Web Security Statement

 

The security of your personal and health information is paramount

Our servers are protected by high-end firewall systems, and scans are performed regularly to ensure that any vulnerabilities are quickly found and patched.

Our website is verified by Trusted Site, a leading provider of secure online certificates. TrustedSite actively monitors this site for security issues such as malware, malicious links, and phishing. 

TrustedSite has verified that this site uses SSL to encrypt communications with industry-standard security protocols.

You can verify our security certificate by visiting the following page on the Trusted Site website:

https://www.trustedsite.com/verify?js=1&host=ltcshop.com&lang=EN

We utilize intrusion detection tools to secure your PII while it is stored inside our firewall. While we use generally accepted means of securing your PII, no information system can be guaranteed to be impenetrable.

 

Guard against online fraud and scams

Con artists have devised clever ways to trick people into revealing personal information online, including schemes known as “phishing” and “pharming.” Precautions taken by us—and you—can help keep your information secure.

Here’s what you need to do

As you conduct business online, taking a few simple precautions can go a long way toward protecting your personal information.

  • Verify website security. Make sure the website has the proper encryption by first verifying that the Web address (URL) begins with https://. Then mouse-over the padlock image (depending on your browser) in your Web browser window to show the security. You can also double-click the image to get additional information on SSL security.
  • Close your browser. We recommend that after accessing inputting your information online you close your Web browser. Some of your information can stay in your browser’s memory until the browser is closed.
  • Open all communications in a timely manner.
  • Take caution when using public computers. Be cautious when using public computers (especially when traveling abroad and those found at libraries, Internet cafés, and schools), or using shared ones, such as home computers. You don’t know what may be installed on these computers. Public computers are traditionally on open networks and can be susceptible to monitoring without your knowledge.
  • Use wireless technology safely. If you have a wireless network at home, make sure to follow manufacturer’s guidelines to secure your network. If you’re not sure how, contact the manufacturer for assistance. If possible, don’t provide your information over a public wireless Internet connection.
  • Update your software. Keep your computer software up to date. We recommend you enable automatic updates to ensure your computer operating system always receives the recommended security updates. It is also recommended you keep third party applications such as Adobe Acrobat Reader and Adobe Flash up to date as these programs have a history of being attacked more the operating system itself.
  • Review your credit report. Review your credit report every four to six months for unauthorized activity. Go tohttp://www.annualcreditreport.com/ to receive your free credit report or call 877-322-8228. You can also contact any of the following credit reporting agencies.

Equifax 1-800-685-1111

Experian 1-888-397-3742

TransUnion 1-800-916-8800

Phishing

Phishing attacks seek to gather personal information, such as Social Security numbers and passwords, to access victims’ accounts. A phishing attack often appears as an unsolicited, but authentic looking, e-mail that may threaten to close your account unless you verify some information. Although the links in the message may look like a familiar website address, they may point to a fake website that gathers the information you enter. Criminals then use that information to steal a person’s identity.

We will not ask for personal information such as your Social Security number, bank account numbers, or passwords in an e-mail. Do not respond to, open an attachment in, or click on a link within an e-mail if you suspect the message is fraudulent.

Phishing e-mails typically include typos and other mistakes, terms the company may not use, or e-mail addresses that look different than ones the company uses.

Pharming

Pharming is another type of online attack where website names are changed to point to an attacker’s numeric Internet address (the “IP address”) instead of a legitimate IP address. Successful pharming attacks are less common than they were a few years ago; however, it’s possible for an attack to be temporarily successful against poorly protected servers.

To guard against pharming, all the webpages on LTCShop.com use Secure Sockets Layer (SSL) technology. SSL webpages start with “https://” instead of “http://”. One of the advantages of SSL is that your web browser verifies the identity of the server. If an attacker successfully changed a website name so that a secure LTCShop.com address brought you to an attacker’s site that looked like LTCShop.com, your browser would display a warning. The warning would say the name on the certificate does not match the name of the site. If you encounter a similar message, don’t access the page.

Secure your computer

Here are some tips on how to protect your computer.

Update computer software

Your computer uses many pieces of software, including an operating system (such as Windows, Mac OS, or Linux), Web browser software, and other applications for finances, personal productivity, and entertainment. Threats from viruses and attackers often take advantage of vulnerabilities in these software packages. Most vendors offer a system to help customers keep their computer software up to date. Contact the software vendor directly to access any available updates.

Virus protection

Malicious code such as viruses, worms, and Trojan horses can infiltrate personal computers, allowing attackers to compromise the integrity of software packages or even take control of your computer. It’s up to you to protect your critical information.

Fortunately, it’s easy to safeguard your computer against viruses and malicious code. First, install antivirus software to protect, detect, and repair attacks from most viruses. Second, and just as important, ensure that software is up to date. New viruses appear daily. Your antivirus software is only as good as its last update.

Personal firewalls

High-speed Internet access is now available to most U.S. residents, offering tremendous speed and 24-hour connectivity to the Web. But being continuously connected to the Internet exposes your computer to online threats. Hackers’ virus-like worms are constantly “knocking on doors” looking for available targets. You can help protect your computer by using a firewall.

Personal firewall software takes its name from the barriers built into cars and buildings that separate potentially hazardous environments from protected areas. Similarly, firewall software on computers protects them from the hazards of the Internet by monitoring the types of activity or attempted activity between the computer and a network. Computers guarded by a firewall can refuse attempted connections that aren’t initiated by you or that are suspicious.

We recommend that all of our customers install, use, and update personal firewall software. You should also look for included firewalls if you’re purchasing home networking equipment such as a router. As with antivirus software, your firewall software must be kept up to date.

Spyware protection/Anti-spyware software

Even computers that are protected by a firewall and safeguarded against viruses can be targeted by spyware. Spyware is software that appears to offer some tangible benefit, but actually monitors your behavior, typically to deliver targeted popup advertising. This illegal access is often used to intercept the user IDs and passwords to your online accounts. We recommend that customers install anti-spyware software and configure it to scan your computer weekly, at a minimum. This will help combat and remove spyware from your computer.

There are additional ways to help protect yourself and your computer from spyware:

  • Verify any software you install on your computer. If you encounter a Security Warning window when installing a program that reads “Do you want to install and run [name of program] issued by [name of company]?” and you do not recognize the company, click No to stop the install.
  • Install a popup blocker to prevent spyware popup windows. (Spyware is often installed after clicking deceptive links in popup windows.)