
The Information Security Team continually monitors AJ Bell’s network and its perimeter for irregular or suspicious activity that might indicate criminal activity or a vulnerability. Beyond our network perimeter we use threat intelligence to inform us of new risks that we may face, such as criminals creating domains to impersonate AJ Bell and its products. In addition to monitoring and investigating issues, another essential element of the team’s activities is increasing user awareness of threats such as phishing, and providing technical guidance on the technology we deploy.