Web Security Statement
By selecting and reading the topics below, you can learn about how LTCShop protects your information and how you can conduct business online safely.
Learn How LTCShop.com Protects Your Information
The privacy and security of your information are very important to us. LTCShop uses the following features and technologies to help ensure the security of your personal and health information during online transactions.
- Web browser encryption. To access your information through LTCShop.com, your Web browser must support 128-bit encryption and Secure Sockets Layer (SSL) version 3.0 protocol. These technologies provide the highest level of security and privacy when you access account information, initiate online account transactions, or send secure messages.
- LTCShop’s most important concern is the protection and reliability of customer data. Our servers are protected by high-end firewall systems, and scans are performed regularly to ensure that any vulnerabilities are quickly found and patched.
Guard Against Online Fraud and Scams
Con artists have devised clever ways to trick people into revealing personal information online, including schemes known as “phishing” and “pharming.” Precautions taken by LTCShop—and you—can help keep your information secure.
Here’s what you need to do
As you conduct business online, taking a few simple precautions can go a long way toward protecting your personal information.
- Verify website security. Make sure the website has the proper encryption by first verifying that the Web address (URL) begins with https://. Then mouse-over the padlock image (depending on your browser) in your Web browser window to show the security. You can also double-click the image to get additional information on SSL security.
- Close your browser. LTCShop recommends that after accessing inputting your information online you close your Web browser. Some of your information can stay in your browser’s memory until the browser is closed.
- Open all LTCShop communications in a timely manner.
- Take caution when using public computers. Be cautious when using public computers (especially when traveling abroad and those found at libraries, Internet cafés, and schools), or using shared ones, such as home computers. You don’t know what may be installed on these computers. Public computers are traditionally on open networks and can be susceptible to monitoring without your knowledge.
- Use wireless technology safely. If you have a wireless network at home, make sure to follow manufacturer’s guidelines to secure your network. If you’re not sure how, contact the manufacturer for assistance. If possible, don’t provide your information over a public wireless Internet connection.
- Update your software. Keep your computer software up to date. LTCShop recommends you enable automatic updates to ensure your computer operating system always receives the recommended security updates. It is also recommended you keep third party applications such as Adobe Acrobat Reader and Adobe Flash up to date as these programs have a history of being attacked more the operating system itself.
- Review your credit report. Review your credit report every four to six months for unauthorized activity. Go tohttp://www.annualcreditreport.com/ to receive your free credit report or call 877-322-8228. You can also contact any of the following credit reporting agencies.
Phishing attacks seek to gather personal information, such as Social Security numbers and passwords, to access victims’ accounts. A phishing attack often appears as an unsolicited, but authentic looking, e-mail that may threaten to close your account unless you verify some information. Although the links in the message may look like a familiar website address, they may point to a fake website that gathers the information you enter. Criminals then use that information to steal a person’s identity.
LTCShop will not ask for personal information such as your Social Security number, bank account numbers, or passwords in an e-mail. Do not respond to, open an attachment in, or click on a link within an e-mail if you suspect the message is fraudulent.
Phishing e-mails typically include typos and other mistakes, terms the company may not use, or e-mail addresses that look different than ones the company uses.
Pharming is another type of online attack where website names (such as www.LTCShop.com) are changed to point to an attacker’s numeric Internet address (the “IP address”) instead of LTCShop’s legitimate IP address. Successful pharming attacks are less common than they were a few years ago; however, it’s possible for an attack to be temporarily successful against poorly protected servers.
To guard against pharming, LTCShop webpages use Secure Sockets Layer (SSL) technology. SSL webpages start with “https://” instead of “http://”. One of the advantages of SSL is that your Web browser verifies the identity of the server. If an attacker successfully changed a website name so that a secure LTCShop.com address brought you to an attacker’s site that looked like LTCShop.com, your browser would display a warning. The warning would say the name on the certificate does not match the name of the site. If you encounter a similar message, don’t access the page.
Secure Your Computer
If you’re a LTCShop customer, you probably already know that we take protecting your privacy seriously. We’re always reviewing and upgrading our security procedures and equipment. But have you done your part? Read on for some tips on how to protect your computer.
Update computer software
Your computer uses many pieces of software, including an operating system (such as Windows, Mac OS, or Linux), Web browser software, and other applications for finances, personal productivity, and entertainment. Threats from viruses and attackers often take advantage of vulnerabilities in these software packages. Most vendors offer a system to help customers keep their computer software up to date. Contact the software vendor directly to access any available updates.
Malicious code such as viruses, worms, and Trojan horses can infiltrate personal computers, allowing attackers to compromise the integrity of software packages or even take control of your computer. It’s up to you to protect your critical information.
Fortunately, it’s easy to safeguard your computer against viruses and malicious code. First, install antivirus software to protect, detect, and repair attacks from most viruses. Second, and just as important, ensure that software is up to date. New viruses appear daily. Your antivirus software is only as good as its last update.
High-speed Internet access is now available to most U.S. residents, offering tremendous speed and 24-hour connectivity to the Web. But being continuously connected to the Internet exposes your computer to online threats. Hackers’ virus-like worms are constantly “knocking on doors” looking for available targets. You can help protect your computer by using a firewall.
Personal firewall software takes its name from the barriers built into cars and buildings that separate potentially hazardous environments from protected areas. Similarly, firewall software on computers protects them from the hazards of the Internet by monitoring the types of activity or attempted activity between the computer and a network. Computers guarded by a firewall can refuse attempted connections that aren’t initiated by you or that are suspicious.
LTCShop recommends that all customers install, use, and update personal firewall software. You should also look for included firewalls if you’re purchasing home networking equipment such as a router. As with antivirus software, your firewall software must be kept up to date.
Spyware protection/Anti-spyware software
Even computers that are protected by a firewall and safeguarded against viruses can be targeted by spyware. Spyware is software that appears to offer some tangible benefit, but actually monitors your behavior, typically to deliver targeted popup advertising. This illegal access is often used to intercept the user IDs and passwords to your online accounts. LTCShop recommends that customers install anti-spyware software and configure it to scan your computer weekly, at a minimum. This will help combat and remove spyware from your computer.
There are additional ways to help protect yourself and your computer from spyware:
- Verify any software you install on your computer. If you encounter a Security Warning window when installing a program that reads “Do you want to install and run [name of program] issued by [name of company]?” and you do not recognize the company, click No to stop the install.
- Install a popup blocker to prevent spyware popup windows. (Spyware is often installed after clicking deceptive links in popup windows.)