Online Security

QITech considers the security of your financial information a top priority. We take extensive security measures to ensure a safe and reliable online experience for all of our customers.

The first level of security is password protection. To gain access to accounts, users must verify their identity with a password.
The second level of security is firewall protection. All QITech systems are protected with firewalls that limit access to only those customers providing the proper passwords.
The third level of security is 128 bit key SSL encryption . Before data is exchanged between the customer and the bank, it is encoded or scrambled with 128 bit key SSL encryption.

Additionally, the federal government provides significant protection. The same laws protecting you from fraudulent credit card usage also protects you from unauthorized online banking activity.

 Security Tips
Even with all the security precautions we have in place, we need your help in making your accounts as secure as possible. To that end, QITech recommends customers practice the following security measures:
  Keep IDs and passwords confidential
  Use passwords that include letters and numbers that are not easily discernable (do not use birthdays, child's name, etc.)
  Change your passwords frequently
  Use different passwords for each online service

 Firewall Protection
The Internet was not originally designed for open access by the general public. However, the popularity and acceptance of the Internet created the demand for more and more companies to make information available from internal computer systems. One of the ways to meet this need is to install and maintain a security firewall on our computer network.

Although firewall is a new word for many computer users, the concept is not. Firewalls act much like the manager of a safe deposit box vault. When you visit the bank to access to your safe deposit box, you aren't allowed to walk into the vault, search for your own box, conduct your business and leave without speaking to anyone. Instead, you must do this with the safe deposit manager. The manager asks to see identification, confirms who you are with a signature card, and then escorts you to your safe deposit box. Together, you enter the vault and only use separate keys to access your safe deposit box. You are then escorted to a small room where you can transact your business in private. When you are done, you simply reverse the process and a notation is made of who and when your safe deposit box was accessed. The same methodology is programmed into software firewalls. Every request for information is authenticated and provided only to the authorized individual. In addition, all activity passing through the firewall is documented.

 128 Bit Key SSL Encryption
All data exchanged over the Internet is divided into small units and sent in envelope type packets. Upon arriving at the computer that requested the information, the packets are reassembled into the original message. For Internet transactions and communications, you must employ a method of securing these packets as they travel across the Internet.

Secure Socket Layer, or SSL, is a leading method for encrypting and decrypting packets of data as they are exchanged using a code known only to the data's sender and recipient. SSL locks the data so that regardless of the path the data takes as it passes across the Internet, it only can be opened by the end user with the proper key or combination to the lock on the data.
SSL technology is widely accepted today because the combination needed to unlock SSL encrypted data is 128 characters long. Compare this to a briefcase that uses a lock with three combination wheels containing the numbers zero through nine. It would take several hours to try each combination from 000 through 999 to break the code. Imagine the time it would take to pick the lock of a briefcase that had 128 wheels and, in addition to the numbers one through nine, it also had letters A through Z.
The bottom line is that even if someone could sift your packets of data out of the trillions passing through the Internet every minute, it would take so long for someone to unlock each of the SSL-protected packets, that the data would be out of date and useless by the time it was reassembled.

Previous Page

|   Rates    |   Sign Up    |   Trigger Callback    |   Customer Login   |   Security  |