Security Center

Safeguarding your sensitive information is among our top priorities.

First and foremost, we will NEVER contact you by phone, e-mail, or otherwise ask for your online account access information or any sensitive personal information. If someone calls or e-mails asking for it, simply do not respond. Call our account manager team instead if you have any questions or just aren't sure if you should reply.

In this Security Center you'll find additional information on some of what we do to protect your information, what steps you can take to protect yourself, and what to do in case you suspect fraud.

How We Protect You

Here you will find information on some of the steps we take to protect your sensitive information, subject to the terms of the COMS Privacy Notice.

We have established a number of safeguards designed to protect the security of your information. Here are just a few examples:

  1. Encryption: We encrypt all information between your computer and our site with secured browser connections.

  2. Security Firewalls: The computer servers that run our site are protected by firewalls. Firewalls are security devices that are designed to protect network traffic coming into our environment.

  3. Automatic Session Timeouts: If you are logged into our secure sites and are idle for a period of time, your session will time out. This means that your session will end and you will be required to log in again.

  4. Secure Registration: The information you provide online as part of the registration process is validated against the information you have previously provided when applying for financing or contacting account manager.

  5. Password Recovery: If you’ve forgotten you password, you can set up a new password using the Forgot Password flow. (Forgot Password link can be found on the COMS login page). Contact Customer Care if you have troubles creating a new password.

Login Recommendations

Your actions influence the overall security of your information. Here you'll find some important steps that you can take to help protect your information.

  1. Create a strong password:It should have a minimum of eight characters and a maximum of 15 characters. Must contain three of the following: at least one upper case letter, at least one lower case letter, at least one number and at least one the following special characters: ! * ) % $. Your password cannot contain your first name or last name, the name of a month, 3 or more repeating characters and cannot be in previous 6 passwords. Your COMS password will expire every 365 days and you will need to set up a new password.

  2. If you have more than one online account, create a unique password for each one. Do not use the same password at different financial sites.

  3. Do no store your passwords near your computer. Memorize or keep them in a secure place that is not accessible to others.

  4. Avoid using a public or shared computer to access financial sites: If you must use a public computer to access a secure site, make sure to clear the Internet browsing history, cache, and any cookies stored (but keep in mind that you may not be able to delete all cookies, even if you attempt to do so).

  5. Clear the cache of your browser: Browsers usually cache (locally store) images of downloaded pages to speed up your computer's performance. After you visit a secure site, you should always clear your cache to make sure that no one else can view confidential information that you've downloaded. You should refer to your particular browser's instructions for doing so. This is particularly important on shared or public computers.

  6. Log out when you are done: Make sure you log out to ensure that your session has been closed. The logout button in COMS appears on the upper right hand of the screen.

  7. Close all browser windows when you are done: You should also consider closing all of your browser's windows as an additional way of helping to prevent others from using your access.

  8. If you use a wireless network, make sure it is secured. If you use an unsecured wireless network, fraudsters may be able to monitor your activity. Never connect to unrecognized networks.

General Recommendations

Here are some recommendations on what you and your business can do to keep your sensitive information and your computer secure:

  1. Protect your business. Small businesses in particular have been increasingly targeted by criminals seeking sensitive information regarding both its business and its customers. Criminals may use this information to harm you, your business, or your customers.

    1. You should periodically monitor your financial accounts for unusual activity. You may wish to sign up to receive notices about fund transfers from your financial accounts if that feature is available.
    2. Conduct a risk assessment and make a plan. Our Additional Resources section has links to a number of sites you can access for guidance on what steps to take next. For example, the federal government's has a section dedicated to small businesses, including links to other helpful resources.
  2. Share information carefully. Do not respond to suspicious requests for personal or sensitive information over the phone or by email. You also should not share your personal information on social networking sites. Among other things, criminals look for Social Security numbers, dates of birth, phone numbers, addresses or birth locations to attempt to steal people's identities. Any request for this type of information or other sensitive information should be investigated to ensure that it is a legitimate request. If you receive a request that appears to be from us, call your account manager instead of replying.

  3. Use anti-virus and anti-malware software and always make sure that you are running the latest version of the software. For details, please consult your anti-virus vendor.

  4. Don't respond to suspicious emails (Phishing): Criminals send out fake emails in the hopes that they will reach real customers. These emails attempt to trick recipients into providing personal information. Keep in mind that we will never ask you for personal information in an email.

  5. Avoid downloading files if they are not expected or sent to you from an unknown source. Sometimes malicious software is hidden in email attachments. Never download a file from an unknown source, or if that source is suspicious for any reason.

  6. Keep software on your computer updated. To make sure you have the latest protection available, install updates offered by your operating system, software providers and web browsers or ensure that your business does the same.