With the convenience of online banking comes questions about security of your information online. Alpine Bank is dedicated to protecting your privacy and your security online. Here is what we do to help keep your information secure while you bank at alpinebank.com.
The process of encrypting email ensures that only the sender and the recipient of an email can view its contents. Email correspondence from Alpine Bank is delivered using this secure delivery system IF that email contains any personal data or account information. Learn More.
This is an added security measure. When you go to a website and look at the address in the web browser, it will likely begin with http://. HTTP stands for HyperText Transport Protocol, which is simply a protocol for information to be passed back and forth between web servers and clients. Most informational websites begin with http://. In these cases, the website is talking to your browser using the regular "unsecure" language, making it possible for someone to "eavesdrop" on your computer's conversation with the website. If you fill out a form on that website, someone might see the information you’re sending. This is why you should never enter credit card numbers or other financial information on an http:// site. However, if you see https:// in the web browser (as on www.alpinebank.com), it means something more. The important part is the S which stands for SECURE and uses Cryptographic Technology which allows information to be encrypted as it is transmitted across the Internet. Alpine Bank uses strong encryption to secure your information as it is sent between your computer to us. This means the computer is talking to the website in a secure code that no one can eavesdrop on. The https:// in front of www.alpinebank.com means your security is of the utmost importance to us.
Alpine Online Login
Your Alpine Online ID and Password are your keys to Alpine Online. It takes both identification keys to gain access. No one representing Alpine Bank will ask for your Password. You should never give your Password to anyone who asks for it in an email or by phone or anyone else who you do not want to have access to your account.
The SiteKey security feature is an additional layer of identity verification for signing in to Alpine Online Banking. Your unique SiteKey consists of a unique image you'll choose from a library of images we provide. A SiteKey's primary purpose is to help deter phishing.
Your SiteKey provides identity theft and fraud protection by visually confirming you are logging into Alpine Bank's valid online banking service, and not a fraudulent look-alike site. Once signed in, as you change screens or click on links within the Alpine Online Banking system you will see your image on each screen which provides assurance you are still logged on to Alpine Bank's valid site.
How Your SiteKey Works:
- Enter your Alpine Online Banking ID
- Verify that your unique SiteKey image is correct
- Confirm by entering your Online Banking Password
At Alpine Bank, your security is our top priority. That is why we have partnered with IBM, a leading expert in financial security, to offer Trusteer Rapport online fraud protection software – at no cost to you. Read more
For your security, you should always logout at the end of each Alpine Online session. If you forget, Alpine Online will automatically log out when you close the browser window or after a period of inactivity.
Online Banking Security System
In the rare case that we detect any unusual or uncharacteristic activity, you may be asked to authenticate the activity, or you may receive a phone call from our staff to make sure that it is really you.
Alpine Online Fraud Protection
In the unlikely event that there is an unauthorized transaction on your deposit accounts (checking, savings or certificate of deposit), you may be covered for certain losses under federal bank regulations.
Other Security Tools Used by Alpine Bank
Alpine Bank uses other tools to provide high levels of internet security. Firewalls and filtering routers are used to secure computers from outside internet access, and tested and proven operating systems are employed to protect the information from both internal and external threats.