Member Sign In   
Internet Security
At, we're committed to protecting the security of your account information when you use's online services. We have extensive security features to ensure that you can use our services in a safe and private online environment.
While we are doing all we can to safeguard your information, there are also important measures you can take to protect yourself when you bank online. Please take the time to read over this valuable security information, and be sure to share it with any friends or family members who also use online services.
Maintaining the care, control and confidentiality of your Client Access Account ID and password is your responsibility. and its affiliates are not responsible for unauthorized access to accounts online or losses that occur as a result of you voluntarily disclosing your Client Access Account ID or password, or the careless or improper handling, storing or disclosure by you of this information. In the event of misuse or compromise of your Client Access Account ID and/or password, must be notified within a reasonable time.
If you suspect unauthorized activity has occurred in your account(s), email us immediately at
You are a vital part of the security effort - we can't do it alone.
How Protects You
How Protects You
Information security and protecting your privacy are fundamental to the way we do business at All employees of the are aware of the procedures that must be taken to safeguard customer information. It is specified in our employment agreements and regularly confirmed in writing.'s Privacy Code sets out our commitment to you to protect your information.
Responsibility for ensuring that we have thorough security standards to protect our systems and your information against unauthorized access and use rests with We keep up-to-date with ever-evolving security issues, tools and methodologies. We consult with all areas of to ensure that appropriate security controls are built into's procedures, systems and software.
USE SECURE FIREWALLS AND COOKIES uses secure firewalls to prevent unauthorized access to our internal systems. We have Internet firewalls designed to securely separate the Internet from our internal computer systems and databases. Data coming from customer computers via the Internet flows through a series of safety check points on its way to our internal systems so that only authorized messages and transactions enter our computer systems.
We use cookies as an additional security feature for clients. There are two common types of cookies that we use, "session cookies" and "persistent cookies".
Session cookies store information only for the length of time that you are connected to a website - they are not written onto your hard drive. Once you leave the website, the originator of the cookie no longer has the information that was contained on it. For example, when you login to and are authenticated through your login id and password, a cookie will store the identification number of your browser. Throughout your session, the session cookie acts as a type of digital signature to identify your current session to the Web Server.
The information stored in "persistent cookies" is written onto your hard drive and remains there until the expiry date of the cookie. uses persistent cookies to store non-sensitive information that you are aware of and have agreed to. For example, if you choose the option on our login screen to remember your Client Access Account ID, the system will remember and automatically input your logon id each time you use the service.
Your Client Access Account ID password is your key to accessing your accounts.
  • Choose unique passwords that you can remember so that you do not have to write them down. A combination of letters and numbers must be used for better protection.
  • Do not use passwords that are easy for others to guess such as birthdays, family names or telephone numbers.
  • Ensure that AutoComplete or other memorized password functions on your browser are disabled.
  • Saving passwords on your computer, on the Internet or on any software is not a good idea. It allows anyone with access to that information the ability to potentially impersonate you.
  • Never disclose your password(s) to anyone, especially online, not even to the police, your financial institution or your Internet Service Provider.
  • Change your password every 90 days, to help protect the security of your information.
If you believe that your password has been compromised, you should change it immediately and contact us at 1-888-824-4351, or by email,
You should use a firewall to protect your home network and family from offensive websites and potential hackers. Firewalls help prevent unauthorized access to or from your computer by filtering the information coming through the Internet connection into your computer. They will only allow in the connections that are known and trusted.
If you do not have a firewall installed on your computer, any personal information stored on your computer or distributed using the web may be accessed by a hacker for as long as your computer is connected to the Internet. This is especially true for high-speed Internet connections which generally maintain the same network address, increasing the window of opportunity for attacks. A dial-up connection uses a different network address every time it connects.
You can restrict traffic that travels through your firewall so that only certain types of information can get through. The best approach is to limit your exposure by only granting access to those programs and/or traffic that you are familiar with.
As an additional precaution, if you are using a Windows Operating System and you do not share files or documents with other computers on your network, you should disable the Windows File sharing feature. Doing so, will prevent others from being able to download or view your files or documents.
Anti-Virus Software
Your computer can become infected with a virus through email attachments, from content you download from a website or from a diskette or other media (CD-ROM, DVD, ROM, USB drive, etc) someone shares with you. It is a good idea to install anti-virus software on your machine because viruses can appear at any time. This helps prevent your computer from becoming infected and your files from being corrupted or lost.
Anti-virus software can detect viruses and clean your computer so that the viruses do not spread. It is very important to ensure that you have and always use up-to-date anti-virus software, from a reputable vendor, that is capable of scanning files and email messages for viruses. This will help prevent your files from being corrupted or lost. Most anti-virus programs include an auto-update feature that enables the program to download profiles of new viruses so that it can check for the new viruses as soon as they are discovered.
Register new anti-virus software immediately, and choose to be notified automatically of product updates if the software vendor offers that option. Remember, new viruses are constantly being discovered therefore it is important to keep your anti-virus software updated.
Anti-Spyware Software
Spyware is a term used to describe software installed on your computer that displays advertisements and/or tracks and collects personal information. The information collected often includes: User ID's, passwords, name and address. Your computer can become infected with spyware through email attachments or from FREE content that you download from a website. This software is often installed on your computer without your consent.
Anti-spyware software can detect malicious programs running on your computer and clean your machine. It is important that you have and always use up-to-date anti-spyware software. Register new anti-spyware software immediately, and choose to be notified automatically of product updates if the software vendor offers that option.
Always take advantage of software updates so that your browser and operating system have the latest security updates to help reduce your computer's vulnerability. To be sure that you are able to download all of the latest updates you should always use a legally licensed operating system and browser. Most operating systems and browser versions offer the ability to be notified automatically of product updates, we recommend that you use this feature.
If you use a wireless connection, additional steps should be taken to protect your Internet Connection. Detailed information can be found by following the link below.
Online fraud includes phishing, which is a scam where the perpetrator sends out authentic-looking emails appearing to come from a legitimate company in an effort to phish (pronounced "fish") for personal and financial information from the email recipient. If you receive one of these emails, delete it immediately and do not respond or act on it. Always remember, will never send customers emails asking for passwords, Client Access Account ID or personal information.
If you receive a suspicious message that you think may be a phishing email, remember:
  • Do not provide personal or financial information to anyone in an email.
  • Be suspicious of email attachments from unknown sources. If you do not know or recognize the sender of the email, do not open the attachment.
  • Do not click on links in email messages. A link in a phishing email will take you to a fraudulent website designed to look genuine. If you want to log in to one of our online services, type the URL into the Address/Location window on your web browser or click on a link in a favourites list that you have created.
  • Do not be tricked by offers of money or threats of legal action. will never send you an email regarding such matters.
  • Do not be fooled by warnings about "security compromises" or "security threats". The people who send phishing emails will often make claims like these to frighten you into disclosing personal information to resolve the supposed threat.
  • Do not set your email program to "auto-run" attachments. Always check that emails you have received do not contain viruses by running your anti-virus software when the email attachment is received.
Keep Your Wireless Network Safe
At the core of most Wi-Fi home networks is an access point or router. To set up these pieces of equipment, manufacturers provide Web pages that allow owners to enter their network address and account information. These Web tools are protected with a login screen (username and password) so that only the rightful owner can do this. However, for any given piece of equipment, the logins provided are simple and very well-known to hackers on the Internet. Change these settings immediately.
All Wi-Fi equipment supports some form of encryption. Encryption technology scrambles messages sent over wireless networks so that they cannot be easily read by humans. Several encryption technologies exist for Wi-Fi today. Naturally you will want to pick the strongest form of encryption that works with your wireless network. However, the way these technologies work, all Wi-Fi devices on your network must share the identical encryption settings. Therefore you may need to find a "lowest common denominator" setting.
Access points and routers all use a network name called the SSID. Manufacturers normally ship their products with the same SSID set. For example, the SSID for Linksys devices is normally "linksys." True, knowing the SSID does not by itself allow your neighbors to break into your network, but it is a start. More importantly, when someone finds a default SSID, they see it is a poorly configured network and are much more likely to attack it. Change the default SSID immediately when configuring wireless security on your network.
Each piece of Wi-Fi gear possesses a unique identifier called the physical address or MAC address. Access points and routers keep track of the MAC addresses of all devices that connect to them. Many such products offer the owner an option to key in the MAC addresses of their home equipment, that restricts the network to only allow connections from those devices. Do this, but also know that the feature is not so powerful as it may seem. Hackers and their software programs can fake MAC addresses easily.
In Wi-Fi networking, the wireless access point or router typically broadcasts the network name (SSID) over the air at regular intervals. This feature was designed for businesses and mobile hotspots where Wi-Fi clients may roam in and out of range. In the home, this roaming feature is unnecessary, and it increases the likelihood someone will try to log in to your home network. Fortunately, most Wi-Fi access points allow the SSID broadcast feature to be disabled by the network administrator.
Connecting to an open Wi-Fi network such as a free wireless hotspot or your neighbor's router exposes your computer to security risks. Although not normally enabled, most computers have a setting available allowing these connections to happen automatically without notifying you (the user). This setting should not be enabled except in temporary situations.
Most home networkers gravitate toward using dynamic IP addresses. DHCP technology is indeed easy to set up. Unfortunately, this convenience also works to the advantage of network attackers, who can easily obtain valid IP addresses from your network's DHCP pool. Turn off DHCP on the router or access point, set a fixed IP address range instead, then configure each connected device to match. Use a private IP address range (like 10.0.0.x) to prevent computers from being directly reached from the Internet.
Modern network routers contain built-in firewall capability, but the option also exists to disable them. Ensure that your router's firewall is turned on. For extra protection, consider installing and running personal firewall software on each computer connected to the router.
Wi-Fi signals normally reach to the exterior of a home. A small amount of signal leakage outdoors is not a problem, but the further this signal reaches, the easier it is for others to detect and exploit. Wi-Fi signals often reach through neighboring homes and into streets, for example. When installing a wireless home network, the position of the access point or router determines its reach. Try to position these devices near the center of the home rather than near windows to minimize leakage.
The ultimate in wireless security measures, shutting down your network will most certainly prevent outside hackers from breaking in! While impractical to turn off and on the devices frequently, at least consider doing so during travel or extended periods offline. Computer disk drives have been known to suffer from power cycle wear-and-tear, but this is a secondary concern for broadband modems and routers.
If you own a wireless router but are only using it wired (Ethernet) connections, you can also sometimes turn off Wi-Fi on a broadband router without powering down the entire network.

   Powered by    gatewayiQ    © 2009 Inc. All rights reserved. Privacy Policy | Legal | Internet Security