advisor directly.
Avoid suspicious requests
Never give out your password. We will never ask you for any personal information such as your password in an email, phone call, or message.
Do not click links in emails, webpages, or pop-ups from untrusted websites or senders.
Do not reply to suspicious emails or phone calls.
Avoid using the same password across multiple sites
If another account was recently compromised, using the same password could allow the hacker to access multiple sites.
Use a unique, strong password for your account.
Use a password manager to help generate and manage strong, and unique passwords.
Avoid signing into your account with public devices
Sign in to your account with devices you normally use (ie. your computer at home).
In this case, you need to sign in on a public device (e.g. library computer) and use private browsing to ensure the browser does not store any of your activity (ie. cookies, browsing history, etc.).