Contact Us
Products & Services Advantages Register Site Features
Home
Advantages

Security Center


Safeguarding your sensitive information is among our top priorities!



First and foremost, we will NEVER contact you by phone, e-mail, or otherwise to ask for your online account access information or any sensitive personal information. If someone calls or e-mails asking for it, simply do not respond. Call our sales team instead if you have any questions or just aren't sure if you should reply.

In this Security Center you'll find additional information on some of what we do to protect your information, what steps you can take to protect yourself, and what to do in case you suspect fraud.

How We Protect You

Here you will find information on some of the steps we take to protect your sensitive information.

We have established a number of safeguards designed to protect the security of your information. Here are just a few examples:

  1. Encryption: We encrypt all information between your computer and our site with secured browser connections.

  2. Security Firewalls: The computer servers that run our site are protected by firewalls. Firewalls are security devices that protect the network traffic and connections between your computer and our servers.

  3. Automatic Session Timeouts: If you are logged into our secure sites and are idle for a period of time, your session will time out. This means that your session will end and you will be required to log in again.

  4. Email confirmation of password recovery and one-time password: If you forgot your password and need to recover it, you must go through a secure process to recover access. You'll be presented with security questions and will be required to provide some personal information before an email with a one-time password will be sent to your email address of record.

  5. Security questions: When you register for Leasing Source, you'll be asked to answer three security questions. Each time you return to the site, you'll be presented with one of the questions to answer.

  6. Emails you receive from us: Email notifications and subscriptions are controlled from the My Profile link in the upper right corner. You can select to Opt in and Opt out of any Notification you have permission to receive - that way you know if an email you receive should be expected from us (but remember, we'll NEVER email you to ask for account access information or sensitive personal information).

  7. Additional authentication: The first time you log into the site, you will be asked to modify the initial password given to you and setup your password recover (#5) above.

Login Recommendations

Your actions influence the overall security of your sensitive information. Here you'll find some important steps you can take to help protect your information.

Your actions influence the overall security of your sensitive information. Here are some important steps you can take to help protect your information:

  1. Create a strong password: It should have a minimum of eight characters, use numbers, letters (both upper and lower case) and punctuation. Avoid using information that someone could easily guess, like common names or words and personal information (e.g., your child's name). It is additionally recommended that you periodically change your password. The Leasing Source password strength meter is designed to help you determine whether the password you are choosing is strong enough.

  2. If you have more than one online account, create a unique password for each one. Do not use the same password at different financial sites.

  3. Do no store your passwords near your computer. Memorize or keep them in a secure place that is not accessible to others.

  4. Avoid using a public or shared computer to access financial sites: If you must use a public computer to access a secure site, make sure to clear the Internet browsing history, cache, and any cookies stored (but keep in mind that you may not be able to delete all cookies, even if you attempt to do so).

  5. Clear the cache of your browser: Browsers usually cache (locally store) images of downloaded pages to speed up your computer's performance. After you visit a secure site, you should always clear your cache to make sure that no one else can view confidential information you've downloaded. You should refer to your particular browser's instructions for doing so. This is particularly important on shared or public computers.

  6. Log out when you are done: Make sure you log out to ensure that your session has been closed. The logout button in Leasing Source appears on the upper right hand of the screen.

  7. Close all browser windows when you are done: You should also consider closing all of your browser's windows as an additional way of helping to prevent others from using your access.

  8. If you use a wireless network, make sure it is secured. If you use an unsecured wireless network, fraudsters may be able to monitor your activity. Never connect to unrecognized networks.

General Recommendations

Here are some recommendations on what you and your business can do to keep your sensitive information and your computer secure.

Here are some recommendations on what you can do to keep your information secure:

  1. Protect your business. Small businesses in particular have been increasingly targeted by criminals seeking sensitive information regarding both a business and its customers. Criminals may use this information to harm you, your business, or your customers.

    1. You should periodically monitor your financial accounts for unusual activity. You may wish to sign up to receive notices about fund transfers from your financial accounts if that feature is available.
    2. Conduct a risk assessment and make a plan. Our Additional Resources section has links to a number of sites you can access for guidance on what steps to take next. For example, the federal government's www.OnGuardOnline.gov has a section dedicated entirely to small businesses, including links to other helpful resources.
  2. Share information carefully. Do not respond to suspicious requests for personal or sensitive information over the phone or by email. You also should not share your personal information on social networking sites. Criminals look for Social Security number, date of birth, phone number, address or birth location to attempt to steal people's identities. Any request for this type of information or other sensitive information should be investigated to ensure that it is a legitimate request.if you receive a request that appears to be from us, call your Sales team instead of replying.

  3. Use anti-virus and anti-malware software and always make sure that you are running the latest version of the software. For details, please consult your anti-virus vendor.

  4. Don't respond to suspicious emails (Phishing): Criminals send out fake emails in the hopes that they will reach real customers. These emails attempt to trick recipients into providing personal information. Keep in mind that we will never ask you for personal information in an email.

  5. Avoid downloading files if they are not expected or sent to you from an unknown source. Sometimes malicious software is hidden in email attachments. Never download a file from an unknown source, or if that source is suspicious for any reason.

  6. Keep software on your computer updated. To make sure you have the latest protection available, install updates offered by your operating system, software providers and web browsers or ensure that your business does the same.

Additional Resources

Here you'll find some additional resources you can turn to for information and help.

While no one website can take the place of a security professional, here are some additional resources you can turn to for information on internet security:

  • http://www.OnlineOnGuard.gov

    The Federal Government's website to help you be safe, secure, and responsible online. Contains information for individuals, businesses, and other organizations.

  • http://www.staysafeonline.org

    The website for the National Cyber Security Alliance. Contains information for individuals and businesses.

  • http://www.consumer.ftc.gov/topics/privacy-identity

    Federal Trade Commission website with consumer information on privacy and identify theft.

  • http://business.ftc.gov/privacy-and-security

    Federal Trade Commission Bureau of Consumer Protection Business Center on privacy and security.


Terms and Conditions Security Feedback
Home Products & Services Advantages Register Site Features