Fast, convenient, secure.
Mouse in the house? Laptop on the go? Wherever you have an internet connection, you have banking at your fingertips. Bank on your time, whenever and wherever it's convenient. As an internet banking customer, you can enjoy check imaging and check reordering at the click of a mouse. Also, if you use Quicken®, Quickbooks®, Microsoft Money®, or a spreadsheet to manage accounts, you can download transactions from the internet. And you don't have to sacrifice security for all this convenience.
To sign up for Internet Banking:
Personal Enrollment, click here.
Business Enrollment, click here.
Bank of Yazoo also offers Verified By Visa. Verified by Visa is a great way to secure your Visa® credit card internet transactions and purchases, allowing you to assign a personal password to your Bank of Yazoo VISA® credit card.
This Internet banking system uses industry-leading technology including password-controlled entry, Secure Sockets Layer (SSL) protocol, 128bit data encryption, public-private key pair, firewalls, intrusion detection, and filtering routers. Each security component acts as a layer of protection to safeguard sensitive data from unauthorized users.
First, this system requires customer identification through a private login ID and password before you can get into the front-end of the system. You should keep this password and login ID absolutely private.
Transmission Security: Encryption
Once you have logged on correctly, you will enter a secure environment in which you can conduct your transactions. The browser automatically secures the session using Secure Sockets Layer (SSL) protocol with 128bit encryption. With SSL with 128bit encryption, data that travels between the Bank and customer is encrypted and can only be decrypted with what is called the public and private key pair.
As of September 11, 2001, Internet Banking is more secure than ever. We implemented a security measure that requires that "ALL" Internet Banking Customers have an Internet browser that supports 128bit data encryption. Our recommended browsers are Microsoft Internet Explorer 5.5 Service Pack 2 and/or Netscape Navigator 4.76 or higher. Both Internet browsers above do come with 128bit data encryption.
Information Privacy: Firewalls, Intrusion Detection and Filtering Routers
Finally, once requests arrive at the Bank the server is protected by a series of firewalls, intrusion detection, and filtering routers which verify the source and destination of the requests traveling in information packets. The routers and firewalls are set up to reject any unauthorized traffic. The intrusion detection logs every action that comes and goes, to and from our network. This reemphasizes the importance of the login ID and password, which is the only legitimate entry into the program. This system uses network devices which only allow permitted traffic to go through. The purpose of the router is to keep out traffic that does not emanate from one of the only two legitimate ends of a secured transaction: the customer or the Bank.
It is with the above security measures that your transactions are secured and tracked over the Internet.