Key ways that MicroBilt helps to safeguard your personal information online
Can I Proactively Monitor Account Access?
Account access can be monitored real-time with Security Alerts. Unauthorized access from unknown IP addresses, failed password attempts and invalid time restrictions are just some of the items reported.
Can I Restrict Access to a Specified Computer or Multiple Computers?
Yes, you can restrict access to a specific computer with an IP address. IP address ranges can also be employed to limit access to a group of computers.
Can I Restrict Access to Certain Hours or on Specific Days?
Yes, access can be determined by hours and days of the week. Time restrictions can apply to a single user or group of users.
Is it Possible to Set Up Multiple Users?
Setting up multiple users is not only supported but also encouraged. With multiple users, access can be tracked and audited.
I Only Want Users to be Able to Access Certain Reports. Is This Possible?
Yes, with access codes, reports can be blocked or granted for users or groups.
Is it Possible to Only Allow Users to Enter Applications and Not View Reports?
Yes, flagging permissions in setup can prevent or allow desired actions.
Do Passwords Expire?
Passwords do expire. The default setting is every 90 days with options for 15,30,60 and 90 day expiration periods. This feature is mandatory.
Can Users be Locked Out After So Many Failed Login Attempts?
Yes, within Administrator options you can specify users to be locked out after a certain number of failed attempts. Users will become disabled until the administrator or supervisor re-enables the user.
Can I Monitor Account Activity?
Using innovative application filtering, reports can be monitored real-time for specific users, groups, dates, or report types.
Are My Subscriber Codes Secure?
All credit related data is shielded on additional data specific servers not accessible via the internet. This means critical data is not exposed on the internet.
Are Unsuccessful Login Attempts Tracked and Logged?
All unsuccessful login attempts are logged and monitored.
What Internal Procedures are In Place?
Facilities monitored 24/7 with closed circuit systems. All building access activity logged and secured. Web farms, where data is stored, are only accessible to key employees. Extensive Background Checks are performed on all new employees.