desert-sky-bg

Security

We’re Commited to
Protecting Your Information

Why Security Is Important

Security protects the confidentiality of your financial information and prevents theft of your assets. There is nothing more important to us than knowing that our client’s Internet Banking transactions are private and secure. Our system’s sophisticated security architecture keeps unauthorized users from accessing any of your financial information through the Internet.

About “cookies”

Cookies are commonly used on web sites and do not harm your system. By configuring your preferences or options in your browser, you determine if and how a cookie will be accepted. We use cookies on our Internet Banking system to display information more effectively to you.

Internet Security Overview

One of the basic tools used to ensure Internet security is encryption. Encryption happens as follows: When you go to the sign-on page for online banking, your browser establishes a secure session with our server. The secure session is established using a protocol called Secure Sockets Layer (SSL) Encryption. This protocol requires the exchange of what are called public and private keys. Keys are random numbers chosen for that session and are only known between your browser and our server. After the keys are exchanged, your browser will use the numbers to scramble (encrypt) the messages sent between your browser and our server. Both sides require the keys because they need to de-scramble (decrypt) the messages when they are received. The SSL protocol not only ensures privacy, but also ensures that no other browser can “impersonate” your browser, nor alter any of the information sent. You can tell whether your browser is in secure mode by looking for the secured lock symbol at the bottom of your browser window. The numbers used as encryption keys are analogous to combination locks. The strength of encryption is based on the number of possible combinations that a lock can have. As the number of possible combinations grows, it becomes less likely that anyone would be able to guess the combination in order to decrypt the message. Current versions of today’s browsers offer 128-bit encryption, which results in 2 128 possible combinations. Older browser versions may only offer

40-bit encryption, which we feel is not sufficient in today’s world of sophisticated technology. Our servers require the use of 128-bit capable browsers.

It is also important to verify that only authorized users log into the online banking system. We use password verification to ensure user authorization. When you submit your password, it is compared with the password we have encrypted and stored in our secure data center. We limit the number of times you can enter your password incorrectly. We monitor and record “bad-login” attempts to detect any suspicious activity (i.e., someone trying to guess your password). You play a crucial role in preventing others from logging on to your account. Never use passwords that are easy to guess. Examples of bad passwords are: birth dates, first names, pet names, addresses, phone numbers, social security numbers, etc. Never reveal your password to another person. You should periodically change your password while logged in to our online banking system. We also “time out” an Internet banking session after a specified period of inactivity. This keeps others from viewing or continuing Internet banking activity if you leave your PC unattended. However, we recommend that you always sign off (log out) when you have finished your online banking. All systems are secured with multiple layers of encryption, firewalls, screening, and filtering routers. All sensitive data is protected from direct access from the Internet.

The following measures are employed:
  • Secure Sockets Layer (SSL) Encryption provides a secure channel for data transmission across computer networks using public key cryptography.
  • For added security, we maintain Strong Password Requirements, meaning we require one letter, one numeric character, and a longer password.
  • Firewalls and Redundant Screening/Filtering Routers are gateways that verify the source, destination, and protocol of each data packet before it is sent.
  • Security procedures are audited by an outside firm on an annual basis. Federal Bank examiners review the results of this audit. In addition, an independent security firm routinely performs penetration and security testing on Internet Banking systems.
Electronic Mail

Messages sent by e-mail may not be secured, may be intercepted by third parties and may not be immediately received by the appropriate department at West Valley National Bank. Please do not use e-mail to send us communications that contain confidential information, which we require in writing or which need our immediate attention. Please call us instead at (623) 536-9862. Be aware that a “receipt” acknowledgment on an e-mail message means only that the message has routed into the Internet, not that the message has been received by West Valley National Bank. Urgent or confidential matters should be addressed via phone or in person. Written authorizations should be provided via U.S. mail or in person.