How We Keep You Safe Online

We know you access your accounts in many different ways, including tablets, laptops, and mobile devices. That's why we use advanced security measures to ensure that every visit to APEXOPTION is safe. Here are just a few ways we help keep you secure online.

Username and password requirements

To help prevent unauthorized access, we prompt you to create a unique username and password when you first access your account. The strongest passwords are long and contain a mix of numbers, upper– and lower–cased letters, and special characters.

Customer verification

Whether you visit us online, by phone, we always verify your identity before granting access to your accounts.

Security questions

When you are doing any transactions and your activities in your member area such as update contact details, transferring points, deposit and withdrawal, we may prompt you to answer second password to make sure it's really you accessing your account.

Strong encryption

We use the strongest encryption available to protect your information as it travels over the Internet.


All of our computer systems are protected by sophisticated electronic barriers to help prevent unauthorized access.

Secure email

We digitally sign all customer emails so that you can verify that the message has not been forged or altered.

Timed logoff

Our websites automatically log you off after an extended period of inactivity. This reduces the risk that others could access your information from your unattended computer or mobile device.

Compliance Documents

We request all our account holder to submit their personal identification documents for compliance purposes and for us to ensure your account being stay away from fraud or misuse. As well as to protect your fund during deposit and withdrawal.

Constant systems

We monitor our systems around the clock to provide you with peace of mind no matter when you log in.

Security at APEXOPTION worksites

Because we also print and deliver documents containing sensitive personal information, all work areas are monitored continuously and restricted to only authorized personnel.

Restricted access to
customer data

Just as we limit physical access to our work areas, we also restrict access to systems containing customer data and constantly monitor access to these systems.

Employee education

Our employees receive thorough training on our security policies and are held accountable when it comes to adhering to those policies. Employees who work directly with customers also receive training on emerging risks, such as identity theft.