How Eloan Protects Your Private Information
Securing your personal and financial information is our priority, that's why we want to share all the answer to the question: is eloan safe?
Eloan systems are protected by:
- Firewalls – Used to deny unwanted access to our networks by establishing rules that follow our security policies.
- Secure transmissions – When you log in to Eloan, the information sent is encrypted via SSL (Secure Socket Layer). This way your personal information is protected.
- Security Personnel:
- Customer Contact Center – Eloan customers have access to telephone support in case they suspect they have been victims of fraud.
- Fraud Prevention – specialists monitor unusual account activity and alert customers in order to take quick action if necessary.
- Intrusion Detection – Specialists continuously test to make sure there are no vulnerabilities, ensuring that no unauthorized person has the capacity to access your private information.
We encourage you to always be informed on how to prevent fraud. Below are a few tips on how you can protect yourself.
User ID and Password Guidelines
- Change your password frequently.
- Don’t use the same password for all of your email accounts, online banking and other services that require you to log in to access personal information.
- Never share username and password information with third-party providers.
- Avoid using an automatic login feature that saves usernames and passwords.
- Do not use public or other unsecured computers for logging into your Eloan account.
- Review account balances and transactions regularly and immediately report any suspicious transactions to your financial institution.
- View transfer history available through viewing account activity information.
- Never leave a computer unattended once you are logged in to your accounts.
Fraudulent Emails and Phone Calls
Phishing is an online fraudulent scheme where cybercriminals email or call individuals claiming to be from a credible financial institution in order to obtain his or her personal and/or account information. The scammer may often try to request funds in order to approve a transaction or ask for details in regards to your account. These cybercriminals may also direct you to a false link or website which would allow them to download malicious software onto your computer, access your computer files, capture keystrokes and obtain your confidential information.
What to Look Out for
Phishing scams can be hard to recognize, however, there are signs to watch out for. Be sure to look out for individuals who call/email you on an unsolicited basis and:
- Offer you a loan.
- Request any type of funds or personal information (i.e. account numbers and/or passwords).
- State that your account is at risk of being closed or temporarily suspended.
- Send you unsolicited messages.
- Claim that you need to download security software to update your encryption or SSL Certificates.
- The message contains numerous spelling errors to avoid spam filters.
Here's how to report phishing activity:
- Forward phishing emails to firstname.lastname@example.org. Your report is most effective when you include the full email header, but most email programs hide this information.
- File a report with the Federal Trade Commission at FTC.gov/complaint
- Visit Identitytheft.gov. Victims of phishing could become victims of identity theft; there are steps you can take to minimize your risk.
- Report phishing email to email@example.com. The Anti-Phishing Working Group – which includes ISPs, security vendors, financial institutions and law enforcement agencies – uses these reports to fight phishing.
Tips to Avoid Phishing, Spyware and Malware
- Do not open e-mails from unknown sources. Be suspicious of e-mails purporting to be from a financial institution, government department, or other agency requesting account information, account verification, or banking access credentials such as usernames, passwords, PIN codes, and similar information. Opening file attachments or clicking on web links in suspicious e-mails could expose your system to malicious code that could hijack your computer.
- Never respond to a suspicious e-mail or click on any hyperlink embedded in a suspicious e-mail.
- If an e-mail claiming to be from your financial organization seems suspicious, checking with Eloan is recommended.
- Install anti-virus and spyware detection software on all computer systems. Free software may not provide protection against the latest threats compared with an industry standard product.
- Update all of your computers regularly with the latest versions and patches of both anti-virus and anti-spyware software.
- Ensure computers and mobile devices are patched and updated regularly, particularly operating system and key applications.
- Install a dedicated, actively managed firewall, especially if using a broadband or dedicated connection to the Internet, such as DSL or cable. A firewall limits the potential for unauthorized access to your network and computers.
- Check your settings and select, at least, a medium level of security for your browser.
- Eloan does not use pop-up windows to display login messages or errors and never displays pop-up messages indicating that you cannot use your current browser.
- Be advised that repeatedly being asked to enter your user ID or password are signs of potentially harmful activity.
Tips for Wireless Network Management
Wireless networks can provide an unintended open door to your network. If a wireless network is to be used for legitimate business purposes, it is recommended to secure the network as follows:
- Change the wireless network hardware (router /access point) administrative password from the factory default to a complex password. Save the password in a secure location, as it will be needed to make future changes to the device.
- Disable remote administration of the wireless network hardware (router / access point).
- If possible, disable broadcasting the network SSID.
- If your device offers WPA encryption, secure your wireless network by enabling WPA encryption of the wireless network. If your device does not support WPA encryption, enable WEP encryption.
- If only known computers will access the wireless network, consider enabling MAC filtering on the network hardware. Every computer network card is assigned a unique MAC address. MAC filtering will only allow computers with permitted MAC addresses access to the wireless network.
What to do if you suspect that someone has accessed your personal information
- If you suspect that someone has obtained access to your Eloan accounts or personal information call us at 1-866-576-7283.
- Report identity theft immediately
- Contact the bank, credit card company, or other financial institution, and the three major credit bureaus (Equifax, Experian, and TransUnion).
- Contact the U.S. Federal Trade Commission (FTC) at ftc.gov/idtheft, or call toll free: 1-877-438-4338.