top of page

English Living
News & Trends

How to protect your wealth online 


An estimated 30,000 websites are hacked globally daily, with 43% of all cyberattacks targeting small businesses. Such is the scale of the issue that a cyberattack occurs every 39 seconds and costs US$10.5 trillion each year*.


Altoo is an advanced wealth aggregation management system that empowers wealthy individuals and their families to consolidate and interact intuitively with their total wealth. The software company is working to change the tide of cybersecurity threats with industry-leading systems and monitoring. Amongst its many pioneering features include three-factor authentication. 


“The cybercrime industry is on a steep rise, as many studies show, and it is now a multi-billion market,” says Stefan Thiel CTO of Altoo.


He adds: “With the Internet of Things, and an ever-increasing number of devices reachable by internet, from everywhere by everyone, the potential threats become even more manifold. Organisations must implement even more robust cybersecurity measures to prevent sophisticated attacks.”


Re-imagining online wealth management security 


Altoo features highly encrypted communication and storage tools, a very fine granular and sophisticated authorization mechanism, intrusion detection and advanced security vulnerability testing, to name just a few of its many security features. 


“Our platform is operated in a professional Tier3 data centre in Switzerland with all the strict measures that protect physical access to our hardware,” Thiel explains. “Additionally, our platform is produced and resides only in Switzerland, and we hire only people based in Switzerland, ensuring a higher level of cyberattack protection.”

unnamed copy.jpg

He adds: “We monitor thousands of emails daily and have a lot of phishing emails, of which 98% are caught by our email filter. A few sophisticated emails that are able to bypass our systems are often announced to ITOps [IT Operations] by employees or seen by ITOps, and these then help us improve our email filter rules continuously.


“We also have brute force URL scanning (attacks) to our platforms (https/443). The source IPs of such URL scans are banned after only a very few improper requests to block extensive scans or even misusage.”


Ransom protection is a key part of protecting a system from cyber attacks. 


“Ransom is usually also about stealing data and threatening to publish confidential data. That is why we store very sensitive data only in an encrypted manner. Segmentation adds further hurdles for any ransom to spread. We have multiple network segments protected by inner and outer firewalls. Additionally, we use concepts such as “jump hosts” (hardened virtual desktops without access to the internet) to protect access to sensitive infrastructure and data.



“Additionally, we use different operating systems in different segments, which adds further hurdles for any ransom malware to spread. We also have different communication services in different, separated locations in order to ensure communication with authorities and clients in case of a [partially] successful attack.”


Protecting yourself online 

Thiel recommends that all online users follow a general checklist to protect themselves from cybersecurity attacks. These include:  


-   Having endpoint device security installed

-   Not installing unnecessary applications, especially ones that are for fun

-   Exercise caution around freeware – one must understand the motivation/how somebody earns his money; often,    freeware is free because the user, his data or behaviour, is the product they make money with.

-   Stay updated – most serious products will update themselves regularly.

-   Don’t fall for any promises – most promises are so primitive, for example, you won’t win a lottery if you did not participate. You won’t inherit from unknown people. The sad thing is that people are still fooled by these phishing emails.

-   Finally, keep offline backups of important data.


Thiel also recommends that those at the forefront of preventing cybersecurity stay updated with the latest threats by attending leading industry events. However, he cautions that they should be attended only by those with a full understanding of the industry.  


“Security is a major money-making business working with the fears of people that do not understand cybersecurity,” Thiel explains. 


“Everything labelled security implicitly has a much higher price. Such conferences provide a very good product and service overview if you know and understand the threats in your situation and your protection needs. One of the key things that security providers do not tell you is that by adding products and services to your dispositive is adding attack points (threat vectors) as well, which you must consider. A good example of this was the 2020 cyberattack on SolarWinds when more than 18,000 customers installed malicious updates,” he adds. 

For More Information Visit
©2023.English Living.All Rights Reserved.
bottom of page