Security Center

Safeguarding your sensitive information is among our top priorities.

First and foremost, we will NEVER contact you by phone, e-mail, or otherwise to ask for your online account access information or any sensitive personal information. If someone calls or e-mails asking for it, simply do not respond. Call our Customer Care team instead if you have any questions or just aren't sure if you should reply.

In this Security Center you'll find additional information on some of what we do to protect your information, what steps you can take to protect yourself, and what to do in case you suspect fraud.

How We Protect You

Here you will find information on some of the steps we take to protect your sensitive information, subject to the terms of the COMS

Privacy Notices:

We have established a number of safeguards designed to protect the security of your information. Here are just a few examples:

  1. Encryption: We encrypt all information between your computer and our site with secured browser connections.

  2. Security Firewalls: The computer servers that run our site are protected by firewalls. Firewalls are security devices that protect the network traffic and connections between your computer and our servers.

  3. Automatic Session Timeouts: If you are logged into our secure sites and are idle for a period of time, your session will time out. This means that your session will end and you will be required to log in again.

  4. Secure Registration: The information you provide online as part of the registration process is validated against the information you have previously provided when applying for financing or contacting Customer Care.

  5. Password Recovery: If you’ve forgotten your password, you can set up a new password using the Forgot Password flow. (Forgot Password link can be found on the COMS login page). Contact COMS Care if you have troubles creating a new password.

Login Recommendations

Your actions influence the overall security of your sensitive information. Here you'll find some important steps you can take to help protect your information.

Your actions influence the overall security of your sensitive information. Here are some important steps you can take to help protect your information:

  1. Create a strong password:It should have a minimum of eight characters and a maximum of 15 characters. Must contain three of the following: at least one upper case letter, at least one lower case letter, at least one number and at least one of the following special characters: ! * ) % $. Your password cannot contain your first name or last name, the name of a month, 3 or more repeating characters and cannot be in previous 6 passwords. Your COMS password will expire every 365 days and you will need to set up a new password.

  2. If you have more than one online account, create a unique password for each one. Do not use the same password at different financial sites.

  3. Do no store your passwords near your computer. Memorize or keep them in a secure place that is not accessible to others.

  4. Avoid using a public or shared computer to access financial sites: If you must use a public computer to access a secure site, make sure to clear the Internet browsing history, cache, and any cookies stored (but keep in mind that you may not be able to delete all cookies, even if you attempt to do so).

  5. Clear the cache of your browser: Browsers usually cache (locally store) images of downloaded pages to speed up your computer's performance. After you visit a secure site, you should always clear your cache to make sure that no one else can view confidential information you've downloaded. You should refer to your particular browser's instructions for doing so. This is particularly important on shared or public computers.

  6. Log out when you are done: Make sure you log out to ensure that your session has been closed. The logout button in COMS appears on the upper right hand of the screen.

  7. Close all browser windows when you are done: You should also consider closing all of your browser's windows as an additional way of helping to prevent others from using your access.

  8. If you use a wireless network, make sure it is secured. If you use an unsecured wireless network, fraudsters may be able to monitor your activity. Never connect to unrecognized networks.

General Recommendations

Here are some recommendations on what you and your business can do to keep your sensitive information and your computer secure.

  1. Protect your business. Small businesses in particular have been increasingly targeted by criminals seeking sensitive information regarding both a business and its customers. Criminals may use this information to harm you, your business, or your customers.

    1. You should periodically monitor your financial accounts for unusual activity. You may wish to sign up to receive notices about fund transfers from your financial accounts if that feature is available.
    2. Conduct a risk assessment and make a plan. Our Additional Resources section has links to a number of sites you can access for guidance on what steps to take next. For example, the federal government's www.OnGuardOnline.gov has a section dedicated to small businesses, including links to other helpful resources.
  2. Share information carefully. Do not respond to suspicious requests for personal or sensitive information over the phone or by email. You also should not share your personal information on social networking sites. Criminals look for Social Security number, date of birth, phone number, address or birth location to attempt to steal people's identities. Any request for this type of information or other sensitive information should be investigated to ensure that it is a legitimate request. If you receive a request that appears to be from us, call Customer Care instead of replying.

  3. Use anti-virus and anti-malware software and always make sure that you are running the latest version of the software. For details, please consult your anti-virus vendor.

  4. Don't respond to suspicious emails (Phishing): Criminals send out fake emails in the hopes that they will reach real customers. These emails attempt to trick recipients into providing personal information. Keep in mind that we will never ask you for personal information in an email.

  5. Avoid downloading files if they are not expected or sent to you from an unknown source. Sometimes malicious software is hidden in email attachments. Never download a file from an unknown source, or if that source is suspicious for any reason.

  6. Keep software on your computer updated. To make sure you have the latest protection available, install updates offered by your operating system, software providers and web browsers or ensure that your business does the same.

Additional Resources

Here you'll find some additional resources you can turn to for information and help.

While no one website can take the place of a security professional, here are some additional resources you can turn to for information on internet security:

United States

In case you suspect fraud or identify theft related to your personal information, here is contact information for the major consumer credit reporting bureaus:

United States

Canada