How We Keep You Safe Online
We know you access your accounts in many different ways, including tablets, laptops, and mobile devices. That's why we use advanced security measures to ensure that every visit to APEXOPTION is safe. Here are just a few ways we help keep you secure online.
Username and password requirements
To help prevent unauthorized access, we prompt you to create a unique username and password when you first access your account. The strongest passwords are long and contain a mix of numbers, upper– and lower–cased letters, and special characters.
Whether you visit us online, by phone, we always verify your identity before granting access to your accounts.
When you are doing any transactions and your activities in your member area such as update contact details, transferring points, deposit and withdrawal, we may prompt you to answer second password to make sure it's really you accessing your account.
We use the strongest encryption available to protect your information as it travels over the Internet.
All of our computer systems are protected by sophisticated electronic barriers to help prevent unauthorized access.
We digitally sign all customer emails so that you can verify that the message has not been forged or altered.
Our websites automatically log you off after an extended period of inactivity. This reduces the risk that others could access your information from your unattended computer or mobile device.
We request all our account holder to submit their personal identification documents for compliance purposes and for us to ensure your account being stay away from fraud or misuse. As well as to protect your fund during deposit and withdrawal.
We monitor our systems around the clock to provide you with peace of mind no matter when you log in.
Security at APEXOPTION worksites
Because we also print and deliver documents containing sensitive personal information, all work areas are monitored continuously and restricted to only authorized personnel.
Restricted access to
Just as we limit physical access to our work areas, we also restrict access to systems containing customer data and constantly monitor access to these systems.
Our employees receive thorough training on our security policies and are held accountable when it comes to adhering to those policies. Employees who work directly with customers also receive training on emerging risks, such as identity theft.