Table of Contents
01 How We Protect You
Moorgan Trade Wealth employs multiple layers of security to protect your account, data, and assets at all times:
AES-256 Encryption
All data is encrypted at rest using AES-256. Communications are secured with TLS 1.3, the latest transport security standard.
Multi-Factor Authentication
MFA is required for all account logins and withdrawal requests, adding an essential second layer of verification.
Cold & Hot Wallet Separation
The majority of client assets are held in cold storage, isolated from internet-connected systems to prevent unauthorised access.
24/7 Threat Monitoring
Our security operations centre monitors for unusual login activity, suspicious transactions, and platform anomalies around the clock.
Regular Penetration Testing
We conduct quarterly independent penetration tests and annual security audits to identify and address vulnerabilities before they can be exploited.
Withdrawal Whitelisting
You can whitelist specific withdrawal addresses on your account, preventing unauthorised transfers to unknown wallets.
02 Account Security Best Practices
The security of your account is a shared responsibility. We strongly recommend the following:
- Use a strong, unique password โ at least 12 characters, combining upper and lowercase letters, numbers, and symbols. Never reuse passwords from other sites.
- Enable MFA immediately โ use an authenticator app (such as Google Authenticator or Authy) rather than SMS where possible.
- Keep your email account secure โ your email is the primary recovery method for your Moorgan Trade account. Enable MFA on your email too.
- Log out after each session โ particularly on shared or public devices.
- Keep software up to date โ ensure your browser, operating system, and antivirus software are always current.
- Use a trusted, private network โ avoid accessing your investment account over public Wi-Fi. Use a VPN if necessary.
- Review your login history โ regularly check your account's session history for any unrecognised access.
If you suspect your account credentials have been compromised, change your password immediately and contact us at Tom@moorgantrade.com. We can place an immediate hold on withdrawals while we investigate.
03 Recognising Phishing & Scams
Cybercriminals frequently impersonate investment platforms to steal credentials and funds. Here is how to stay safe:
Moorgan Trade Wealth will NEVER: ask for your password via email or chat, ask you to send cryptocurrency to a "verification wallet", pressure you to invest urgently, or contact you via WhatsApp, Telegram, or social media DMs claiming to be official support.
Common phishing tactics to watch for:
- Fake emails: Look-alike email addresses (e.g. support@moorgan-trade-wealth.com vs our real address Tom@moorgantrade.com). Check carefully โ one character difference is all a scammer needs.
- Fake websites: Always confirm you are on the correct URL before logging in. Bookmark our website.
- Impersonation calls: We will never call you unexpectedly asking for account details. Hang up and contact us directly if in doubt.
- Too-good-to-be-true offers: Any unsolicited offer promising guaranteed high returns is a major red flag.
If you receive a suspicious communication claiming to be from Moorgan Trade Wealth, do not click any links, and forward it to us at Tom@moorgantrade.com immediately.
04 Investment Fraud Awareness
The investment industry is unfortunately targeted by scams. Being informed is your strongest defence. Common fraudulent schemes include:
- Recovery scams: If you have previously lost money in an investment scam, be alert to people claiming they can recover your funds โ these are almost always scams themselves.
- Social media "experts": Fake investment advisors on Instagram, TikTok, or Telegram showing luxury lifestyles to lure victims. Always verify the legitimacy of any platform before investing.
- Clone firms: Fraudsters copy the names, logos, and regulatory details of legitimate firms. Always verify directly with CySEC or the relevant regulator if you are uncertain about an entity's legitimacy.
- Ponzi schemes: Platforms that pay early investors using later investors' funds, with no real underlying investment activity. Promises of unusually high guaranteed returns are the key warning sign.
Verify any investment firm's credentials at cysec.gov.cy (Cyprus) or your national financial regulator before sending funds.
05 Secure Communication
All official communication from Moorgan Trade Wealth will come exclusively from the following channels:
- Email: Tom@moorgantrade.com โ this is our only official email address.
- Platform notifications: Alerts and updates delivered inside your authenticated account dashboard.
- Our official website only โ communications will always refer you back to our official domain.
We do not use third-party messaging apps (WhatsApp, Telegram, Signal, etc.) as official support channels. Any account claiming to be Moorgan Trade Wealth support on these platforms is not affiliated with us.
06 Incident Reporting
If you believe your Moorgan Trade Wealth account has been compromised, or if you have experienced or witnessed suspicious activity, please act immediately:
- Contact us at Tom@moorgantrade.com โ include "SECURITY INCIDENT" in your subject line for priority handling
- Change your password and revoke all active sessions from your account security settings
- If you have suffered financial loss due to fraud, report it to your local police and the Cyprus Police Cybercrime Unit (cybercrime@police.gov.cy)
We take all security incidents seriously and will respond within four (4) hours for critical account security issues.
07 Vulnerability Disclosure
We welcome responsible disclosure of any security vulnerabilities discovered on the Moorgan Trade Wealth platform. If you identify a potential security issue, please contact us privately before making any public disclosure, giving us reasonable time to investigate and remediate.
Please send vulnerability reports to Tom@moorgantrade.com with the subject line "SECURITY DISCLOSURE". Include a clear description of the vulnerability, steps to reproduce it, and the potential impact.
We appreciate the security research community's efforts to keep our platform and users safe. Responsible disclosures that lead to material security improvements will be acknowledged.