Jake Stampfli

As the Information Systems Security Manager for Pure Financial, Jake leads the day-to-day operations concerning Pure Financials’ Information Security and IT infrastructure. This is to include Servers, Network Operations, Software Requirements, Information Security Policy and Procedures. As a Financial Company, we are beholden to industry standards and framework which requires constant attention and auditing. As [...]

In this digital workshop, Pure Financial Advisors’ Information Systems Security Manager, Jake Stampfli, MSCSIA, provides steps we can all take to keep ourselves safer online. Download Jake’s slides here.

*NOTE: The information in this video presentation and in these slides could be out of date within a year of publication. It’s always a good idea to seek out the most current cyber security information.


  • What is hacking?
  • Keeping your software up to date
  • Practicing good password management
  • Anti-virus and firewalls
  • Wi-fi do’s and don’ts
  • Email
  • Be careful what you click on
  • Backups
  • Using mobile devices safely
  • Encryption
  • Video conferencing in the “new normal”


Pat – If your Facebook posts are limited to friends only does this mean Facebook is hacked?

Nancy – What about password apps that save all passwords, are they safe?

Debbie – Is free software as good as paid software?

Jane – I have Windows 10 and you said to use latest version. Do I need to upgrade?

Emily – Is anti-virus software necessary for the cellphone?

David – Not sure what you mean by Public WIFI…is that what we can get at Starbucks, etc?

Nell – What’s your recommendation for anti-virus software?

Frank – Does using a VPN on a public network provide security?

Kim – How do I get a VPN?

Barbara – Is a personal Hot Spot secure?

Fred – Is Netgear’s Armor security package a good way to secure a home WiFi network?

Jeff – Do I understand you correctly … a Gmail account is more secure than a SBC Global account?

Teresa – Is it a bad idea to utilize the “Unsubscribe Here” link at the bottom of junk e-mails or other mailings not wanted?

Nancy – how do you run a security check on email?

Susan – But is it always safe to unsubscribe? This sometimes lets the Phishers know they have a potential victim. I have always heard it is best to simply delete the email and avoid any response to the phishing attempt.

Louise – Lots of websites ask about cookie preferences, how should these be handled?

David – Are Products such as LifeLock helpful?

Subscribe to our YouTube channel.


• Investment Advisory and Financial Planning Services are offered through Pure Financial Advisors, Inc. A Registered Investment Advisor.

• Pure Financial Advisors Inc. does not offer tax or legal advice. Consult with their tax advisor or attorney regarding specific situations.

• Opinions expressed are subject to change without notice and are not intended as investment advice or to predict future performance.

• Investing involves risk including the potential loss of principal. No investment strategy can guarantee a profit or protect against loss in periods of declining values.

• All information is believed to be from reliable sources; however, we make no representation as to its completeness or accuracy.

• Intended for educational purposes only and are not intended as individualized advice or a guarantee that you will achieve a desired result. Before implementing any strategies discussed you should consult your tax and financial advisors.

• References to any specific product, process, or service by trade name, trademark, manufacturer, or otherwise do not necessarily constitute or imply endorsement, recommendation, or favoring by Pure Financial Advisors, Inc. nor its employees.

MSCSIA: The Masters of Science in Cyber Security and Information Assurance (MSCSIA) degree is earned after successfully completing a bachelor’s degree from an accredited institution. This is a professional degree for those who endeavor through technical and managerial measures to ensure the security, confidentiality, integrity, authenticity, control, availability, and utility of the world’s computing and information systems infrastructure. The degree program has a required core and a required specialization, which can be selected from some alternatives. The core is designed to provide a means of supporting the variety of backgrounds (both education and work experience) that those who wish to study this area may bring to the program. The core is also a statement of the knowledge domain that is common to most efforts in this area. The specializations provide for study in particular domains of knowledge within the field – which are also tied to communities of effort within the field. The typical length of time to complete the program is 1 to 2 years for full-time students.