Header Medallion Image


This internet banking system uses industry-leading technology including password-controlled entry, cryptographic protocols, data encryption, firewalls, intrusion detection, and filtering routers. Each security component acts as a layer of protection to safeguard sensitive data from unauthorized users.

Password-controlled access
First, this system requires customer identification through a private login ID and password before you can get into the front-end of the system. You should keep this password and login ID absolutely private.

Transmission Security: Encryption
Once you have logged on correctly, you will enter a secure environment in which you can conduct your transactions. The browser automatically secures the session using cryptographic protocols that provide communications security. Data encryption ensures the data that travels between the Bank and the customer is encrypted.

Information Privacy: Firewalls, Intrusion Detection and Filtering Routers
Finally, once requests arrive at the Bank, the server is protected by a series of firewalls, intrusion detection, and filtering routers, which verify the source and destination of the requests traveling in information packets. The routers and firewalls are set up to reject any unauthorized traffic. The intrusion detection logs every action that comes and goes, to and from our network. This re-emphasizes the importance of the login ID and password, which is the only legitimate entry into the program. This system uses network devices which only allow permitted traffic to go through. The purpose of the router is to keep out traffic that does not emanate from one of the only two legitimate ends of a secured transaction: the customer or the Bank.
It is with the above security measures that your transactions are secured and tracked over the internet.