Security Center

Safeguarding your sensitive information is among our top priorities.

First and foremost, we will NEVER contact you by phone, e-mail, or otherwise to ask for your online account access information or any sensitive personal information. If someone calls or e-mails asking for it, simply do not respond. Call our account manager team instead if you have any questions or just aren't sure if you should reply.

In this Security Center you'll find additional information on some of what we do to protect your information, what steps you can take to protect yourself, and what to do in case you suspect fraud.

How We Protect You

Here you will find information on some of the steps we take to protect your sensitive information, subject to the terms of the COMS .

隐私声明:

·         美国

·         美国境外:可以在 Wells Fargo 隐私政策和声明页面上找到国际隐私声明

We have established a number of safeguards designed to protect the security of your information. Here are just a few examples:

  1. Encryption: We encrypt all information between your computer and our site with secured browser connections.

  2. Security Firewalls: The computer servers that run our site are protected by firewalls. Firewalls are security devices that protect the network traffic and connections between your computer and our servers.

  3. Automatic Session Timeouts: If you are logged into our secure sites and are idle for a period of time, your session will time out. This means that your session will end and you will be required to log in again.

  4. Secure Registration: The information you provide online as part of the registration process is validated against the information you have previously provided when applying for financing or contacting account manager.

  5. Password Recovery: If you forgot your password, you must answer challenge questions correctly before entering and confirming a new password. Contact account manager if you fail to obtain a new password.

Login Recommendations

Your actions influence the overall security of your sensitive information. Here you'll find some important steps you can take to help protect your information.

Your actions influence the overall security of your sensitive information. Here are some important steps you can take to help protect your information:

  1. Create a strong password: It should have a minimum of eight characters, use numbers, letters (both upper and lower case) and punctuation. Avoid using information that someone could easily guess, like common names or words and personal information (e.g., your child's name). It is additionally recommended that you periodically change your password. The COMS password strength meter is designed to help you determine whether the password you are choosing is strong enough.

  2. If you have more than one online account, create a unique password for each one. Do not use the same password at different financial sites.

  3. Do no store your passwords near your computer. Memorize or keep them in a secure place that is not accessible to others.

  4. Avoid using a public or shared computer to access financial sites: If you must use a public computer to access a secure site, make sure to clear the Internet browsing history, cache, and any cookies stored (but keep in mind that you may not be able to delete all cookies, even if you attempt to do so).

  5. Clear the cache of your browser: Browsers usually cache (locally store) images of downloaded pages to speed up your computer's performance. After you visit a secure site, you should always clear your cache to make sure that no one else can view confidential information you've downloaded. You should refer to your particular browser's instructions for doing so. This is particularly important on shared or public computers.

  6. Log out when you are done: Make sure you log out to ensure that your session has been closed. The logout button in COMS appears on the upper right hand of the screen.

  7. Close all browser windows when you are done: You should also consider closing all of your browser's windows as an additional way of helping to prevent others from using your access.

  8. If you use a wireless network, make sure it is secured. If you use an unsecured wireless network, fraudsters may be able to monitor your activity. Never connect to unrecognized networks.

General Recommendations

Here are some recommendations on what you and your business can do to keep your sensitive information and your computer secure.

  1. Protect your business. Small businesses in particular have been increasingly targeted by criminals seeking sensitive information regarding both a business and its customers. Criminals may use this information to harm you, your business, or your customers.

    1. You should periodically monitor your financial accounts for unusual activity. You may wish to sign up to receive notices about fund transfers from your financial accounts if that feature is available.
    2. Conduct a risk assessment and make a plan.
  2. Share information carefully. Do not respond to suspicious requests for personal or sensitive information over the phone or by email. You also should not share your personal information on social networking sites. Criminals look for Social Security number, date of birth, phone number, address or birth location to attempt to steal people's identities. Any request for this type of information or other sensitive information should be investigated to ensure that it is a legitimate request. If you receive a request that appears to be from us, call account manager instead of replying.

  3. Use anti-virus and anti-malware software and always make sure that you are running the latest version of the software. For details, please consult your anti-virus vendor.

  4. Don't respond to suspicious emails (Phishing): Criminals send out fake emails in the hopes that they will reach real customers. These emails attempt to trick recipients into providing personal information. Keep in mind that we will never ask you for personal information in an email.

  5. Avoid downloading files if they are not expected or sent to you from an unknown source. Sometimes malicious software is hidden in email attachments. Never download a file from an unknown source, or if that source is suspicious for any reason.

  6. Keep software on your computer updated. To make sure you have the latest protection available, install updates offered by your operating system, software providers and web browsers or ensure that your business does the same.