login.flexn0.paychex.com Open in urlscan Pro
141.123.52.40  Public Scan

Submitted URL: https://login.flexn0.paychex.com/
Effective URL: https://login.flexn0.paychex.com/login_static/index.html
Submission: On November 04 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 1 forms found in the DOM

<form id="otp-delivery-method-form">
  <div class="mdc-form-field">
    <div class="mdc-radio" id="otp-text-radio">
      <input class="mdc-radio__native-control" type="radio" id="otp-text" name="otp-delivery-method" value="SMS" data-payxautoid="payx.login.deliveryMethod.card.textRadio">
      <div class="mdc-radio__background">
        <div class="mdc-radio__outer-circle"></div>
        <div class="mdc-radio__inner-circle"></div>
      </div>
    </div>
    <label class="otp-label-with-select" id="otp-text-label" for="otp-text" data-payxautoid="payx.login.deliveryMethod.card.textMeSelectLabel">Text <div id="otp-text-select" class="mdc-select" role="listbox"
        data-payxautoid="payx.login.deliveryMethod.card.textMeSelect">
        <div class="mdc-select__surface" tabindex="0" data-payxautoid="payx.login.deliveryMethod.card.textMeSelect.surface">
          <div class="mdc-select__label"></div>
          <div class="mdc-select__selected-text"></div>
          <div class="mdc-select__bottom-line"></div>
        </div>
        <div class="mdc-menu mdc-select__menu">
          <ul class="mdc-list mdc-menu__items" data-payxautoid="payx.login.deliveryMethod.card.textMeSelect.options">
            <li id="text-primary" class="mdc-list-item otp-select-primary-number" role="option" tabindex="0" aria-selected="" data-payxautoid="payx.login.deliveryMethod.card.textMeSelect.options.primary"> (●●●) ●●● - </li>
            <li id="text-secondary" class="mdc-list-item otp-select-secondary-number" role="option" tabindex="0" data-payxautoid="payx.login.deliveryMethod.card.textMeSelect.options.secondary"> (●●●) ●●● - </li>
          </ul>
        </div>
      </div>
    </label>
    <label class="otp-label" for="otp-text" data-payxautoid="payx.login.deliveryMethod.card.textMeLabel">Text <span class="otp-label-dots">(●●●) ●●● - </span>
      <span class="otp-label-number" data-payxautoid="payx.login.deliveryMethod.card.textMeLabel.number"></span>
    </label>
  </div>
  <div class="text-rates" data-payxautoid="payx.login.deliveryMethod.card.textRatesMessage">Standard text messaging rates apply. </div>
  <div class="mdc-form-field">
    <div class="mdc-radio" id="otp-call-radio">
      <input class="mdc-radio__native-control" type="radio" id="otp-call" name="otp-delivery-method" value="VOICE" data-payxautoid="payx.login.deliveryMethod.card.callRadio">
      <div class="mdc-radio__background">
        <div class="mdc-radio__outer-circle"></div>
        <div class="mdc-radio__inner-circle"></div>
      </div>
    </div>
    <label class="otp-label-with-select" for="otp-call" data-payxautoid="payx.login.deliveryMethod.card.callMeSelectLabel">Call <div id="otp-call-select" class="mdc-select" role="listbox" data-payxautoid="payx.login.deliveryMethod.card.callMeSelect">
        <div class="mdc-select__surface" tabindex="0" data-payxautoid="payx.login.deliveryMethod.card.callMeSelect.surface">
          <div class="mdc-select__label"></div>
          <div class="mdc-select__selected-text"></div>
          <div class="mdc-select__bottom-line"></div>
        </div>
        <div class="mdc-menu mdc-select__menu">
          <ul class="mdc-list mdc-menu__items" data-payxautoid="payx.login.deliveryMethod.card.callMeSelect.options">
            <li id="call-primary" class="mdc-list-item otp-select-primary-number" role="option" tabindex="0" aria-selected="" data-payxautoid="payx.login.deliveryMethod.card.callMeSelect.options.primary"> (●●●) ●●● - </li>
            <li id="call-secondary" class="mdc-list-item otp-select-secondary-number" role="option" tabindex="0" data-payxautoid="payx.login.deliveryMethod.card.callMeSelect.options.secondary"> (●●●) ●●● - </li>
          </ul>
        </div>
      </div>
    </label>
    <label class="otp-label" for="otp-call" data-payxautoid="payx.login.deliveryMethod.card.callMeLabel">Call <span class="otp-label-dots">(●●●) ●●● - </span>
      <span class="otp-label-number" data-payxautoid="payx.login.deliveryMethod.card.callMeLabel.number"></span></label>
  </div>
</form>

Text Content

Link your accounts. Enter your Paychex Flex credentials once and future log ins
will be with your organization's credentials.

Single sign-on not set up. It looks like SSO has not been setup by your IT
person. You may sign in using your Paychex Flex username and password.

SSO unavailable. We are unable to log you in with your organization credentials.
You may log in using your Paychex Flex credentials.

Username
Password

Invalid Username or Password. Too many failed attempts will lock your account.

Sign In
To reset your credentials please click here and select the option "Forgot
Username or Password".
Forgot Username or Password?
New to Paychex Flex?  Sign up


GET A VERIFICATION CODE


DO YOU PREFER A TEXT OR PHONE CALL?


Text
 * (●●●) ●●● -
 * (●●●) ●●● -

Text (●●●) ●●● -
Standard text messaging rates apply.

Call
 * (●●●) ●●● -
 * (●●●) ●●● -

Call (●●●) ●●● -
Continue


ANSWER SECURITY QUESTION


BEFORE WE LOG YOU IN, PLEASE FIRST VERIFY YOUR IDENTITY BY ANSWERING YOUR
SECURITY QUESTION.



Answer
Incorrect answer, please try again. Too many failed attempts will lock your
account.

Recognize this device in the future.
i
Already recognized this computer?

You may need to recognize this computer again because the web browser you're
using is either:

 * A different browser than you used before
 * Set to automatically clear your cookies
 * Running in "private browsing" or "incognito" mode.

Continue


UNRECOGNIZED DEVICE


YOU ARE SIGNING IN FROM AN UNRECOGNIZED DEVICE.


ENTER THE 5-DIGIT CODE


VERIFICATION CODE RESENT


A TEXT MESSAGE WITH A VERIFICATION CODE WAS JUST SENT TO (•••) ••• - . YOU'LL
HAVE FIVE MINUTES BEFORE THE CODE EXPIRES.


WE'RE CALLING YOU AT (•••) ••• - TO SEND YOU A VERIFICATION CODE THROUGH A
RECORDED MESSAGE. YOU'LL HAVE FIVE MINUTES BEFORE THE CODE EXPIRES.

Verification Code

Wrong code. Try again. 5 failed tries locks account.

Get a new code
Expires in: :
Resend Code

Recognize this device in the future.
i
Already recognized this computer?

You may need to recognize this computer again because the web browser you're
using is either:

 * A different browser than you used before
 * Set to automatically clear your cookies
 * Running in "private browsing" or "incognito" mode.

Continue


SORRY! LOOKS LIKE SOMETHING
WENT WRONG


PLEASE CLICK HERE TO CONNECT WITH A MEMBER OF OUR PAYCHEX SUPPORT TEAM.
ID: ●

Cancel and go back


ACCOUNT DISABLED


FOR YOUR SECURITY, YOUR ACCOUNT HAS BEEN DISABLED. THIS CAN HAPPEN FOR A NUMBER
OF REASONS. TRY RESETTING YOUR PASSWORD. IF THAT DOESN'T WORK, CONTACT YOUR
COMPANY ADMIN OR CLICK HERE TO CONNECT WITH A MEMBER OF OUR PAYCHEX SUPPORT
TEAM.
ID: ●

Cancel and go back


ACCOUNT DISABLED


FOR YOUR SECURITY, YOUR ACCOUNT HAS BEEN DISABLED. THIS CAN HAPPEN FOR A NUMBER
OF REASONS. PLEASE CLICK HERE TO CONNECT WITH A MEMBER OF OUR PAYCHEX SUPPORT
TEAM.
ID: ●


SESSION TIMEOUT


YOU HAVE BEEN AUTOMATICALLY LOGGED OUT BECAUSE THERE HAS BEEN NO ACTIVITY FOR
MORE THAN 15 MINUTES.PLEASE LOG IN AGAIN.

OK



TERMS OF USE


Close
Paychex Flex Security Privacy Policy Terms of Use Copyright © 2021 by
Paychex,Inc.


SECURITY


A COMMITMENT TO SECURITY

At Paychex, safety and security of your personal and account information is one
of our top priorities. Below you will find a brief overview of how we undertake
this responsibility and some easy-to-follow tips you can use to safeguard your
information.


OUR PART

Paychex is committed to protecting the security and integrity of our customer
information through procedures and technologies designed for this purpose. Here
are some of the things we do with our technology and our internal training to
ensure that your information in our systems is protected:

 * We maintain policies and procedures covering the physical security of our
   workplaces, systems, and records.
 * Our physical, electronic, and procedural safeguards are built on industry
   recognized best practices.
 * We use technological means such as backup files, virus detection and
   prevention, firewalls, and other computer hardware and software to protect
   against unauthorized access or alteration to customer data.
 * We encrypt sensitive information that is transmitted over the Internet.
 * We limit employee access to customer information to those who have a business
   reason to know through formal approval processes, access controls, and
   internal auditing.
 * We require our employees to take information security awareness training and
   to apply this training to their job every day.
 * We use advanced technologies for the backup and recovery of customer
   information.




YOUR PART

You can help prevent unauthorized access to your account and personal
information by following these security tips:

 * Enhanced login features to protect against identity theft. Your user ID (user
   name), password, picture, and pin code represent the keys you use to access
   your account information on our system. Keep these "keys" in your possession
   only. Please protect them as you would your house keys.
 * Follow the password tips that are presented in the user maintenance page when
   you create a new password. That way no one else will be able to guess your
   password.
 * When you view your account or perform any other transaction online, make sure
   that you use the "Log Out" button when you are finished, then close your
   browser completely. This ensures that no one can use the computer after you
   and see your account information.
 * If you believe that an unauthorized person has accessed your account, let us
   know as soon as possible by contacting your Paychex representative.




EMAIL SECURITY


WHAT IS PHISHING?

Phishing is the act of sending an email to a user falsely claiming to be an
established, legitimate company in an attempt to trick the user into providing
valuable personal data such as credit card numbers, passwords, account
information, or other private information. The email often uses fear tactics in
an effort to entice the intended victim into visiting a fraudulent website. Once
on the website, which generally looks and feels much like the valid company
website, the victim is instructed to enter sensitive personal information that
is then sent to the attacker and often used to commit identity theft or
financial fraud against the victim.


HOW TO IDENTIFY A PHISHING OR FRAUDULENT EMAIL

Many phishing emails look and feel like the real thing and often include
official looking logos or web pages taken from real organizations. Phishing
scams have become increasingly sophisticated in their techniques and technology.
However there are certain red flags that Internet users can look for that are
common in phishing emails. Look over the following to familiarize yourself with
common techniques that are used by attackers:

 * Urgent Emails or Threats to Accounts Some fraudulent emails claim that the
   recipient's account has been inappropriately accessed or is in jeopardy and
   that authenticating information (name, password, account number, credit card
   number) is required to keep the account from being closed, suspended, billed,
   or restricted.
 * Lost Information Consumers should be cautious of claims that a company is
   "updating" its files or accounts.
 * Personal Information Requests. for a recipient to enter sensitive personal
   information such as a user ID, password, bank account or social security
   numbers by clicking on a link or completing an email form should be treated
   with suspicion.
 * Senders Address Email recipients should not rely on the sender's email
   address to validate the true origin of the email. The "From" field of an
   email can be easily altered or forged by the sender.
 * Links in Emails Can be Easily Forged Links in emails can be misleading,
   luring the recipient to a forged version of a legitimate website.
 * Other Signs of a Fraudulent Email Other telltale signs of fraudulent or
   phishing emails include spelling errors, incorrect grammar, pop-up windows
   that look like sign-in pages, and unsuspected attachments which may contain
   viruses or other malicious software.




HOW TO PROTECT YOURSELF

There are ways to protect yourself from a phishing scam. Don't be a victim. Here
are some suggestions:

 * Be wary of hyperlinks embedded in email messages as they are constructed on
   the surface to look legitimate but underneath they will often redirect you to
   a fraudulent website. Rather than click on a suspicious link, type the link
   into your browser window.
 * Be alert to hyperlinks that are misspelled such as -.paychecks.com or
   -.paychx.com.
 * Make sure you use anti-virus, anti-spam, anti-spyware software and a personal
   firewall. These products should be updated regularly and kept current.
 * Always scan file attachments for viruses or malicious software before opening
   them.
 * Routinely review and apply software security patches to your computer
   operating system and applications.
 * Make sure you use the most current versions of Internet browsers.
 * Choose secure passwords to protect your account information. They should be
   at least eight characters in length with a combination of letters, numbers,
   and special characters and should not be easily guessable.
 * Change your password periodically to help reduce the likelihood that it can
   be guessed.
 * Avoid responding to emails that do not come from someone you know. If an
   email comes from someone you know, but you were not expecting it or it seems
   suspicious, contact the sender to confirm that they sent it prior to
   responding.




IF YOU RECEIVE SUSPICIOUS EMAIL

If you suspect you have received a suspicious or fraudulent email, please
contact your Paychex representative.


IDENTITY SECURITY


WHAT IS IDENTITY THEFT?

Identity or financial theft can occur when someone uses your personally
identifiable information (PII), like your name, social security number (SSN),
bank account, or medical insurance number; without your permission to commit
fraudulent activities.

Identity crimes can take a variety of forms including the use of your
information to obtain a credit card, establish a utility account, rent property,
or receive medical services in your name. You may not find out about the theft
until you review your credit report or a bank account statement and notice
suspicious charges. You may even be surprised by a call from a debt collector.

Identity theft is a serious crime often resulting in consumers spending hundreds
of hours and thousands of dollars attempting to repair the damage to their good
name and credit record.


HOW DO THIEVES STEAL A PERSON'S IDENTITY?

Identity theft starts with the misuse of your personally identifiable
information. Skilled identity thieves may use a variety of methods to get hold
of your information including:

 * Dumpster Diving. The identity thief may rummage through a person's trash
   looking for bills, pre-approved credit card offers, or other paper that
   includes personal information on it.
 * Phishing. The identity thief may send an email to a user falsely claiming to
   be an established, legitimate company in an attempt to trick the user into
   providing valuable personal data such as credit card numbers, passwords,
   account information, or other private information. The email often uses fear
   tactics in an effort to entice the intended victim into visiting a fraudulent
   website.
 * Skimming. The identity thief may steal credit or debit card numbers by using
   a special storage device when processing your card for payment.
 * Pretexting. The identity thief may access your personal information under
   false pretenses. Very similar to a phishing attack, but is usually performed
   by calling a person directly and claiming that they have something to offer
   that would entice the person to disclose personal information.
 * Old Fashioned Stealing. The identity thief may steal your wallet, purse, or
   mail.
 * Changing Your Address. The identity thief may divert your mail such as
   billing statements to another location by completing a change of address
   form.




WHAT DO THIEVES DO WITH A STOLEN IDENTITY?

Once an identity thief has your information, they may use it in a variety of
different ways.




CREDIT CARD FRAUD:

 * The identity thief may open new credit card accounts in your name and not pay
   the charges that appear on the victim's account statement.
 * The identity thief may also change the billing address on the credit card and
   accumulate large charges. Since the bill is going to an alternate address, it
   often takes the victim some time before they realize what has happened.




BANK AND FINANCIAL FRAUD:

 * The identity thief may open a bank account in the victim's name and write bad
   checks.
 * The identity thief may take a loan in the victim's name.
 * The identity thief may create counterfeit checks using the victim's name and
   bank account number.
 * The identity thief may create a fake ATM or debit card using the victim's
   name and account number and make withdrawals against the victim's account.






PHONE OR UTILITIES FRAUD:

 * They may open a new phone or wireless account in the victim's name and rack
   up charges.
 * They may use the victim's name to acquire utility services such as heating,
   electricity, or cable TV.






GOVERNMENT DOCUMENTS FRAUD:

 * The identity thief may sign up for a driver's license or other official ID
   card using the victim's name and social security number.
 * The identity thief may use the victim's social security number to apply for
   government benefits.
 * The identity thief may file a fraudulent tax return using the victim's
   information.






OTHER/MISCELLANEOUS FRAUD:

 * The identity thief may apply for a job using the victim's social security
   number.
 * The identity thief may rent a house or obtain medical services under the
   victim's name.
 * The identity thief may give the victim's personal information to the police
   during an arrest. If they do not show up for a scheduled court date, a
   warrant is issued in the victim's name.




HOW CAN YOU FIND OUT IF YOUR IDENTITY WAS STOLEN?

The best way to find out is to monitor your accounts and bank statements each
month and check your credit report on a regular basis. If you check your credit
report regularly, you may be able to limit the damage caused by identity theft.


WHAT SHOULD YOU DO IF YOUR IDENTITY IS STOLEN?

If you believe your information has been stolen, you should act immediately to
minimize the damage. Filing a police report, checking your credit reports,
notifying creditors, and disputing any unauthorized transactions are some of the
steps you must take to restore your good name. For more information on how to
respond to perceived identity theft or to file a complaint, contact the Federal
Trade Commission at (1-877-ID-THEFT) or visit them online at www.ftc.gov


WHAT CAN YOU DO TO PROTECT YOURSELF AGAINST IDENTITY THEFT?

Awareness is an effective weapon against many forms of identity theft. Be aware
of how information is stolen and what you can do to protect yours, monitor your
personal information to uncover any problems quickly, and know what to do when
you suspect your identity has been stolen. Here are some basic steps that you
can take to protect yourself.

 * Do not throw documents in the trash that could be used to identify you. Buy a
   cross-cut or confetti type shredder and be sure to destroy all documents that
   may have your personally identifiable information on them.
 * Protect your online accounts with difficult to guess passwords. Do not share
   these passwords with others and change them periodically to ensure they are
   not compromised.
 * Do not use common identifiers such as mother's maiden name, date of birth,
   children's names, pet's names or other easily guessable information.
 * When using your ATM or Debit card, be wary of "Shoulder Surfers" that may be
   watching over your shoulder in an attempt to steal your PIN number.
 * Mail theft is common and easy to do. Do not use your home mailbox to mail
   bills or checks. Use an official U.S. Post Office or U.S. mailbox to mail
   documents that contain your personal identifying information.
 * Be sure to cancel all credit cards that you do not use on a regular basis.
   Open credit is a favorite for identity thieves.
 * Remove any identifiers you do not need from your wallet or purse. Don't carry
   your birth certificate, social security card, or passport, unless necessary.
 * If you receive a call at home or work, never give out any of your personal
   information over the phone. If they claim to be a credit grantor or provider
   of a service, request an application be mailed to your home or work address.
   You may also look up the official company number and return the call to
   ensure you are speaking to a legitimate business representative.
 * Do not put your telephone number or social security number on your checks.
 * Take your name off all promotional lists. Call the three credit reporting
   bureau numbers below to monitor your credit history. Additionally, subscribe
   to the various opt-out services listed below or provided by your utility,
   bank, credit card, medical, or similar service provider.



Additional Resources
Credit Reporting Bureaus:
Equifax: 800-525-6285
Experian: 888-397-3742
TransUnion: 800-680-7289

Federal Government:

Federal Trade Commission
Department of the Treasury
Identity Theft Resource Page

Opt-out Services:

Do Not Call Registry
Prescreened Credit Card Offers
Direct Marketing Association

Consumer and Professional Organizations:

Privacy Rights Clearinghouse: Identity Theft Resources
Close