Security

Home Page Login
At Streator Onized Credit Union, the security of your online information is important to us. You can rest assured that nobody outside of Streator Onized Credit Union has access to your account information.

Signing on to view your account information from the Streator Onized Credit Union Home Page is safe. The moment you click the β€œLogin” button, your account number and password are encrypted using Secure Sockets Layer (SSL) technology, keeping your account information secure.

Linkage Policy
Links to non-SOCU external websites may be displayed on this website. These links are provided for your convenience. SOCU is not responsible for the products, services, or content on these third-party sites. Please review the privacy policy disclosures on any external website you visit.


Report a Security Issue
If you have identified a potentially vulnerable, misconfigured, or otherwise exploitable asset associated with our organization, please notify our security team by sending an email to security@socu.org. Your vigilance helps us maintain a secure environment for all our members.

Please include the following details in your email:
β€’ Asset: Specify the asset (e.g., website URL, IP address, etc.)
β€’ Type of Vulnerability: Describe the vulnerability (e.g., SQL injection, misconfigured server, etc.)
β€’ Impact: Explain the potential impact (e.g., data breach, unauthorized access, etc.)
β€’ Steps to Reproduce: Provide a brief outline of how the vulnerability can be exploited
β€’ Suggested Mitigation: Offer recommendations for fixing the issue

Important Guidelines:
β€’ Do not engage in disruptive testing: Avoid actions like DoS attacks or any activity that could impact confidentiality, integrity, or availability of our information and systems.
β€’ No social engineering or phishing: Do not attempt to socially engineer or phish our members or employees.
β€’ No compensation: You are not entitled to compensation and will not request compensation for time, materials, or vulnerabilities discovered.
β€’ Understand the review process: Vulnerability adjudication is performed considering the program scope and mitigating factors that may nullify or reduce specific risks to acceptable levels. Decisions are made thoughtfully and are final.

Thank you for helping us keep our organization secure!

security.txt