Online Security Protection

For You and Adirondack Bank

Adirondack Bank is pleased to offer Internet Banking. Delivering these services requires a solid security framework that protects you and our institution's data from outside intrusion. We are committed to working with our Internet service and communications providers to produce the safest operating environment possible for our customers. There are several levels of security within our security framework: User, Server and Host Levels.

User Level

The User Level deals with cryptography and Transport Layer Security (TLS) protocol, and is the first line of defense used by all customers accessing our Banking Server from the public Internet. There are several components of User Level security that ensure the confidentiality of information sent across the public Internet. The first requires your use of a fully TLS-compliant, commercially reasonable encrypted browser such as the most current version of Microsoft Edge or Google Chrome. TLS is an open protocol that allows a user’s browser to establish a secure channel for communicating with our Internet server. TLS utilizes highly effective cryptography techniques between your browser and our server to ensure that the information being passed is authentic, cannot be deciphered, and has not been altered en route. TLS also utilizes a digitally signed certificate, which ensures that you are truly communicating with the Online Banking Server and not a third party trying to intercept the transaction.

After a secure connection has been established between your browser and our server, you then provide a valid User ID and Password to gain access to the services. This information is encrypted, logged by the server forming another complete physical security layer to protect the server's information, and a request to log on to the system is processed. Although TLS utilizes proven cryptography techniques, it is important to protect your User ID and password from others. You must follow the password parameters we specify at the time you sign up for an Internet Banking account. We also recommend changing your Password often. Session time-outs and a limit on the number of logon attempts are examples of other security measures in place to ensure that inappropriate activity is prohibited at the User Level.

User Responsibilities

Our service provider continues to evaluate and implement the latest improvements in Internet security technology, you as a user of the online banking system also have a responsibility for the security of your information and should always follow the recommendations listed below:

  • Utilize the most current commercially reasonable encryption version of Microsoft Edge or Google Chrome. The online banking system is best viewed and is most secure when you use the most up to date browser.
  • Your password must be kept confidential. You must follow our specific parameters for creating a password and change it frequently to ensure that the information cannot be guessed or used by others. Be sure others are not watching you enter information on the keyboard when using the system.
  • Choose a good password – Your online password, along with your User ID code, authenticate you when you begin an Internet Banking session. You should carefully select a password that is hard to guess.
  • Keep your password safe – Even the best password is worthless if it’s written on a note attached to your computer or in your checkbook. Memorize your password and never tell it to anyone. We do not need your password to help you, so we will never ask you for it. 
  • Change your password regularly – It’s important to change your password regularly.
  • Keep your computer free of viruses. Use virus protection software to routinely check for a virus on your computer. Never allow a virus to remain on your computer while accessing the online banking system.
  • Avoid using "remember me" feature for password and information saving within your browser.

Business User Responsibilities

  • Restrict employee access to include only access to accounts and other information that is necessary to perform their job functions.
  • Protect and secure your multifactor authentication token.  Never share your token or PIN.
  • Use a dual control approach by assigning one employee the responsibility of processing transactions, and a second employee the task of reconciling the account.
  • Immediately remove employee access when they leave the company or change positions when the access is no longer necessary to perform job functions.
  • Review the business account activity frequently.

Server Level

Server Level focuses on firewalls, filtering routers, and our trusted operating system.

All transactions sent to our Banking Server must first pass through a filtering router system. These filtering routers automatically direct the request to the appropriate server after ensuring the access type is through a secured browser and nothing else. The routers verify the source and destination of each network packet, and manage the authorization process of letting packets through. The filtering routers also prohibit all other types of Internet access methods at this point. This process blocks all non-secured activity and defends against inappropriate access to the server.

The Banking Server is protected using the latest firewall platform. This platform defends against system intrusions and effectively isolates all but approved customer financial requests. The platform secures the hardware running the Online Applications and prevents associated attacks against all systems connected to the Banking Server. The system is monitored 24-hours a day, seven days a week for a wide range of anomalies to determine if attempts are being made to breach our security framework.

Host Level

Host Level deals specifically with our Internet Banking services and the processing of secure financial transactions.

Once authenticated, the customer is allowed to process authorized Internet Banking transactions using host data. In addition, communication time-outs ensure that the request is received, processed, and delivered within a given time frame.  Any outside attempt to delay or alter the process will fail. Further password encryption techniques are implemented at the Host Level, as well as additional security logging and another complete physical security layer to protect the host information itself.

Back to Top