Secure Payments, for peace of mind processing.
No two customers are exactly alike, Money Transfer Systems provides a vast array of secure connectivity choices to fit each unique need. We make it easy to integrate services with existing systems, enhancing merchants processing power and readiness for future growth. Money Transfer Systems understands the critical importance of providing a secure environment for your payment transaction data and the data files being transferred between your business and our processing center.
Protection of data against unauthorized access.
Programs and data are secured by issuing identification numbers and passwords to authorized users. Passwords are verified by the operating system to prevent unauthorized personnel from logging in. Database software prevents unauthorized access by assigning each user an individual view of the database. Secure processing is accomplished using a technologically advanced Secure VPN connectivity. A VPN (Virtual Private Network) is a private network that is configured to provide site-to-site connections from the Third Party ACH Processor to the ODFI-ACH Network Processor. Data transmitted via a VPN over networks is secured by encryption to prevent eavesdropping. Encrypted connections over the Internet are also very popular for linking remote offices and mobile users.
Network Vulnerability and Penetration – Testing Conducted Annually
Proactive network security means we find any vulnerability before the attackers do. Proactive vulnerability scanning helps protect our systems against both external threats like attackers and worms, and internal threats such as malicious users within the network. We are continually examining the security controls in our Web applications so that our systems are not exposed to vulnerabilities that can be exploited by hackers and attacks.
SSL 256-bit data encryption.
The checXchange™ Internet Application employs SSL, 256-bit encrypted transmissions, meeting the highest standard of the government’s current requirements. 256-bit data encryption is a secure coding method in which transactions require a 256-bit encryption key to unlock the block cipher and read the data. The block cipher method applies a cryptographic key to a block of data as a group, rather than breaking the data into smaller sizes. This makes the data virtually impervious to attack.
Secure Sockets Layer (SSL).
A security protocol that sits just below protocols such as HTTP and uses the lower-level TCP/IP to allow SSL-enabled PCs and servers to authenticate to each other. SSL creates single-session key exchange; using public and private-key data encryption from RSA Data Security for enciphering and deciphering encrypted SSL transmissions.
Secure Electronic Payment File Transmissions.
Server based secure file transfer program used to exchange and temporarily store checXchange™ files in a highly encrypted form, protecting flow of confidential consumer financial information.