Ciberseguridad
Proteja su información personal con sólidas medidas de ciberseguridad. Descubra cómo protegemos su información y activos con soluciones de seguridad avanzadas.
Ciberseguridad
Proteja su información personal con sólidas medidas de ciberseguridad. Descubra cómo protegemos su información y activos con soluciones de seguridad avanzadas.
Proteger su información personal es nuestra prioridad
Descubre estrategias esenciales de ciberseguridad para proteger a tu familia.
[00:00:00.58] This session is closed to the press.
[00:00:03.62] Welcome to the JP Morgan webcast. This is intended for informational purposes only. Opinions expressed herein are those of the speakers and may differ from those of other JP Morgan employees and affiliates.
[00:00:16.31] Historical information and outlooks are not guarantees of future results. Any views and strategies described may not be appropriate for all participants and should not be intended as personal, investment, financial, or other advice. As a reminder, investment products are not FDIC insured, do not have bank guarantee, and they may lose value. The webcast may now begin.
[00:00:40.09] [MUSIC PLAYING]
[00:00:53.49] Welcome, everybody, and thank you so much for joining our call today. My name is Kimberly Rose. I'm an executive director, banker, and co-lead of our Women and Wealth organization here at JP Morgan's Private Bank. Today's discussion, we're going to be talking about cybersecurity essentials for you as well as for your family. And I'm thrilled to be joined by two amazing resources that we have on this topic.
[00:01:20.33] Ileana van der Linde is head of our cyber advisory practice here at JP Morgan's Private Bank, and Michelle Maratto, who is also part of our cyber advisory team. The goal of today's conversation is to help educate and empower you on how to protect yourself and your family from what I feel like are the daily barrage of threats that we get online, through email, through voicemails, through texts, and how we protect ourselves from all of that, as well as our children and as well as elderly family members that we may have.
[00:01:55.89] Specifically, today's agenda will be going through safeguarding our children's presence online, common scams targeting older adults, practical cybersecurity tips for our family, and how to use artificial intelligence and chat bots securely. We're going to cover a lot of information in a pretty short period of time, so at the end of this call, we will be sharing additional resources that you can reference. Now I'd like to welcome Michelle and Ileana into the conversation. Do you each want to provide a brief background on yourselves?
[00:02:30.93] Sure. Great to be here today, Kimberly. My name is Ileana van der Linde. I head up cyber advisory as part of the larger Morgan Private advisory team. Our team helps ultra high net worth individuals, their families, as well as their businesses be more secure.
[00:02:47.56] I'm also a part of the cyber advisory team and I support clients in real time situations. A lot of our resources I help create. So happy to be here.
[00:02:56.50] Awesome. Thank you, ladies. So let's dive right in. And I'm going to have my banker hat on, but I also have my mom, my parent hat on. So I'm a mom. I'm also a caregiver to elderly parents. I call myself the household CEO, but the CEO of cybersecurity in my house. And I have to say that having that role as cybersecurity CEO is probably the most stressful role right now.
[00:03:24.82] I feel like I'm responsible for keeping my kids safe, for my parents safe. And let's just tackle this first, maybe with the kids. In my head, social media is one of the most scary places that our kids can go. And in most households, I think we'd like to avoid it altogether. I don't know that that's realistic. So what do we need to about these platforms to help our kids navigate them safely and, in addition, keep our families safe while our kids are on these social media apps?
[00:03:55.55] Great questions, Kimberly. And I think what's really important, before we dive into that, I really actually want to pull back just a bit to talk about why our kids are actually targets. Right? And a lot of us might think, well, I want to protect them. Maybe there's bullies in school and things like that. That absolutely is a factor. But more importantly, you want to also think about your children as an extension of you.
[00:04:24.47] You may actually be the target, but your children and your elderly parents are much easier to get into via their devices, via emails, texts, and things like that. So I think understanding first why are they actually being targeted is an important context to think about. So when we think about it, there are different types of hackers with different motivations.
[00:04:51.67] But when we are targeting, let's say, a child, when they rush home from school, one of the first things they want to do is either social media or the gaming system, and that's a reason why they are primed. There is a tactic in which hackers use social engineering. If I can manipulate a kid into clicking onto something or accepting a friend, right? And Michelle's going to go a little bit deeper into this, but having them provide personal information.
[00:05:25.72] I had a celebrity client who was targeted through her three-year-old's iPad. OK? This kid wasn't even on social media yet, but the hackers targeted the iPad to try to get to the mom. So we've got to understand this is often a bigger thing. But I think children and teens can particularly be vulnerable to social engineering scams due to their limited experience.
[00:05:51.93] They're trying to venture out into the world, be independent and learn, and of course, we want to give them that. But I think helping the children understand this is putting it into a family context. This is also it's bigger than they are. But I think social media platforms particularly make them vulnerable. But I think discussing the risks, having the discussion is the most important part of this.
[00:06:20.99] So I think that when we talk about it, we have there are phishing emails, there's smishing, vishing, all these different things. And we even now have deepfakes which our children are dealing with. Is it real or not? So I think having this discussion is really important. Michelle, you and I often talk to families about social media usage and particularly the social engineering. Maybe you can expand a little bit on this.
[00:06:49.80] Social engineering is one of our top attack methods, right, Ileana? We see our children being targeted in so many different ways. They might receive an email that looks like to be from school, but it's not really. They might get a text message from, hey, it was so nice to meet you. Did I really meet somebody new?
[00:07:06.96] We have to constantly question if things are real. Unfortunately, we've gotten to the space of deepfakes, where our kids are maybe playing video games, and are they really playing with who they think they're supposedly playing with? So we just need to start questioning these channels in a different way. How are we verifying that it is who they say it is on the other side?
[00:07:29.40] Exactly. We've seen cases where somebody says, oh, we met at camp last summer. Did we? Oh, I was at that party you were at last week. So it might not be somebody that you see every day, but you think, oh, cute boy from the party I was at last week? Right? I'll accept that friend request.
[00:07:48.77] We live in such a space where it's like, I want to have all these friends. I want to share my life, and that is fantastic and we want you to do that. But we have to think about doing it in a safe way.
[00:07:58.65] Right. One of the cases, we had a 13-year-old boy was selling his grandfather's baseball card collection to be a little bit entrepreneurial. He had responsibility online, and his parents trusted him with this. But what was happening, he was engaged with people who were buying these cards, and one in particular was asking very specific questions about, oh, so are you home alone after school?
[00:08:27.73] Then wouldn't ask anything. Eight questions later. So what time do you typically get home? Asking very specific questions. And it was an incident in which the authorities had to get involved. So physical security is also an in issue. It isn't just this. But we have to really be mindful that stranger danger exists online as well. So I think the first rule is not to accept invites from people you don't know.
[00:08:59.14] I don't care if you're 7 years old or you're 17 or you're just going into college. It's wanting to make an outside connection. But if you've never met that person in person and you don't know them, it's critical to not accept that. And telling children, we haven't met that person online. That's really important.
[00:09:21.88] I think another aspect of that is that we're so used to oversharing. We love to tell everyone what we're doing. We want to know where everyone's going. But in most cases, it's better not to share. Keep it in. Share it later. Don't do it real time. Luckily enough, this child did end up going to his parents, I believe.
[00:09:40.82] Yes, he did. Yeah, the parents, I think, in this particular incident said, where are you going? And he said, oh, I'm going to be selling cards to somebody. I'm going to the store. And the mother was like, let me first look at that text. And he said, I think it's all fine, mom. But when she looked at the conversation, it was not fine.
[00:09:59.25] So it's really important, I think. Don't overshare. Making sure, don't give your personal information. Don't say, oh, let's play this gaming system. Come to my house at 123 Fillhower Road or something like that. Not OK. And I think just really, it's easy to want to overshare in an online environment because you want the clicks or things like that.
[00:10:24.73] I have another great example.
[00:10:26.44] Yes?
[00:10:26.67] We had a session with a young daughter and her mom, and at the end of the session she raised her hand and she said, after I've been listening to you all, my mom's been sharing so much about my horseback riding camp, where I go, the name of my horse. And I don't think that's smart. So not only did the child learn, the parent learned as well.
[00:10:47.83] And it's just about sharing things differently. Maybe we say we're at the farm and not the-- excuse me, specific location. Maybe we don't share the name of that horse, because maybe that horse's name is a password or something special to you. We don't know.
[00:11:03.62] I think the other thing that we often share are pictures where we are.
[00:11:08.56] Yes.
[00:11:09.61] Taking the geotagging off the camera on your child's device so they don't know that they are at the such and such camp today, or they're at this lake, or that they're at school. This is one of those things where taking the location of the photo that they might send to somebody, can be real trouble.
[00:11:31.15] And Michelle, one of the other things, I think also just anonymizing yourself. Help your children. Of course, it's great to have your email address be your name and things like that, but you also want to anonymize yourself. Have an email without your name in it. Don't put your pet's name, the birthdays, or very specific information. And I think overall, we're trying to reduce the digital footprint of the family.
[00:11:55.47] We're taught that it is with you forever, and now more than ever, it is with you forever. Especially if you're a child growing up on a device, which I think they all are these days.
[00:12:05.40] They are.
[00:12:07.01] These are all fantastic tips. And quite honestly, a lot that I even think about if my kids are doing a little video or that they'll post on YouTube. I make sure they don't have their name of the town or the school we go to. Things like that are always on my mind. So what are the other strategies that parents can use to effectively safeguard their children's online presence?
[00:12:34.26] Well, I think it's really to educate and guide your children. Teaching them the importance of privacy and the potential risks associated with sharing information online. Encourage them to think critically. This isn't just about limiting them, but to think, you have to think about the whole family in what you're posting.
[00:12:55.34] The privacy settings on devices, on cameras is really critical, and we have some resources for those on how you can better secure your devices and your iPads. But also to use age appropriate platforms. Making sure that you do have that discussion with your child on what social media that they're on. In a lot of our sessions, parents are always shocked when they hear--
[00:13:21.86] Secrets are revealed.
[00:13:23.12] Secrets are revealed when we ask children which platforms you're on and their parents have never even heard of them. And use the parental controls. Again, helping your child understand, it's not about me limiting you, but it's making sure I can help you stay safe. So--
[00:13:38.12] Ileana, can we just go back to the privacy settings really quick? Because a lot of times we might just be so easy to click Accept without really reading it. But it's important to think about what these apps have access to. Why do they need my pictures? Why do they need all my contacts? So it's just thinking about how you can use your apps differently. We're not saying take them away, just think about them in a different way.
[00:13:59.93] Yeah.
[00:14:00.20] Yeah.
[00:14:00.62] And we also have a Children and Wealth book that reviews a lot of different topics. But we also have specific cyber sections for the different ages, so that's also a resource that we can use later.
[00:14:14.36] Absolutely. These are all great places to start with, great basics to social media, cybersecurity. Good hygiene, I guess you could call it. I'll share that with my boys. They're teenagers. We have regular conversations about the appropriateness of online activity. I talk about the fact that their digital footprint is forever. We didn't have to deal with this as kids, but they do, and making sure they're very aware of everything they're saying, doing, posting.
[00:14:48.89] It just can live on. Even if they delete it on their side, it might not be deleted on another device. So that is a regular part of our household. I will also say, it's interesting to check in with your schools on how they're handling cybersecurity. In some schools, it's now a part of a computer science class, and kids are getting educated.
[00:15:09.86] And I think it's really a good conversation to have at back to school night this year or whenever you're in touch with the teachers just to say, how are they communicating these type of topics to the kids. Because I think it needs to come from every angle. Sometimes kids hear it from parents and don't want to hear it, but sometimes it lands a little differently when it comes from the school. So all really helpful.
[00:15:31.56] All right. Let's pivot. Talked about the kids. Let's talk about the next generation. The older generation. My mom picks up every call. It doesn't matter if she knows the number or not. She talks to every single person that she meets. My dad will click on every link that you send him. So it is a constant stress point in my family to keep my older parents safe.
[00:15:59.25] And it's getting really hard to decipher what is just really a valid email or phone call and what is fraud. Like, it is something we're all battling with. So let's talk a little bit about how we do keep our parents-- whether elderly or not, let's keep everybody safe. And even if they're not our parents, just elderly family members, friends. What are their best practices there?
[00:16:22.72] Yeah. No, I think you're absolutely right, Kimberly. There are entire hacking groups and cybercriminal groups that are aligned to attack an older generation. They have wealth, they are very trusting, and they're easy pickings, if you will. So it's important-- and our parents on the other side, often unknowingly, they want to be engaged. They are, as you said, picking up every phone call. They're online, but they're super vulnerable to a lot of these scams.
[00:16:53.93] So I think protecting our elderly loved ones from scams is super important. A lot of these scams are increasingly sophisticated in nature. With the facilitation of AI, they seem very legitimate. They're perfect in nature. I think the first thing, again, is to have the discussion with the parents and say, listen, you're part of the larger family and we love you. We're concerned.
[00:17:21.04] And there are emails that can come in that are not real. Having the phone calls and text messages, not doing it in a chastising way, but just in a caring way. I have discussions with my mother. My mother is very cautious now about everything. Does it say which phone number it was from? I don't know. Let them leave a voice message. Or, she will ask me. I got an email or I even got something in the mail.
[00:17:51.18] But scams can be very sophisticated. They often have a sense of urgency, prey on emotion, fear, anger, excitement. Use triggers. I think the ones that are scariest are the ones that sound like a family member is in trouble. And that's where somebody, of course, wants to be helpful. Somebody was kidnapped or it sounds like it's the Sheriff's Office. There's been an accident.
[00:18:17.52] But it's important, I think, to walk through the different types of scams with one's parents. The IRS is not emailing you. They're not calling you. The Sheriff's Department may call you. Will probably not call you, right? I mean, there are loads of things where-- the E-ZPass. You don't have a ticket. You didn't go over this. But they're, I think talking about--
[00:18:39.32] Social Security is OK.
[00:18:40.43] Your Social Security is OK. Right?
[00:18:42.63] That's about it.
[00:18:44.07] You're not going to get a text about this. Exactly. But I think the urgency. Everything is moving so fast. But I think, Michelle, talk a little bit about what we're seeing and how we've advised our clients.
[00:18:57.48] Yeah. I will tell you, we get a call every single day that this incident has occurred. I had a loved one that picked up the phone. They unfortunately engaged. They sent money that they shouldn't have to an individual that they thought was going to help them and/or hurt somebody in their family. And what we're telling all of our clients is to speak to your parents, one.
[00:19:16.88] Be open and honest, but have a plan. And we like to call our plan stop, drop, and call. And that sounds silly, but it does work. We want to stop what you're doing. Think about the situation. Is this real? Am I really getting a call about this? Did I actually order that package? Drop the call. It's OK to be rude at this point. Stop engaging. Don't click on the link. Say something, as Ileana always likes to say, on the stove. You can't pick up.
[00:19:43.28] Right. Right. Find an excuse. I know a lot of our parents don't want to be rude. They can't just hang up a phone. It's very hard for them. So I've also taught my mom just, Bridget, tell them this is a bad time. I have something on the stove. Right? That helps you get out of that situation. Or, I'm driving. I can't talk. Or, I have workmen here. Can't talk right now. And so that helps drop the call.
[00:20:11.15] And the minute you drop that call, you call a trusted person in your family. You talk through the situation. Try and understand, are there certain red flags that I should be more aware about? And if they really need you, they will call you back, or they will message you back. You'll find a way to get in touch with them. Stop, drop, and call. I would advise everyone to go through that tonight.
[00:20:30.41] Yeah. Sometimes we also say, having an important password. A family password. To say, if it really was you-- this is the code I've used. My mom had us all do that even since we were kids. Right?
[00:20:43.96] That's super smart.
[00:20:44.81] There was some emergency.
[00:20:45.80] I think, just with my own parents, we will do role plays. I will literally tell them, somebody's going to call you. It's going to be urgent. It's going to be critical. They're going to say, I'm in distress. Your grandsons are in distress. We're OK. And I just would say, make the assumption we're OK, hang up, and call me. Most likely, I'm going to pick up or the boys are going to pick up. Somebody is going to pick up that you trust and know, and that's the way to handle that. I just kept conditioning them for that type of call to come in, because it's scary.
[00:21:19.03] The other thing I did do is that as my father aged, I did put some limits on his bank accounts with him so that he was just protected. He could never withdraw over a certain amount. We all have those limits individually, but it's a good check in with family members to say, God forbid something did happen and I didn't have my eye on this. Like, how much could he actually get out of his account? So just a couple of other--
[00:21:44.07] Thinking about things differently.
[00:21:45.82] Yes.
[00:21:46.35] And for my own, with my mom, I also said, listen, there's maybe one or two sites you can order from. If you want something from the other sites, I'll do the ordering so that you don't inadvertently click on something. And so on the weekends then we order things together. And that also helps keeps things safe. But again, it's part of a larger discussion.
[00:22:07.87] Yes. And the regular. Same thing with the kids. Like, it's a regular discussion. You have to keep bringing these points to them because I think people can forget or maybe become-- just forget.
[00:22:19.11] It's a daily conversation, like you brush your teeth every day.
[00:22:22.00] Yes. It has to be ingrained. Every time we speak, I always take away some really fantastic tips. What are the top cybersecurity tips that our families should remember from this call?
[00:22:34.66] Overall, as a family, there's some really great things that you can do to keep the whole family safe across all generations. Number one, it's so critical-- and we talk about this in our regular cyber sessions, is to have at least two networks going in the house. Our routers today have the ability to have two. You where you handle your finances, money, and important things should be on the one. Your lovely children, your elderly parents, the gaming system, and all the smart devices in the house should be on the other.
[00:23:08.20] And I will just say, I did this because of your tip because I have kids constantly in and out of my house, logging onto my Wi-Fi where I have all of our life happening. And so I did put in a separate Wi-Fi, and I just feel a little bit better now.
[00:23:24.96] Good, good. Because that's really important. Another thing is also having really good passwords, because we tend to have those easy passwords so that everybody can remember, the dog's name or the favorite vacation place we go or the street we grew up on. Something very common.
[00:23:43.22] In today's age where we're having automated tools and the cyber criminals have automated tools, it's important that you have strong and complex passwords that have-- eight is never enough as far as characters are concerned. Really important. But I think using and becoming familiar with a password manager. And the top three in the marketplace are Dashlane, 1Password, and Keeper. Have a look at one of those. But they can help you really manage your children, your elderly parents, and your own passwords in a much better way.
[00:24:18.51] The other thing is, if you still can't get yourself onto a better password, you must use multi-factor authentication wherever offered on anything you value. Of course, you put it on your bank accounts. But you should also, if you value your personal email account, should have multi-factor or two factor there. But also, if you don't want your children's social media accounts taken over, have them put multi-factor on it.
[00:24:48.75] The airline accounts where you have your passport and your addresses. Two factor. So that's really important. And your health care accounts. And last but not least, anybody with a Social Security number should have frozen their credit. And freezing credit, you're not buying a house, a boat, a car, as I always say every day. There are a few moments.
[00:25:11.49] But your credit is available to be used if you don't freeze it. So it's important to lock it down, if you will, with a passcode. You also need to do this for your children. Because cyber criminals, if they're like, well, this kid won't be using it for five years, I'll use their social. In the meantime, you don't want that ugly when they get to college.
[00:25:33.79] Amazing tips, and this is usually where I say, this is a lot. Take it all in, and you're going to figure out what's important to your family to implement right away. But this is all checklist material, because I think it's all something that needs to be done over time but don't overwhelm yourself and feel like you need to do this minute one. But do you have it as a priority. Another topic I want to ask you about is artificial intelligence. I'm using AI. My kids are. My parents less so. But how do we navigate these chatbots? What do we need to about using them securely?
[00:26:10.31] Well, I think everybody should start using them because it's important to understand what they do, what they do well, and where some of the dangers lie. So when we are using, let's say, a ChatGPT or tools that help you navigate the internet, maybe you're making travel plans or you're trying to figure out a recipe or you need to write that letter in a nicer way. It's a great productivity gain.
[00:26:38.72] But what's really important that many people don't understand is these tools are also learning everything about you. So they're almost doing a reverse search engine on you. So everything you put in, everything specific. So I think first and foremost, if you think a ChatGPT might be the tool that your family uses, buy a license. When you buy a license for this-- and it's just a few dollars a month-- you can also use options to be more secure versus just the public tools.
[00:27:14.10] I would also use a separate email that you use for nothing else to set up the AI tool. Don't use the email that you use for banking to set up your tool. And also, your entire profile. You can even use a VPN to better secure that the AI tool knows which device it's coming from. But I think also, using the tools more securely, closing the browser afterwards, doing a lot of precautions there.
[00:27:44.68] But also, most importantly, turn off model learning. Make sure that in the privacy settings, that you're not allowing everything that you've shared. So I had one family come in, and these were adults, young adults. And the one gentleman brother says, I'm shocked at how much the AI tool knows about us. How can it know all this?
[00:28:11.92] And his sister, grown, also early 20s, says-- turns out she was using this thing as a therapist. So she was telling it everything about herself, about her family. And that's the danger, where you have to really make sure that you're keeping the doors closed on these things. But I think that's really important.
[00:28:35.17] No, it's interesting because even as you're talking, I'm thinking about having that conversation with my kids about-- and we've talked about how they're using it because I'm lucky enough to work with both of you, so I know a lot. They tend to-- actually the positive side. They'll use it to practice math problems. And so we emphasize, that's an OK use. And everything else, I'm like, just run past me before we put it into the ChatGPT for now until we get a better understanding of what's happening. But fantastic tips. Thank you.
[00:29:07.53] Just quickly to circle back. As you were saying, it's learning a lot about you, Ileana. It's going to learn a lot about you and use that against you, unfortunately, via social engineering tactics that we covered earlier. So maybe it'll have an email created that knows you a little bit better because of the information you put into this tool. So I think, like you said, Kimberly, we just have to think about what are we putting in that could be used against us. Scary, but true.
[00:29:32.46] Yes.
[00:29:32.69] Yeah.
[00:29:34.40] Anything else that we didn't cover that you want to bring up?
[00:29:39.90] I think what's really important when we are using chatbots and AI tools, as they're becoming more integrated into our everyday software and things like that, don't just use AI as the golden source. Make sure you're verifying the source. God forbid you book a travel trip and your AI said this is the best restaurant or the best hotel to stay at, and the hotel doesn't exist. It does hallucinate. It makes things up.
[00:30:07.34] So make sure you're verifying the source. Don't use it as facts. As we said, have a license, create a dedicated email, and limit that personal information. But I think it's again, understanding, and as a family, standing strong to make sure that across all generations you realize that you at the center might be the target. It might not be them specifically. It might just be opportunistic.
[00:30:34.47] But other than that, I think we have to be aware that cyber attacks are bigger than just directed at small people and people.
[00:30:43.89] Yeah.
[00:30:44.48] And have that conversation. I know we talk to clients every single day and they're like, can you come talk to my children? Can you come talk to my parents? And I wish I had these conversations growing up. We didn't have what we have now. But it's all about having a plan as well.
[00:30:59.76] Yeah.
[00:31:00.34] I agree. Ileana, Michelle, this has all been fantastic. What are the final takeaways everybody should leave with today?
[00:31:08.47] Well, one, I think across all generations, it's really important to have regular safety talks with all family members. This isn't about limiting them as they're growing or limiting them as they're aging. It's really about keeping the entire family safe. Encourage skepticism towards unsolicited communications, be they a phone call that comes in or a text message or even a friend request.
[00:31:36.52] Have them verify that. Verify suspicious communications with you, with a bank manager, or anything else. It's important. Role play. I love that you role play with your parents and your children as well, to understand how would they handle this, because that can help them prepare. And emphasize not sharing personal information or that oversharing. Not telling me when you're going on vacation and for how long. Anything else, Michelle?
[00:32:05.47] So cyber criminals, they're becoming more and more sophisticated, Ileana. And it's so important to have these conversations with not only your children and your older adults, but everyone in your family.
[00:32:14.60] Yeah. Because believe it or not, 50% of the information that is out there today as part of data breaches is personal information. So this isn't just something that happens to companies. It's very much they're targeting individuals. So it's important to stay cyber safe out there.
[00:32:32.11] Ileana, Michelle, thank you both so much for your time today and all these amazing tips. Thank you all for joining us today. We appreciate you dialing in and trying to get yourself educated on how to protect yourself and your family. And if you enjoyed today's call, feel free to share it with a friend. And if you have questions, because we know did go through a lot today, we will have some additional resources for you, or let your JP Morgan banker know or the person who invited you to this call know what questions you have. We're here for you as a resource. Thank you again for joining.
[00:33:07.74] Thank you for joining us. Prior to making financial or investment decisions, you should speak with a qualified professional in your JP Morgan team. This concludes today's webcast. You may now disconnect.
[00:33:19.63] [MUSIC PLAYING]
(DESCRIPTION)
Text: J.P.Morgan PLEASE NOTE: This session is closed to the press. The views and strategies described herein may not be suitable for all clients and are subject to investment risks. Certain opinions, estimates, investment strategies and views expressed in this document constitute our judgment based on current market conditions and are subject to change without notice. This material should not be regarded as research or as a J.P. Morgan research report. The information contained herein should not be relied upon in isolation for the purpose of making in investment decision More complete information is available, including product profiles, which discuss risks, benefits, liquidity and other matters of interest. For more information on any of the investment ideas and products illustrated herein, please contact your J.P. Morgan representative Investors may get back less than they invested, and past performance is not a reliable indicator of future results. This information is provided for informational purposes only. We believe the information contained in this video to be reliable; however we do not represent or warrant its accuracy, reliability or completeness, or accept any liability for any loss or damage arising out of the use of any information in this video. The views expressed herein are those of the speakers and may differ from those of other J.P. Morgan employees and are subject to change without notice. Nothing in this video a intended to constitute a representation that any product or strategy is suitable for you. Nothing in this document shall be regarded as an offer, solicitation, recommendation or advice (whether financial, accounting legal, tax or other) given by J.P. Morgan and/or its officers or employees to you. You should consult your independent professional advisors concerning accounting legal or tax matters. Contact your J.P. Morgan representative for additional information and guidance concerning your personal investment goals. J.P. Morgan is not responsible for information provided by guest speakers (unaffiliated with J.P. Morgan) or the use by attendees of such information. J.P. Morgan cannot verify the accuracy of guest speaker content, views of statements, and accepts no responsibility for any direct or consequential losses arising from a use. Any discussion of companies/markets by guest speakers should not be interpreted as a recommendation to buy or sell or as an endorsement by J.P. Morgan. INVESTMENT AND INSURANCE PRODUCTS: NOT A DEPOSIT, NOT FDIC INSURED, NOT INSURED BY ANY FEDERAL GOVERNMENT AGENCY, NO BANK GUARANTEE, MAY LOSE VALUE.
(SPEECH)
This session is closed to the press.
Welcome to the JP Morgan webcast. This is intended for informational purposes only. Opinions expressed herein are those of the speakers and may differ from those of other JP Morgan employees and affiliates.
Historical information and outlooks are not guarantees of future results. Any views and strategies described may not be appropriate for all participants and should not be intended as personal, investment, financial, or other advice. As a reminder, investment products are not FDIC insured, do not have bank guarantee, and they may lose value. The webcast may now begin.
[MUSIC PLAYING]
(DESCRIPTION)
A curvy gold line swoops around on a black background. It becomes a signature that reads JP Morgan.
Text: Ideas and Insights. J.P.Morgan PRIVATE BANK. Women & Wealth presents Cybersecurity Essentials for the Family Empowering Families with Knowledge and Tools to Safeguard Their Digital Lives. Kimberly Rose, EXECUTIVE DIRECTOR, BANKER, WOMEN & WEALTH REGIONAL LEAD
(SPEECH)
Welcome, everybody, and thank you so much for joining our call today. My name is Kimberly Rose. I'm an executive director, banker, and co-lead of our Women and Wealth organization here at JP Morgan's Private Bank. Today's discussion, we're going to be talking about cybersecurity essentials for you as well as for your family. And I'm thrilled to be joined by two amazing resources that we have on this topic.
Ileana van der Linde is head of our cyber advisory practice here at JP Morgan's Private Bank, and Michelle Maratto, who is also part of our cyber advisory team. The goal of today's conversation is to help educate and empower you on how to protect yourself and your family from what I feel like are the daily barrage of threats that we get online, through email, through voicemails, through texts, and how we protect ourselves from all of that, as well as our children and as well as elderly family members that we may have.
Specifically, today's agenda will be going through safeguarding our children's presence online, common scams targeting older adults, practical cybersecurity tips for our family, and how to use artificial intelligence and chat bots securely. We're going to cover a lot of information in a pretty short period of time, so at the end of this call, we will be sharing additional resources that you can reference. Now I'd like to welcome Michelle and Ileana into the conversation. Do you each want to provide a brief background on yourselves?
Sure. Great to be here today, Kimberly. My name is Ileana van der Linde. I head up cyber advisory as part of the larger Morgan Private advisory team. Our team helps ultra high net worth individuals, their families, as well as their businesses be more secure.
I'm also a part of the cyber advisory team and I support clients in real time situations. A lot of our resources I help create. So happy to be here.
Awesome. Thank you, ladies. So let's dive right in. And I'm going to have my banker hat on, but I also have my mom, my parent hat on. So I'm a mom. I'm also a caregiver to elderly parents. I call myself the household CEO, but the CEO of cybersecurity in my house. And I have to say that having that role as cybersecurity CEO is probably the most stressful role right now.
I feel like I'm responsible for keeping my kids safe, for my parents safe. And let's just tackle this first, maybe with the kids. In my head, social media is one of the most scary places that our kids can go. And in most households, I think we'd like to avoid it altogether. I don't know that that's realistic. So what do we need to about these platforms to help our kids navigate them safely and, in addition, keep our families safe while our kids are on these social media apps?
Great questions, Kimberly. And I think what's really important, before we dive into that, I really actually want to pull back just a bit to talk about why our kids are actually targets. Right? And a lot of us might think, well, I want to protect them. Maybe there's bullies in school and things like that. That absolutely is a factor. But more importantly, you want to also think about your children as an extension of you.
You may actually be the target, but your children and your elderly parents are much easier to get into via their devices, via emails, texts, and things like that. So I think understanding first why are they actually being targeted is an important context to think about.
(DESCRIPTION)
Social Engineering is one of the top attack methods. Social engineering exploits human psychology rather than technical vulnerabilities. Icons show five different methods, Phishing emails, Smishing, Deepfakes, QR Fishing, and Vishing. The speakers go more into detail.
(SPEECH)
So when we think about it, there are different types of hackers with different motivations.
But when we are targeting, let's say, a child, when they rush home from school, one of the first things they want to do is either social media or the gaming system, and that's a reason why they are primed. There is a tactic in which hackers use social engineering. If I can manipulate a kid into clicking onto something or accepting a friend, right? And Michelle's going to go a little bit deeper into this, but having them provide personal information.
I had a celebrity client who was targeted through her three-year-old's iPad. OK? This kid wasn't even on social media yet, but the hackers targeted the iPad to try to get to the mom. So we've got to understand this is often a bigger thing. But I think children and teens can particularly be vulnerable to social engineering scams due to their limited experience.
They're trying to venture out into the world, be independent and learn, and of course, we want to give them that. But I think helping the children understand this is putting it into a family context. This is also it's bigger than they are. But I think social media platforms particularly make them vulnerable. But I think discussing the risks, having the discussion is the most important part of this.
So I think that when we talk about it, we have there are phishing emails, there's smishing, vishing, all these different things. And we even now have deepfakes which our children are dealing with. Is it real or not? So I think having this discussion is really important. Michelle, you and I often talk to families about social media usage and particularly the social engineering. Maybe you can expand a little bit on this.
Social engineering is one of our top attack methods, right, Ileana? We see our children being targeted in so many different ways. They might receive an email that looks like to be from school, but it's not really. They might get a text message from, hey, it was so nice to meet you. Did I really meet somebody new?
We have to constantly question if things are real. Unfortunately, we've gotten to the space of deepfakes, where our kids are maybe playing video games, and are they really playing with who they think they're supposedly playing with? So we just need to start questioning these channels in a different way. How are we verifying that it is who they say it is on the other side?
Exactly. We've seen cases where somebody says, oh, we met at camp last summer. Did we? Oh, I was at that party you were at last week. So it might not be somebody that you see every day, but you think, oh, cute boy from the party I was at last week? Right? I'll accept that friend request.
We live in such a space where it's like, I want to have all these friends. I want to share my life, and that is fantastic and we want you to do that. But we have to think about doing it in a safe way.
Right. One of the cases, we had a 13-year-old boy was selling his grandfather's baseball card collection to be a little bit entrepreneurial. He had responsibility online, and his parents trusted him with this. But what was happening, he was engaged with people who were buying these cards, and one in particular was asking very specific questions about, oh, so are you home alone after school?
Then wouldn't ask anything. Eight questions later. So what time do you typically get home? Asking very specific questions. And it was an incident in which the authorities had to get involved. So physical security is also an in issue. It isn't just this. But we have to really be mindful that stranger danger exists online as well. So I think the first rule is not to accept invites from people you don't know.
I don't care if you're 7 years old or you're 17 or you're just going into college. It's wanting to make an outside connection. But if you've never met that person in person and you don't know them, it's critical to not accept that. And telling children, we haven't met that person online. That's really important.
I think another aspect of that is that we're so used to oversharing. We love to tell everyone what we're doing. We want to know where everyone's going. But in most cases, it's better not to share. Keep it in. Share it later. Don't do it real time. Luckily enough, this child did end up going to his parents, I believe.
Yes, he did. Yeah, the parents, I think, in this particular incident said, where are you going? And he said, oh, I'm going to be selling cards to somebody. I'm going to the store. And the mother was like, let me first look at that text. And he said, I think it's all fine, mom. But when she looked at the conversation, it was not fine.
So it's really important, I think. Don't overshare. Making sure, don't give your personal information. Don't say, oh, let's play this gaming system. Come to my house at 123 Fillhower Road or something like that. Not OK. And I think just really, it's easy to want to overshare in an online environment because you want the clicks or things like that.
I have another great example.
Yes?
We had a session with a young daughter and her mom, and at the end of the session she raised her hand and she said, after I've been listening to you all, my mom's been sharing so much about my horseback riding camp, where I go, the name of my horse. And I don't think that's smart. So not only did the child learn, the parent learned as well.
And it's just about sharing things differently. Maybe we say we're at the farm and not the-- excuse me, specific location. Maybe we don't share the name of that horse, because maybe that horse's name is a password or something special to you. We don't know.
I think the other thing that we often share are pictures where we are.
Yes.
Taking the geotagging off the camera on your child's device so they don't know that they are at the such and such camp today, or they're at this lake, or that they're at school. This is one of those things where taking the location of the photo that they might send to somebody, can be real trouble.
And Michelle, one of the other things, I think also just anonymizing yourself. Help your children. Of course, it's great to have your email address be your name and things like that, but you also want to anonymize yourself. Have an email without your name in it. Don't put your pet's name, the birthdays, or very specific information. And I think overall, we're trying to reduce the digital footprint of the family.
We're taught that it is with you forever, and now more than ever, it is with you forever. Especially if you're a child growing up on a device, which I think they all are these days.
They are.
These are all fantastic tips. And quite honestly, a lot that I even think about if my kids are doing a little video or that they'll post on YouTube. I make sure they don't have their name of the town or the school we go to. Things like that are always on my mind. So what are the other strategies that parents can use to effectively safeguard their children's online presence?
Well, I think it's really to educate and guide your children. Teaching them the importance of privacy and the potential risks associated with sharing information online. Encourage them to think critically. This isn't just about limiting them, but to think, you have to think about the whole family in what you're posting.
The privacy settings on devices, on cameras is really critical, and we have some resources for those on how you can better secure your devices and your iPads. But also to use age appropriate platforms. Making sure that you do have that discussion with your child on what social media that they're on. In a lot of our sessions, parents are always shocked when they hear--
Secrets are revealed.
Secrets are revealed when we ask children which platforms you're on and their parents have never even heard of them. And use the parental controls. Again, helping your child understand, it's not about me limiting you, but it's making sure I can help you stay safe. So--
Ileana, can we just go back to the privacy settings really quick? Because a lot of times we might just be so easy to click Accept without really reading it. But it's important to think about what these apps have access to. Why do they need my pictures? Why do they need all my contacts? So it's just thinking about how you can use your apps differently. We're not saying take them away, just think about them in a different way.
Yeah.
Yeah.
And we also have a Children and Wealth book that reviews a lot of different topics. But we also have specific cyber sections for the different ages, so that's also a resource that we can use later.
Absolutely. These are all great places to start with, great basics to social media, cybersecurity. Good hygiene, I guess you could call it. I'll share that with my boys. They're teenagers. We have regular conversations about the appropriateness of online activity. I talk about the fact that their digital footprint is forever. We didn't have to deal with this as kids, but they do, and making sure they're very aware of everything they're saying, doing, posting.
It just can live on. Even if they delete it on their side, it might not be deleted on another device. So that is a regular part of our household. I will also say, it's interesting to check in with your schools on how they're handling cybersecurity. In some schools, it's now a part of a computer science class, and kids are getting educated.
And I think it's really a good conversation to have at back to school night this year or whenever you're in touch with the teachers just to say, how are they communicating these type of topics to the kids. Because I think it needs to come from every angle. Sometimes kids hear it from parents and don't want to hear it, but sometimes it lands a little differently when it comes from the school. So all really helpful.
All right. Let's pivot. Talked about the kids. Let's talk about the next generation. The older generation. My mom picks up every call. It doesn't matter if she knows the number or not. She talks to every single person that she meets. My dad will click on every link that you send him. So it is a constant stress point in my family to keep my older parents safe.
And it's getting really hard to decipher what is just really a valid email or phone call and what is fraud. Like, it is something we're all battling with. So let's talk a little bit about how we do keep our parents-- whether elderly or not, let's keep everybody safe. And even if they're not our parents, just elderly family members, friends. What are their best practices there?
Yeah. No, I think you're absolutely right, Kimberly. There are entire hacking groups and cybercriminal groups that are aligned to attack an older generation. They have wealth, they are very trusting, and they're easy pickings, if you will. So it's important-- and our parents on the other side, often unknowingly, they want to be engaged. They are, as you said, picking up every phone call. They're online, but they're super vulnerable to a lot of these scams.
(DESCRIPTION)
Text: Scams come in all forms but have many elements in common. Sophisticated in nature, Creates sense of urgency, Preys on your emotions, (fear, anger, excitement...), Uses triggers, (money, physical/cyber safety, loneliness, lost opportunity...), Encourages you not to tell others. Have regular safety talks and develop a response plan for scams. It's Important to verify suspicious communications with trusted sources.
(SPEECH)
So I think protecting our elderly loved ones from scams is super important. A lot of these scams are increasingly sophisticated in nature. With the facilitation of AI, they seem very legitimate. They're perfect in nature. I think the first thing, again, is to have the discussion with the parents and say, listen, you're part of the larger family and we love you. We're concerned.
And there are emails that can come in that are not real. Having the phone calls and text messages, not doing it in a chastising way, but just in a caring way. I have discussions with my mother. My mother is very cautious now about everything. Does it say which phone number it was from? I don't know. Let them leave a voice message. Or, she will ask me. I got an email or I even got something in the mail.
But scams can be very sophisticated. They often have a sense of urgency, prey on emotion, fear, anger, excitement. Use triggers. I think the ones that are scariest are the ones that sound like a family member is in trouble. And that's where somebody, of course, wants to be helpful. Somebody was kidnapped or it sounds like it's the Sheriff's Office. There's been an accident.
But it's important, I think, to walk through the different types of scams with one's parents. The IRS is not emailing you. They're not calling you. The Sheriff's Department may call you. Will probably not call you, right? I mean, there are loads of things where-- the E-ZPass. You don't have a ticket. You didn't go over this. But they're, I think talking about--
Social Security is OK.
Your Social Security is OK. Right?
That's about it.
You're not going to get a text about this. Exactly. But I think the urgency. Everything is moving so fast. But I think, Michelle, talk a little bit about what we're seeing and how we've advised our clients.
Yeah. I will tell you, we get a call every single day that this incident has occurred. I had a loved one that picked up the phone. They unfortunately engaged. They sent money that they shouldn't have to an individual that they thought was going to help them and/or hurt somebody in their family. And what we're telling all of our clients is to speak to your parents, one.
Be open and honest, but have a plan. And we like to call our plan stop, drop, and call.
(DESCRIPTION)
An older couple looks at their phones. Text: Protecting Family Members from Scams Whether it's a suspicious email or an unexpected phone call, knowing how to respond can make all the difference. She explains the stop, drop and call method outlined on the slide.
(SPEECH)
And that sounds silly, but it does work. We want to stop what you're doing. Think about the situation. Is this real? Am I really getting a call about this? Did I actually order that package? Drop the call. It's OK to be rude at this point. Stop engaging. Don't click on the link. Say something, as Ileana always likes to say, on the stove. You can't pick up.
Right. Right. Find an excuse. I know a lot of our parents don't want to be rude. They can't just hang up a phone. It's very hard for them. So I've also taught my mom just, Bridget, tell them this is a bad time. I have something on the stove. Right? That helps you get out of that situation. Or, I'm driving. I can't talk. Or, I have workmen here. Can't talk right now. And so that helps drop the call.
And the minute you drop that call, you call a trusted person in your family. You talk through the situation. Try and understand, are there certain red flags that I should be more aware about? And if they really need you, they will call you back, or they will message you back. You'll find a way to get in touch with them. Stop, drop, and call. I would advise everyone to go through that tonight.
Yeah. Sometimes we also say, having an important password. A family password. To say, if it really was you-- this is the code I've used. My mom had us all do that even since we were kids. Right?
That's super smart.
There was some emergency.
I think, just with my own parents, we will do role plays. I will literally tell them, somebody's going to call you. It's going to be urgent. It's going to be critical. They're going to say, I'm in distress. Your grandsons are in distress. We're OK. And I just would say, make the assumption we're OK, hang up, and call me. Most likely, I'm going to pick up or the boys are going to pick up. Somebody is going to pick up that you trust and know, and that's the way to handle that. I just kept conditioning them for that type of call to come in, because it's scary.
The other thing I did do is that as my father aged, I did put some limits on his bank accounts with him so that he was just protected. He could never withdraw over a certain amount. We all have those limits individually, but it's a good check in with family members to say, God forbid something did happen and I didn't have my eye on this. Like, how much could he actually get out of his account? So just a couple of other--
Thinking about things differently.
Yes.
And for my own, with my mom, I also said, listen, there's maybe one or two sites you can order from. If you want something from the other sites, I'll do the ordering so that you don't inadvertently click on something. And so on the weekends then we order things together. And that also helps keeps things safe. But again, it's part of a larger discussion.
Yes. And the regular. Same thing with the kids. Like, it's a regular discussion. You have to keep bringing these points to them because I think people can forget or maybe become-- just forget.
It's a daily conversation, like you brush your teeth every day.
Yes. It has to be ingrained. Every time we speak, I always take away some really fantastic tips. What are the top cybersecurity tips that our families should remember from this call?
(DESCRIPTION)
Text: Practical Cybersecurity Tips for the Family. A diagram shows wi-fi networks, passwords, multi factor authentication, and freezing credit. The speakers go into more detail.
(SPEECH)
Overall, as a family, there's some really great things that you can do to keep the whole family safe across all generations. Number one, it's so critical-- and we talk about this in our regular cyber sessions, is to have at least two networks going in the house. Our routers today have the ability to have two. You where you handle your finances, money, and important things should be on the one. Your lovely children, your elderly parents, the gaming system, and all the smart devices in the house should be on the other.
And I will just say, I did this because of your tip because I have kids constantly in and out of my house, logging onto my Wi-Fi where I have all of our life happening. And so I did put in a separate Wi-Fi, and I just feel a little bit better now.
Good, good. Because that's really important. Another thing is also having really good passwords, because we tend to have those easy passwords so that everybody can remember, the dog's name or the favorite vacation place we go or the street we grew up on. Something very common.
In today's age where we're having automated tools and the cyber criminals have automated tools, it's important that you have strong and complex passwords that have-- eight is never enough as far as characters are concerned. Really important. But I think using and becoming familiar with a password manager. And the top three in the marketplace are Dashlane, 1Password, and Keeper. Have a look at one of those. But they can help you really manage your children, your elderly parents, and your own passwords in a much better way.
The other thing is, if you still can't get yourself onto a better password, you must use multi-factor authentication wherever offered on anything you value. Of course, you put it on your bank accounts. But you should also, if you value your personal email account, should have multi-factor or two factor there. But also, if you don't want your children's social media accounts taken over, have them put multi-factor on it.
The airline accounts where you have your passport and your addresses. Two factor. So that's really important. And your health care accounts. And last but not least, anybody with a Social Security number should have frozen their credit. And freezing credit, you're not buying a house, a boat, a car, as I always say every day. There are a few moments.
But your credit is available to be used if you don't freeze it. So it's important to lock it down, if you will, with a passcode. You also need to do this for your children. Because cyber criminals, if they're like, well, this kid won't be using it for five years, I'll use their social. In the meantime, you don't want that ugly when they get to college.
Amazing tips, and this is usually where I say, this is a lot. Take it all in, and you're going to figure out what's important to your family to implement right away. But this is all checklist material, because I think it's all something that needs to be done over time but don't overwhelm yourself and feel like you need to do this minute one. But do you have it as a priority. Another topic I want to ask you about is artificial intelligence. I'm using AI. My kids are. My parents less so. But how do we navigate these chatbots? What do we need to about using them securely?
Well,
(DESCRIPTION)
Text: Keeping Yourself Secure when using AI. Anonymize your profile, Don't make it easy to figure you out, don't get personal. The slide contains more information, which the speakers talk about.
(SPEECH)
I think everybody should start using them because it's important to understand what they do, what they do well, and where some of the dangers lie. So when we are using, let's say, a ChatGPT or tools that help you navigate the internet, maybe you're making travel plans or you're trying to figure out a recipe or you need to write that letter in a nicer way. It's a great productivity gain.
But what's really important that many people don't understand is these tools are also learning everything about you. So they're almost doing a reverse search engine on you. So everything you put in, everything specific. So I think first and foremost, if you think a ChatGPT might be the tool that your family uses, buy a license. When you buy a license for this-- and it's just a few dollars a month-- you can also use options to be more secure versus just the public tools.
I would also use a separate email that you use for nothing else to set up the AI tool. Don't use the email that you use for banking to set up your tool. And also, your entire profile. You can even use a VPN to better secure that the AI tool knows which device it's coming from. But I think also, using the tools more securely, closing the browser afterwards, doing a lot of precautions there.
But also, most importantly, turn off model learning. Make sure that in the privacy settings, that you're not allowing everything that you've shared. So I had one family come in, and these were adults, young adults. And the one gentleman brother says, I'm shocked at how much the AI tool knows about us. How can it know all this?
And his sister, grown, also early 20s, says-- turns out she was using this thing as a therapist. So she was telling it everything about herself, about her family. And that's the danger, where you have to really make sure that you're keeping the doors closed on these things. But I think that's really important.
No, it's interesting because even as you're talking, I'm thinking about having that conversation with my kids about-- and we've talked about how they're using it because I'm lucky enough to work with both of you, so I know a lot. They tend to-- actually the positive side. They'll use it to practice math problems. And so we emphasize, that's an OK use. And everything else, I'm like, just run past me before we put it into the ChatGPT for now until we get a better understanding of what's happening. But fantastic tips. Thank you.
Just quickly to circle back. As you were saying, it's learning a lot about you, Ileana. It's going to learn a lot about you and use that against you, unfortunately, via social engineering tactics that we covered earlier. So maybe it'll have an email created that knows you a little bit better because of the information you put into this tool. So I think, like you said, Kimberly, we just have to think about what are we putting in that could be used against us. Scary, but true.
Yes.
Yeah.
Anything else that we didn't cover that you want to bring up?
I think what's really important when we are using chatbots and AI tools, as they're becoming more integrated into our everyday software and things like that, don't just use AI as the golden source. Make sure you're verifying the source. God forbid you book a travel trip and your AI said this is the best restaurant or the best hotel to stay at, and the hotel doesn't exist. It does hallucinate. It makes things up.
So make sure you're verifying the source. Don't use it as facts. As we said, have a license, create a dedicated email, and limit that personal information. But I think it's again, understanding, and as a family, standing strong to make sure that across all generations you realize that you at the center might be the target. It might not be them specifically. It might just be opportunistic.
But other than that, I think we have to be aware that cyber attacks are bigger than just directed at small people and people.
Yeah.
And have that conversation. I know we talk to clients every single day and they're like, can you come talk to my children? Can you come talk to my parents? And I wish I had these conversations growing up. We didn't have what we have now. But it's all about having a plan as well.
Yeah.
I agree. Ileana, Michelle, this has all been fantastic. What are the final takeaways everybody should leave with today?
(DESCRIPTION)
Key Cyber Takeaways for your family. The speakers go over all the points on the slide.
(SPEECH)
Well, one, I think across all generations, it's really important to have regular safety talks with all family members. This isn't about limiting them as they're growing or limiting them as they're aging. It's really about keeping the entire family safe. Encourage skepticism towards unsolicited communications, be they a phone call that comes in or a text message or even a friend request.
Have them verify that. Verify suspicious communications with you, with a bank manager, or anything else. It's important. Role play. I love that you role play with your parents and your children as well, to understand how would they handle this, because that can help them prepare. And emphasize not sharing personal information or that oversharing. Not telling me when you're going on vacation and for how long. Anything else, Michelle?
So cyber criminals, they're becoming more and more sophisticated, Ileana. And it's so important to have these conversations with not only your children and your older adults, but everyone in your family.
Yeah. Because believe it or not, 50% of the information that is out there today as part of data breaches is personal information. So this isn't just something that happens to companies. It's very much they're targeting individuals. So it's important to stay cyber safe out there.
(DESCRIPTION)
Text: Thank you so much for joining us for this informative discussion. At J.P. Morgan, our team is always here to help you navigate cyber situations. Reach out to your J.R. Morgan team for more information and resources on cybersecurity for you and your family.
(SPEECH)
Ileana, Michelle, thank you both so much for your time today and all these amazing tips. Thank you all for joining us today. We appreciate you dialing in and trying to get yourself educated on how to protect yourself and your family. And if you enjoyed today's call, feel free to share it with a friend. And if you have questions, because we know did go through a lot today, we will have some additional resources for you, or let your JP Morgan banker know or the person who invited you to this call know what questions you have. We're here for you as a resource. Thank you again for joining.
Thank you for joining us. Prior to making financial or investment decisions, you should speak with a qualified professional in your JP Morgan team. This concludes today's webcast. You may now disconnect.
[MUSIC PLAYING]
(DESCRIPTION)
Your investment and potential conflicts of interest. Conflicts of interest will arise whenever JP Morgan Chase Bank, N A, or any of its affiliates (together, JP Morgan) have an actual or perceived economic or other incentive in its management of our clients portfolios to act in a way that benefits JPMorgan. Conflicts will result, for example, to the extent the following activities are permitted in your account: 1, when JP Morgan invests in an investment product, such as a mutual fund, structured product, separately managed account or hedge fund issued or managed by JP Morgan Chase Bank, N A, or an affiliate, such as JP Morgan investment Management Incorporated; 2, when a JP Morgan entity obtains services, including trade execution and trade clearing from an affiliate; 3, when JP Morgan receives payment as a result of purchasing an investment product for a client's account; or 4, when JP Morgan receives payment for providing services, including shareholder servicing, record-keeping or custody, with respect to investment products purchased for a client's portfolio. Other conflicts will result because of relationships that JP Morgan has with other clients or when JP Morgan acts for its own account.
Investment strategies are selected from both JP Morgan and third party asset managers and are subject to review process by our manager research teams. From this pool of strategies our portfolio construction teams select those strategies we believe fit our asset allocation goals and forward looking views in order to meet the portfolio’s investment objective. As a general matter, we prefer JP Morgan managed strategies. We expect the proportion of JPMorgan managed strategies will be high (in fact, up to 100%) and strategies such as, for example, in cash and high quality fixed income, subject to applicable law and any account specific considerations.
While our internally managed strategies generally align well with our forward looking views, and we are familiar with the investment processes as well as the risk and compliance philosophy of the firm, it is important to note that JP Morgan receives more overall fees when internally managed strategies are included. We offer the option of choosing to exclude JP Morgan managed strategies other than cash and liquidity products in certain portfolios. The Six Circles Funds are U S registered mutual funds managed by JPMorgan and sub advised by third parties. Although considered internally managed strategies, JPMC does not retain a fee for fund management or other fund services.
Legal entity, brand and regulatory information, In the United States, bank deposit accounts and related services such as checking, savings and bank lending, are offered by JPMorgan Chase Bank, NA, member FDIC. JPMorgan Chase Bank, NA, and its affiliates (collectively JPMCB) offer investment products, which may include bank managed investment accounts and custody, as part of its trust and fiduciary services. Other investment products and services, such as rokerage and advisory accounts are offered through JPMorgan Securities LLC, JPMS, a member of FINRA and SIPC. Insurance products are made available through Chase insurance Agency, Inc,. CIA, a licensed insurance agency doing business as Chase Insurance Agency Services, incorporated in Florida. JPMCB, JPMS and CIA are affiliated companies under the common control of JPM. Products not available in all states.
In Germany, this material is issued by JPMorgan S E, with its registered office at Taunustor 1, TaunusTurm, 6 0 3 1 0 Frankfurt Am Main, Germany, authorized by the Bundesanstalt fur Finanzdienstleistungsaufsicht, BaFin, and jointly supervised by the BaFin, the German Central Bank, Deutsche BundesBank, and the European Central Bank, ECB. In Luxembourg, this material is issued by JPMorgan S E Luxembourg Branch, with registered office at European Bank and Business Center, 6 Rue de Treves, L 2633, Senningerberg, Luxembourg, authorized by the Bundesanstalt fur Finanzdienstleistungsaufsicht, BaFin, and jointly supervised by the BaFin, the German Central Bank, Deutsche BundesBank, and the European Central Bank, ECB. JPMorgan SE-Luxembourg branch is also supervised by the Commission de surveillance du secteur financier, CSSF, registered under RCS Luxembourg B 2 5 5 9 3 8.
In the United Kingdom, this material issued by JP Morgan S E, London Branch, registered office at 25 Bank Street, Canary Wharf, London, E14 5JP,authorized by the Bundesanstalt fur Finanzdienstleistungsaufsicht, BaFin, and jointly supervised by the BaFin, the German Central Bank, Deutsche BundesBank, and the European Central Bank, ECB: JPMorgan S E London Branch is also supervised by the financial conduct authority and prudential regulation authority. In Spain, this material is distributed by JP Morgan S E, Sucursal en Espana, with registered office at Paseo de la Castellana, 31, 2 8 0 4 6 Madrid, Spain, authorized by the Bundesanstalt fur Finanzdienstleistungsaufsicht, BaFin, and jointly supervised by the BaFin, the German Central Bank, Deutsche BundesBank, and the European Central Bank, ECB. JPMorgan S E, Sucursal en Espana, is also supervised by the Spanish securities market commission, CNMV: registered with Bank of Spain as a branch of JP Morgan S E under code 1 5 6 7. In Italy this material is distributed by JPMorgan S E Milan Branch, with its registered office at Via Cordusio. N3, Milan, 2 0 1 2 3, Italy, authorized by the Bundesanstalt fur Finanzdienstleistungsaufsicht, BaFin, and jointly supervised by the BaFin, the German Central Bank, Deutsche BundesBank, and the European Central Bank, ECB. JP Morgan S E Milan Branch is also supervised by the Bank of Italy and the Commissione Nazionale per le Societa e la Borsa, CONSOB, registered with the Bank of Italy as a branch of JP Morgan S E under code 8 0 7 6: Milan Chamber of Commerce registered number r e a m i 2 5 3 6 3 2 5.
In the Netherlands, this material is distributed by JPMorgan S E Amsterdam Branch, with registered office at World Trade Center, Tower B, Strawinskylaan 1 1 3 5, 1 0 7 7 x x, Amsterdam, the Netherlands, authorized by the Bundesanstalt fur Finanzdienstleistungsaufsicht, BaFin, and jointly supervised by the BaFin, the German Central Bank, Deutsche BundesBank, and the European Central Bank, ECB.: JPMorgan S E Amsterdam branch is also supervised by De Nederlandsche Bank, d n B, and the Autoriteit Financiele Markten, AFM, in THE NETHERLANDS. Registered with the Kamer van Koophandel as a branch of JPMorgan S E under registration number 7 2 6 1 0 - 2 2 0. In Denmark, this material is distributed by JPMorgan S E Copenhagen Branch Filial af JPMorgan S E, Tyskland, with registered office at Kalvebod Brygge 39-41, 1 5 6 0 Kobenhavn v, Denmark, authorized by the Bundesanstalt fur Finanzdienstleistungsaufsicht, BaFin, and jointly supervised by the BaFin, the German Central Bank, Deutsche BundesBank, and the European Central Bank, ECB. JPMorgan S E Copenhagen Branch is also supervised by the Finanstilsynet, Danish FS A, and it's registered with the Finanstilsynet as a branch of JPMorgan S E under code 2 9 0 1 0. In Sweden, this material is distributed by JPMorgan SE Stockholm bankfilial, with registered office at Hamngatan 15, Stockholm, 1 1 1 4 7, Sweden, authorized by the Bundesanstalt fur Finanzdienstleistungsaufsicht, BaFin, and jointly supervised by the BaFin, the German Central Bank, Deutsche BundesBank, and the European Central Bank, ECB. JPMorgan S E Stockholm Bankfilial is also supervised by Finansinspektionen, Swedish FSA: registered with the Finansinspektionen as a branch of the JP Morgan S E.
In Belgium, this material is distributed by JPMorgan S E Brussels branch with registered office at 35 boulevard du regent, 1000, Brussels, Belgium, authorized by the Bundesanstalt fur Finanzdienstleistungsaufsicht, BaFin, and jointly supervised by the BaFin, the German Central Bank, Deutsche BundesBank, and the European Central Bank, ECB. JP Morgan S E Brussels Branch is also supervised by the National Bank of Belgium, NBB, and the financial services and market authority, FSMA, in Belgium: registered with the NBB under registration number 0 7 1 5 .6 2 2.8 4 4. In Greece, this material is distributed by JP Morgan S E Athens Branch with its registered office at 3 Haritos Street, Athens, 1 0 6 7 5, Greece, authorized by the Bundesanstalt fur Finanzdienstleistungsaufsicht, BaFin, and jointly supervised by the BaFin, the German Central Bank, Deutsche BundesBank, and the European Central Bank, ECB. JP Morgan S E Athens branch is also supervised by the Bank of Greece: registered with the Bank of Greece as a branch of JPMorgan S E under code 1 2 4: Athens Chamber of Commerce register number 1 5 8 6 8 3 7 6 0 0 0 1: VAT number 9 9 6 7 6 5 7 7. In France, this material is distributed by JPMorgan Chase Bank, N A Paris Branch, registered office at 14 Place Vendome, Paris, 7 5 0 0 1, France, registered at the registry of the Commercial Court of Paris under the number 7 1 2 0 4 1 3 3 4 and licensed by the autorite de controle prudential et de resolution, ACPR, and supervised by the ACPR and the autorite des marches financiers.
In Switzerland, this material is distributed by JPMorgan Suisse, S A, with registered office address at Rue de Rhone, 35, 1204 Geneva, Switzerland, which is authorized and supervised by the Swiss financial market supervisory authority, FINMA, as a bank and securities dealer in Switzerland. This communication is an advertisement for the purposes of the markets and financial instruments directive, MIFID 2, and the Swiss financial services act, FINSA. Investors should not subscribe to or purchase any financial instruments referred to in this advertisement, except on the basis of information contained in any applicable legal documentation, which is or shall be made available in the relevant jurisdictions as required. In Hong Kong, this material is distributed by JPMCB, Hong Kong Branch. JPMCB, Hong Kong Branch is regulated by the Hong Kong monetary authority and the securities and futures commission of Hong Kong. In Hong Kong, we will cease to use your personal data for our marketing purposes without charge. If you so request. In Singapore, this material is distributed by JPMCB, Singapore Branch. JPMCB, Singapore branch is regulated by the monitoring authority of Singapore. Dealing and advisory services and discretionary investment management services are provided to you by JPMCB, Hong Kong/Singapore Branch, as notified to you. Banking and custody services are provided to you by JPMCB Singapore Branch.
The contents of this document have not been reviewed by any regulatory authority in Hong Kong, Singapore or any other jurisdictions. You are advised to exercise caution in relation to this document. If you are in any doubt about any of the contents of this document, you should obtain independent professional advice. For materials which constitute product advertisement under the securities and futures act and the financial advisors act, this advertisement has not been reviewed by the monetary authority of Singapore. JPMorgan Chase Bank, N A, is a national banking association chartered under the laws of the United States, and as a body corporate, its shareholders liability is limited.
With respect to countries in Latin America, the distribution of this material may be restricted in certain jurisdictions. We may offer and/or sell to you securities or other financial instruments which may not be registered under and are not the subject of a public offering under the securities or other financial regulatory laws of your home country. Such securities and instruments are offered and are sold to you on a private basis only. Any communication by us to you regarding such securities or instruments, including without limitation the delivery of a prospectus, term sheet or other offering document, is not intended by us as an offer to sell or a solicitation of an offer to buy any securities or instruments in any jurisdiction in which such an offer or a solicitation is unlawful. Furthermore, such securities or instruments may be subject to certain regulatory and or contractual restrictions on subsequent transfer by you and you are solely responsible for ascertaining and complying with such restrictions. To the extent this content makes reference to a fund, the fund may not be publicly offered in any Latin American country without previous registration of such funds securities in compliance with the laws of the corresponding jurisdiction.
JPMorgan Chase Bank, N A, JPNCPNA, A B N 43 0 7 4 1 1 2 0 1 1 A F S license number 2 3 8 3 6 7, is regulated by the Australian securities and investment commission and the Australian prudential regulation authority. Material provided by JPMCBNA in Australia is for "wholesale clients" only. For the purposes of this paragraph, the term wholesale client has the meaning given and section 7 6 1 G of the corporations act, 2001. Please inform us if you are not a wholesale client now or if you cease to be a wholesale client at any time in the future. JPMS is a registered foreign company, overseas, ARBN 1 0 9 2 9 3 6 1 0 incorporated in Delaware, USA. Under Australian financial services licensing requirements, carrying on a financial services business in Australia requires a financial service provider such as JPMorgan Securities LLC, JPMS, to hold an Australian financial services license, A F S L, unless an exemption applies. JPMS is exempt from the requirement to hold an A F S L under the corporations act, 2001 and respective financial services it provides to you, and is regulated by the S E C, FINRA and CFTC under U S laws, which differ from Australian laws. Material provided by JPMS in Australia is to wholesale clients only. The information provided in this material is not intended to be and must not be distributed or passed on, directly or indirectly, to any other class of persons in Australia. For the purposes of this paragraph, the term wholesale client has the meaning given in section 7 6 1 G of the act. Please inform us immediately if you are not a wholesale client now or if you cease to be a wholesale client at any time in the future. This material has not been prepared specifically for Australian investors. It may contain references to dollar amounts which are not Australian dollars: may contain financial information which is not prepared in accordance with Australian law or practices ; may not address risks associated with investment in foreign currency denominated investments; and does not address Australian tax issues.
References to JPMorgan are to JPM, its subsidiaries and affiliates worldwide. JPMorgan Private Bank is the brand name for the private banking business conducted by JPM. This material is intended for your personal use and should not be circulated to or used by any other person or duplicated for non-personal use without our permission. If you have any questions or no longer wish to receive these communications, please contact your JPMorgan team. Copyright 2025 JPMorgan Chase & Company. All rights reserved. JP Morgan.
Preguntas frecuentes sobre ciberseguridad
- Algunos sencillos pasos pueden ser de gran ayuda para mantener su información privada más segura.
- Cuanto más larga y compleja sea la contraseña, mejor. Pruebe algo como frase de contraseña, como el título de un libro o de una canción, un verso de un poema o algo que sea único para usted: ¿SeR0N0sEr_EsAEslA? O DONTstop.B3li3v1n.
- No utilice la misma contraseña para varias cuentas.
- Incluya letras mayúsculas y minúsculas, números y caracteres especiales, como " ! & $ * # “.
- Doble contraseñas básicas, agregue caracteres especiales o un prefijo o sufijo para aumentar la fortaleza.
- Considere utilizar un administrador de contraseñas fiable con cifrado para ayudar a organizarlas todas.
La mejor defensa es congelar su crédito. Congelar el crédito, también llamado bloqueo de seguridad, restringe el acceso a su informe de crédito, lo cual dificulta que los ladrones de identidad abran cuentas a su nombre o abusen de su crédito. Una congelación de crédito impide que una persona, comerciante o institución realice una consulta sobre su informe de crédito a menos que levante o elimine temporalmente la congelación, pero su informe de crédito continuará. La capacidad de congelar el crédito varía en cada jurisdicción. Podemos ayudarle si tiene alguna pregunta sobre los requisitos locales.
Su defensa más fuerte contra el robo de identidad es gestionar activamente su seguridad y revisarla periódicamente. Esto incluye el uso de contraseñas fuertes, una red wifi segura y un software antivirus actualizado. También debe considerar cuidadosamente la información social que comparte en línea.
Un ataque de ransomware a menudo se puede prevenir con preparación, fuertes controles cibernéticos y un plan de acción.
Para protegerse:
- Póngase en contacto con sus entidades financieras para colocar alertas en sus cuentas de inmediato.
- Cambie sus contraseñas de las cuentas afectadas o sensibles.
Para proteger a su empresa:
- Asegúrese de tener un plan de recuperación ante desastres y cree múltiples copias de seguridad de datos.
- Realice un análisis del impacto para evaluar las posibles consecuencias y desarrollar estrategias de recuperación.
Si está sufriendo un ataque de ransomware, llame a su equipo de J.P. Morgan inmediatamente.
¿Ha configurado un dispositivo de confianza?
Recursos relacionados y recomendado
Información importante
INFORMACIÓN IMPORTANTE RELATIVA A SITIOS WEB PÚBLICOS DE J.P. MORGAN PRIVATE BANK
Este documento es solo para fines informativos y puede orientarle acerca de determinados productos y servicios ofrecidos por los negocios de gestión de patrimonios de J.P. Morgan, que pertenece a JPMorgan Chase & Co. (“JPM”). Los productos y servicios descritos, así como las comisiones, los gastos y los tipos de interés asociados, pueden sufrir modificaciones de acuerdo con los contratos de cuenta aplicables, además de diferir entre ámbitos geográficos.
No todos los productos y servicios se ofrecen en todas las regiones. Si es una persona con discapacidad y necesita asistencia adicional para acceder a este documento, póngase en contacto con su equipo de J.P. Morgan o envíenos un correo electrónico a accessibility.support@jpmorgan.com para obtener ayuda. Lea íntegramente esta información importante.
RIESGOS Y CONSIDERACIONES GENERALES
Las opiniones, las estrategias y los productos que se describen en este documento pueden no ser adecuados para todas las personas y comportan riesgos. Los inversores podrían recuperar menos del importe invertido y la rentabilidad histórica no es un indicador fiable de resultados futuros. La asignación/diversificación de activos no garantiza beneficios o protección contra pérdidas. Nada de lo incluido en este documento debe utilizarse como único elemento de juicio para tomar una decisión de inversión. Se le insta a analizar minuciosamente si los servicios, los productos, las clases de activos (por ejemplo, renta variable, renta fija, inversiones alterativas y materias primas) o las estrategias que se abordan resultan adecuados en vista de sus necesidades. También debe tener en cuenta los objetivos, los riesgos, las comisiones y los gastos asociados al servicio, el producto o la estrategia de inversión antes de tomar una decisión de inversión. Para ello y para obtener información más completa, así como para abordar sus objetivos y su situación, póngase en contacto con su equipo de J.P. Morgan.
FIABILIDAD DE LA INFORMACIÓN AQUÍ INCLUIDA
Ciertos datos incluidos en este documento se consideran fiables; sin embargo, JPM no declara ni garantiza su precisión, su fiabilidad o su integridad y excluye cualquier responsabilidad por pérdidas o daños (directos o indirectos) derivados de la utilización, total o parcial, de este documento. JPM no formula declaraciones o garantías con respecto a los cálculos, los gráficos, las tablas, los diagramas o los comentarios que pueda contener este documento, cuya finalidad es meramente ilustrativa/orientativa. Las perspectivas, las opiniones, las estimaciones y las estrategias que se abordan en este documento constituyen nuestro juicio con base en las condiciones actuales del mercado y pueden cambiar sin previo aviso. JPM no asume obligación alguna de actualizar la información que se recoge en este documento en caso de que se produzcan cambios en ella. Las perspectivas, las opiniones, las estimaciones y las estrategias que aquí se abordan pueden diferir de las expresadas por otras áreas de JPM y de las opiniones expresadas con otros propósitos o en otros contextos; este documento no debe considerarse un informe de análisis. Los resultados y los riesgos proyectados se basan únicamente en los ejemplos hipotéticos citados y los resultados y los riesgos reales variarán según circunstancias específicas. Las declaraciones prospectivas no deben considerarse garantías o predicciones de eventos futuros.
Nada de lo indicado en este documento se entenderá que da lugar a obligación de asistencia o relación de asesoramiento alguna hacia usted o un tercero. Nada de lo indicado en este documento debe considerarse oferta, invitación, recomendación o asesoramiento (de carácter financiero, contable, jurídico, fiscal o de otro tipo) por parte de J.P. Morgan y/o sus equipos o empleados, con independencia de que dicha comunicación haya sido facilitada a petición suya o no. J.P. Morgan y sus filiales y empleados no prestan servicios de asesoramiento fiscal, jurídico o contable. Consulte a sus propios asesores fiscales, jurídicos y contables antes de realizar operaciones financieras.
INFORMACIÓN IMPORTANTE ACERCA DE SUS INVERSIONES Y POSIBLES CONFLICTOS DE INTERESES
Surgirán conflictos de interés cuando JPMorgan Chase Bank, N.A. o cualquiera de sus filiales (conjuntamente, “J.P. Morgan”) tengan un incentivo real o supuesto, de índole económica o de otro tipo, en la gestión de las carteras de nuestros clientes para actuar de un modo que beneficie a J.P. Morgan. Surgirán conflictos, por ejemplo (en la medida en que las siguientes actividades estén autorizadas en su cuenta): (1) cuando J.P. Morgan invierta en un producto de inversión, como un fondo de inversión, un producto estructurado, una cuenta de gestión separada o un hedge fund que emita o gestione JPMorgan Chase Bank, N.A. o una filial, como J.P. Morgan Investment Management Inc.; (2) cuando una entidad de J.P. Morgan obtenga servicios, incluidas la ejecución y la compensación de operaciones, de una filial; (3) cuando J.P. Morgan reciba un pago como resultado de la compra de un producto de inversión por cuenta de un cliente; o (4) cuando J.P. Morgan reciba un pago por la prestación de servicios (incluidos servicios a accionistas, mantenimiento de registros o custodia) con respecto a productos de inversión adquiridos para la cartera de un cliente. Otros conflictos surgirán por las relaciones que J.P. Morgan mantenga con otros clientes o cuando J.P. Morgan actúe por cuenta propia.
Las estrategias de inversión se seleccionan entre las de los gestores de J.P. Morgan y otros externos y son objeto de un proceso de revisión por parte de nuestros equipos de análisis de gestores. De ese grupo de estrategias, nuestros equipos de elaboración de carteras seleccionan aquellas que consideramos adecuadas conforme a nuestros objetivos de asignación de activos y previsiones a fin de cumplir el objetivo de inversión de la cartera.
Por lo general, preferimos las estrategias gestionadas por J.P. Morgan. Esperamos que el porcentaje de estrategias gestionadas por J.P. Morgan sea alto (de hecho, hasta de un 100%) en estrategias como, por ejemplo, de liquidez y renta fija de alta calidad, con supeditación a la legislación vigente y a cualesquiera consideraciones específicas de la cuenta.
Si bien nuestras estrategias de gestión interna suelen estar bien alineadas con nuestras previsiones y estamos familiarizados con los procesos de inversión y con la filosofía de riesgos y cumplimiento de la firma, debemos señalar que J.P. Morgan percibe en conjunto más comisiones cuando se incluyen estrategias gestionadas internamente. Ofrecemos la opción de excluir estrategias gestionadas por J.P. Morgan (que no sean productos de efectivo y liquidez) en determinadas carteras.
Six Circles Funds son fondos de inversión inscritos en Estados Unidos gestionados por J.P. Morgan y que cuentan con el asesoramiento de terceros. Aunque se consideran estrategias gestionadas a escala interna, JPMC no cobra comisiones por gestionar los fondos o prestar otros servicios conexos.
PERSONAS JURÍDICAS, MARCAS E INFORMACIÓN REGULATORIA
En Estados Unidos, los depósitos bancarios y los servicios relacionados, incluidas las cuentas corrientes, las cuentas de ahorro y los préstamos bancarios, los ofrece JPMorgan Chase Bank, N.A. Miembro de la FDIC.
JPMorgan Chase Bank, N.A. y sus filiales (conjuntamente, “JPMCB”) ofrecen productos de inversión, que pueden incluir cuentas bancarias de inversión gestionadas y de custodia, en el marco de sus servicios fiduciarios y de administración. Otros productos y servicios de inversión, tales como las cuentas de intermediación y asesoramiento, se ofrecen a través de J.P. Morgan Securities LLC (“JPMS”), miembro de la FINRA y la SIPC. Los productos de seguro están disponibles a través de Chase Insurance Agency, Inc. (CIA), agencia de seguros con licencia, que lleva a cabo su actividad como Chase Insurance Agency Services, Inc. en Florida. JPMCB, JPMS y CIA son sociedades filiales bajo el control común de JPM. Productos no disponibles en todos los estados.
En Alemania, este documento lo emite J.P. Morgan SE, con domicilio social en Taunustor 1 (TaunusTurm), 60310 Fráncfort (Alemania), autorizada por la Bundesanstalt für Finanzdienstleistungsaufsicht (BaFin) y supervisada conjuntamente por la BaFin, el Banco Central de Alemania (Deutsche Bundesbank) y el Banco Central Europeo (BCE). En Luxemburgo, este documento lo emite J.P. Morgan SE – Luxembourg Branch, con domicilio social en European Bank and Business Centre, 6 route de Trèves, L-2633 Senningerberg (Luxemburgo), autorizada por la Bundesanstalt für Finanzdienstleistungsaufsicht (BaFin) y supervisada conjuntamente por la BaFin, el Banco Central de Alemania (Deutsche Bundesbank) y el Banco Central Europeo (BCE); J.P. Morgan SE – Luxembourg Branch también está supervisada por la Commission de Surveillance du Secteur Financier (CSSF); inscrita en el Registro mercantil de Luxemburgo con el número B255938. En el Reino Unido, este documento lo emite J.P. Morgan SE – London Branch, con domicilio social en 25 Bank Street, Canary Wharf, Londres E14 5JP, autorizada por la Bundesanstalt für Finanzdienstleistungsaufsicht (BaFin) y supervisada conjuntamente por la BaFin, el Banco Central de Alemania (Deutsche Bundesbank) y el Banco Central Europeo (BCE); J.P. Morgan SE – London Branch también está supervisada por la Autoridad de Conducta Financiera y la Autoridad de Regulación Prudencial. En España, este documento lo distribuye J.P. Morgan SE, Sucursal en España, con domicilio social en Paseo de la Castellana 31, 28046 Madrid (España), autorizada por la Bundesanstalt für Finanzdienstleistungsaufsicht (BaFin) y supervisada conjuntamente por la BaFin, el Banco Central de Alemania (Deutsche Bundesbank) y el Banco Central Europeo (BCE); J.P. Morgan SE, Sucursal en España también está supervisada por la Comisión Nacional del Mercado de Valores (CNMV); inscrita en el Banco de España como sucursal de J.P. Morgan SE con el código 1567. En Italia, este documento lo distribuye J.P. Morgan SE – Milan Branch, con domicilio social en Via Cordusio, n.3, 20123 Milán (Italia), autorizada por la Bundesanstalt für Finanzdienstleistungsaufsicht (BaFin) y supervisada conjuntamente por la BaFin, el Banco Central de Alemania (Deutsche Bundesbank) y el Banco Central Europeo (BCE); J.P. Morgan SE – Milan Branch también está supervisada por el Banco de Italia y la Commissione Nazionale per le Società e la Borsa (CONSOB); inscrita en el Banco de Italia como sucursal de J.P. Morgan SE con el código 8076; número de registro de la Cámara de Comercio de Milán: REA MI - 2536325. En los Países Bajos, este documento lo distribuye J.P. Morgan SE – Amsterdam Branch, con domicilio social en World Trade Centre, Tower B, Strawinskylaan 1135, 1077 XX, Ámsterdam (Países Bajos), autorizada por la Bundesanstalt für Finanzdienstleistungsaufsicht (BaFin) y supervisada conjuntamente por la BaFin, el Banco Central de Alemania (Deutsche Bundesbank) y el Banco Central Europeo (BCE); J.P. Morgan SE – Amsterdam Branch también está autorizada y supervisada por De Nederlandsche Bank (DNB) y la Autoriteit Financiële Markten (AFM) en los Países Bajos. Inscrita en la Kamer van Koophandel como sucursal de J.P. Morgan SE con el número de registro 72610220. En Dinamarca, este documento lo distribuye J.P. Morgan SE – Copenhagen Branch, filial de J.P. Morgan SE, Tyskland, con domicilio social en Kalvebod Brygge 39-41, 1560 København V (Dinamarca), autorizada por la Bundesanstalt für Finanzdienstleistungsaufsicht (BaFin) y supervisada conjuntamente por la BaFin, el Banco Central de Alemania (Deutsche Bundesbank) y el Banco Central Europeo (BCE); J.P. Morgan SE – Copenhagen Branch, filial de J.P. Morgan SE, Tyskland también está sujeta a la supervisión de la Finanstilsynet (la autoridad danesa de supervisión financiera) e inscrita en la Finanstilsynet como sucursal de J.P. Morgan SE con el código 29010. En Suecia, este documento lo distribuye J.P. Morgan SE – Stockholm Bankfilial, con domicilio social en Hamngatan 15, 11147 Estocolmo (Suecia), autorizada por la Bundesanstalt für Finanzdienstleistungsaufsicht (BaFin) y supervisada conjuntamente por la BaFin, el Banco Central de Alemania (Deutsche Bundesbank) y el Banco Central Europeo (BCE); J.P. Morgan SE – Stockholm Bankfilial también está sujeta a la supervisión de Finansinspektionen (la autoridad sueca de supervisión financiera); inscrita en Finansinspektionen como sucursal de J.P. Morgan SE. En Bélgica, este documento lo distribuye J.P. Morgan SE – Brussels Branch, con domicilio social en 35 Boulevard du Régent, 1000 Bruselas (Bélgica), autorizada por la Bundesanstalt für Finanzdienstleistungsaufsicht (BaFin) y supervisada conjuntamente por la BaFin, el Banco Central Alemán (Deutsche Bundesbank) y el Banco Central Europeo (BCE); J.P. Morgan SE Brussels Branch también se encuentra supeditada a la supervisión del Banco Nacional de Bélgica (NBB) y la Autoridad de Servicios y Mercados Financieros (FSMA) en Bélgica; inscrita ante el NBB con el número de registro 0715.622.844. En Grecia, este documento lo distribuye J.P. Morgan SE – Athens Branch, con domicilio social en 3 Haritos Street, 10675 Atenas (Grecia), autorizada por la Bundesanstalt für Finanzdienstleistungsaufsicht (BaFin) y supervisada conjuntamente por la BaFin, el Banco Central Alemán (Deutsche Bundesbank) y el Banco Central Europeo (BCE); J.P. Morgan SE – Athens Branch también está supeditada a la supervisión del Banco de Grecia; inscrita ante el Banco de Grecia como sucursal de J.P. Morgan SE con el código 124; número de registro en la Cámara de Comercio de Atenas 158683760001; número de IVA 99676577. En Francia, este documento lo distribuye J.P. Morgan SE – Paris Branch, con domicilio social en 14, Place Vendôme 75001 París (Francia), autorizada por la Bundesanstaltfür Finanzdienstleistungsaufsicht(BaFin) y supervisada conjuntamente por la BaFin, el banco central alemán (Deutsche Bundesbank) y el Banco Central Europeo (BCE) con el código 842 422 972; J.P. Morgan SE – Paris Branch también está supervisada por las autoridades bancarias francesas Autorité de Contrôle Prudentiel et de Résolution (ACPR) y Autorité des Marchés Financiers (AMF). En Suiza, este documento lo distribuye J.P. Morgan (Suisse) SA, regulada en Suiza por la Autoridad de Supervisión del Mercado Financiero de Suiza (FINMA). J.P. Morgan (Suisse) SA, con domicilio social en rue du Rhône, 35, 1204, Ginebra (Suiza), autorizada y supervisada por la Autoridad Supervisora del Mercado Financiero de Suiza (FINMA), como banco y agente de valores en Suiza.
Esta comunicación constituye publicidad a efectos de la Directiva relativa a los Mercados de Instrumentos Financieros (MiFID II), y la Ley de Servicios Financieros de Suiza (FinsA). Los inversores no deben suscribir ni comprar ningún instrumento financiero mencionado en este documento publicitario si no es basándose en la información incluida en cualquier documento legal aplicable que se esté o vaya a estar disponible en las jurisdicciones relevantes (según se requiera).
En Hong Kong, este documento lo distribuye JPMCB, Hong Kong Branch. JPMCB, sucursal de Hong Kong está regulada por la Autoridad Monetaria de Hong Kong y la Comisión de Valores y Futuros de Hong Kong. En Hong Kong, dejaremos de utilizar sus datos personales para fines de marketing sin cargo alguno si así lo solicita. En Singapur, este documento lo distribuye JPMCB, Singapore Branch. JPMCB, sucursal de Singapur está regulada por la Autoridad Monetaria de Singapur. Los servicios de negociación y asesoramiento, así como los de gestión discrecional de inversiones, se los presta JPMCB, sucursal de Hong Kong/Singapur (según se le notifique). Los servicios bancarios y de custodia se los presta JPMCB, sucursal de Hong Kong/Singapur (según se le notifique). En el caso de los documentos que constituyen publicidad de productos con arreglo a la Ley de valores y futuros (Securities and Futures Act) y la Ley de asesores financieros (Financial Advisers Act), se hace constar que dicha publicidad no la ha revisado la Autoridad Monetaria de Singapur. JPMorgan Chase Bank, N.A. es una sociedad bancaria nacional constituida con arreglo a las leyes de Estados Unidos y, como persona jurídica, la responsabilidad de sus accionistas es limitada. Está registrada como sociedad extranjera en Australia con el número de registro oficial australiano 074 112 011.
En lo concerniente a los países latinoamericanos, puede que la distribución de este documento esté restringida en ciertas jurisdicciones. Es posible que le ofrezcamos y/o le vendamos valores u otros instrumentos financieros que no puedan registrarse y no sean objeto de una oferta pública en virtud de la legislación de valores u otras normativas financieras vigentes en su país de origen. Le ofrecemos y/o vendemos dichos valores o instrumentos exclusivamente de forma privada. Las comunicaciones que le enviemos con respecto a dichos valores o instrumentos —incluidos, entre otros, un folleto, un pliego de condiciones u otro documento de oferta— no tienen como fin constituir oferta de venta o invitación para comprar valores o instrumentos en ninguna jurisdicción en la que dicha oferta o invitación sea ilegal. Además, la transferencia posterior por su parte de dichos valores o instrumentos puede estar sujeta a ciertas restricciones regulatorias y/o contractuales, siendo usted el único responsable de verificarlas y cumplirlas. En la medida en que el contenido de este documento haga referencia a un fondo, el fondo no podrá ofrecerse públicamente en ningún país de América Latina sin antes registrar los títulos del fondo de acuerdo con las leyes de la jurisdicción correspondiente.
Las referencias a “J.P. Morgan” remiten a JPM, sus sociedades dependientes y sus filiales de todo el mundo. “J.P. Morgan Private Bank” es el nombre comercial de la división de banca privada de JPM. Este documento tiene como fin su uso personal y no debe distribuirse a, ni ser utilizado por, otras personas, ni ser copiado para fines no personales sin nuestro permiso. Si tiene alguna pregunta o no desea continuar recibiendo estas comunicaciones, no dude en ponerse en contacto con su equipo de J.P. Morgan.
JPMS es una sociedad extranjera inscrita (exterior) (ARBN 109293610) constituida en Delaware, Estados Unidos. Con arreglo a los requisitos de licencia que regulan los servicios financieros en Australia, llevar a cabo un negocio de servicios financieros en Australia exige que el proveedor de servicios financieros, como J.P. Morgan Securities LLC (JPMS), posea una licencia australiana de servicios financieros (AFSL), a menos que se aplique una exención. JPMS está exenta del requisito de poseer una AFSL conforme a la Ley de sociedades (Corporations Act) de 2001 (Cth) (la “Ley”) en relación con los servicios financieros que le presta y se encuentra regulada por la SEC, la FINRA y la CFTC según las leyes de Estados Unidos, y la responsabilidad de sus accionistas es limitada. El documento proporcionado en Australia se dirige solamente a “clientes mayoristas”. La información incluida en este documento no tiene como fin, ni deberá, distribuirse o transmitirse, directa o indirectamente, a cualquier otra clase de personas de Australia. A los efectos de este párrafo, el término “cliente mayorista” tiene el significado que se le otorga en el artículo 761G de la Ley. Le rogamos nos informe de inmediato si no es un cliente mayorista en la actualidad o si deja de ser un cliente mayorista en cualquier momento en el futuro.
© 2025 JPMorgan Chase & Co. Todos los derechos reservados.