Tested, scanned, analyzed, evaluated and tested again.
Connect continually runs thousands of tests on our software to ensure there are no data breaches. From obsessively scanning our data ports to testing for SQL and other code injections to protecting the website from cross-site scripting, Connect uses several world-class, third-party scanning tools to routinely confirm data security. In addition, we’ve hired our own team of data hackers to continually test our systems.
PCI DSS 3.0 Compliance
PCI DSS is the Payment Card Industry Data Security Standard, a worldwide protocol that was set up to help businesses process card payments securely and reduce card fraud. PCI DSS does this through tight controls surrounding the storage, transmission and processing of cardholder data that businesses handle.
Connect makes sure to encrypt all of your credentials using 256-bit AES standards. This is the same standards that have been adopted by the U.S. Government and are now used worldwide.
Secure Socket Layer (SSL)
SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral. A web server requires an SSL Certificate to create an SSL connection.
Best practices to protect your data.
Protect your computer’s security
Keep your computer and browser software current with security updates.
Install and update anti-virus and anti-spyware software and use personal firewalls to protect your computer.
Be alert to the threats posed by malware (malicious software) which can damage or disrupt your system, or secretly record information such as keystrokes.
Do not enable automatic login to your Connect account or pre-fill the Login ID or password fields.
Change your password periodically and avoid using passwords for Connect that you commonly used for other purposes.
For more information on how to protect your personal computer, including links to vendors providing anti-virus and anti-spyware software, you can visit the Federal Trade Commission’s computer security site. Microsoft Corporation provides additional information specific to the Windows operating system at microsoft.com/security. Users of Apple computers can find security information at apple.com/support/security.
Take steps to safeguard your information to help protect yourself from identity theft. MicroBilt takes steps to protect you from identity theft by:
- Utilizing user identification and authentication procedures before permitting access to Connect;
- Creating a secure transmission connection to Connect. You will see the security padlock in your browser’s frame indicating that it’s a secure site;
- Ensuring our employees are trained to safeguard your information.
You can also help protect your identity and account information. Here are a few steps to remember:
- MicroBilt will never request your Login ID or password, or any other information in either a non-secure or unsolicited email communication;
- Check your credit report regularly for unauthorized activity and protect your personal identification numbers (PINs) or personal data.
Using your computer in a safe manner
Do not share your Login ID and password with anyone;
Check to make sure you are interacting with a secure Web site, as above;
Always log off after completing your activities on Connect;
Be careful about using third-party computers or computers that you are not familiar with such as those in Internet cafés and be careful to ensure you have fully logged out.
Do not provide personal or financial information in response to an email request or by clicking on a link, unless you are able to verify the authenticity of the site to which you are taken through the SSL padlock or other means;
Do not enter personal information into a form within an email message or a pop-up;
Do not open an email if you do not recognize the sender and be particularly cautious of any attachments to emails from unrecognized sources.
You can protect yourself against phishing.
Phishing is the illegal attempt to mislead consumers into providing personal or financial information, including account numbers, passwords and Social Security numbers, via email or through fraudulent Web sites.
The most frequent phishing attacks occur through emails disguised to appear as though they came from a reputable financial institution or company.
Most phishing attempts urge you to update or validate your account information, typically through a link in an email directing you to a fake Web site that appears to be legitimate.
A phishing attack can be detected.
While there are many phishing attacks active on the Internet, there are some typical characteristics:
- An email contains an “urgent” tone requesting your immediate action on an account-related matter;
- An email is sent from a user falsely claiming to be a legitimate company with an attachment. An unsolicited email attachment more than likely contains a virus. Do not open it;
- A pop-up window appears from a user falsely claiming to be a legitimate company’s Web site asking for personal information;