login.flex.paychex.com
Open in
urlscan Pro
141.123.120.45
Public Scan
Submitted URL: https://004uwbzqja1aurtjcu0c-paychex.bridgeapp.com/learner/courses/86096/launch
Effective URL: https://login.flex.paychex.com/login_static/index.html?oac=eyJraWQiOiJvaWRjLXByb2QtMTY5Mjc0OTY1MyIsImFsZyI6IlJTMjU2In0.eyJhdXRo...
Submission: On October 30 via manual from US — Scanned from DE
Effective URL: https://login.flex.paychex.com/login_static/index.html?oac=eyJraWQiOiJvaWRjLXByb2QtMTY5Mjc0OTY1MyIsImFsZyI6IlJTMjU2In0.eyJhdXRo...
Submission: On October 30 via manual from US — Scanned from DE
Form analysis
1 forms found in the DOM<form id="otp-delivery-method-form">
<div class="mdc-form-field">
<div class="mdc-radio" id="otp-text-radio"><input class="mdc-radio__native-control" type="radio" id="otp-text" name="otp-delivery-method" value="SMS" data-payxautoid="payx.login.deliveryMethod.card.textRadio">
<div class="mdc-radio__background">
<div class="mdc-radio__outer-circle"></div>
<div class="mdc-radio__inner-circle"></div>
</div>
</div><label class="otp-label-with-select" id="otp-text-label" for="otp-text" data-payxautoid="payx.login.deliveryMethod.card.textMeSelectLabel">Text<div id="otp-text-select" class="mdc-select" role="listbox"
data-payxautoid="payx.login.deliveryMethod.card.textMeSelect">
<div class="mdc-select__surface" tabindex="0" data-payxautoid="payx.login.deliveryMethod.card.textMeSelect.surface">
<div class="mdc-select__label"></div>
<div class="mdc-select__selected-text"></div>
<div class="mdc-select__bottom-line"></div>
</div>
<div class="mdc-menu mdc-select__menu">
<ul class="mdc-list mdc-menu__items" data-payxautoid="payx.login.deliveryMethod.card.textMeSelect.options">
<li id="text-primary" class="mdc-list-item otp-select-primary-number" role="option" tabindex="0" aria-selected="" data-payxautoid="payx.login.deliveryMethod.card.textMeSelect.options.primary"><span class="otp-label-dots">(●●●) ●●●
-</span></li>
<li id="text-secondary" class="mdc-list-item otp-select-secondary-number" role="option" tabindex="0" data-payxautoid="payx.login.deliveryMethod.card.textMeSelect.options.secondary"><span class="otp-label-dots">(●●●) ●●● -</span></li>
</ul>
</div>
</div></label> <label class="otp-label" for="otp-text" data-payxautoid="payx.login.deliveryMethod.card.textMeLabel">Text <span class="otp-label-dots">(●●●) ●●● - </span><span class="otp-label-number"
data-payxautoid="payx.login.deliveryMethod.card.textMeLabel.number"></span></label>
</div>
<div class="text-rates" data-payxautoid="payx.login.deliveryMethod.card.textRatesMessage">Standard text messaging rates apply.</div>
<div class="mdc-form-field">
<div class="mdc-radio" id="otp-call-radio"><input class="mdc-radio__native-control" type="radio" id="otp-call" name="otp-delivery-method" value="VOICE" data-payxautoid="payx.login.deliveryMethod.card.callRadio">
<div class="mdc-radio__background">
<div class="mdc-radio__outer-circle"></div>
<div class="mdc-radio__inner-circle"></div>
</div>
</div><label class="otp-label-with-select" for="otp-call" data-payxautoid="payx.login.deliveryMethod.card.callMeSelectLabel">Call<div id="otp-call-select" class="mdc-select" role="listbox"
data-payxautoid="payx.login.deliveryMethod.card.callMeSelect">
<div class="mdc-select__surface" tabindex="0" data-payxautoid="payx.login.deliveryMethod.card.callMeSelect.surface">
<div class="mdc-select__label"></div>
<div class="mdc-select__selected-text"></div>
<div class="mdc-select__bottom-line"></div>
</div>
<div class="mdc-menu mdc-select__menu">
<ul class="mdc-list mdc-menu__items" data-payxautoid="payx.login.deliveryMethod.card.callMeSelect.options">
<li id="call-primary" class="mdc-list-item otp-select-primary-number" role="option" tabindex="0" aria-selected="" data-payxautoid="payx.login.deliveryMethod.card.callMeSelect.options.primary"><span class="otp-label-dots">(●●●) ●●●
-</span></li>
<li id="call-secondary" class="mdc-list-item otp-select-secondary-number" role="option" tabindex="0" data-payxautoid="payx.login.deliveryMethod.card.callMeSelect.options.secondary"><span class="otp-label-dots">(●●●) ●●● -</span></li>
</ul>
</div>
</div></label> <label class="otp-label" for="otp-call" data-payxautoid="payx.login.deliveryMethod.card.callMeLabel">Call <span class="otp-label-dots">(●●●) ●●● - </span><span class="otp-label-number"
data-payxautoid="payx.login.deliveryMethod.card.callMeLabel.number"></span></label>
</div>
</form>
Text Content
YOU AGREE TO OUR USE OF COOKIES AND OTHER TECHNOLOGIES WHEN YOU CONTINUE USING OUR WEBSITE. This website uses cookies and other technologies to support website functionality, analytics, preferences, marketing, and to improve your experience and the services we provide. Our Privacy Policy provides more information about our cookie and technology usage. Continue Link your accounts. Enter your Paychex Flex credentials once and future log ins will be with your organization's credentials. Single sign-on not set up. It looks like SSO has not been setup by your IT person. You may sign in using your Paychex Flex username and password. SSO unavailable. We are unable to log you in with your organization credentials. You may log in using your Paychex Flex credentials. Username Password Invalid Username or Password. Too many failed attempts will lock your account. Sign In Forgot Username or Password? New to Paychex Flex? Sign up GET A VERIFICATION CODE DO YOU PREFER A TEXT OR PHONE CALL? Text * (●●●) ●●● - * (●●●) ●●● - Text (●●●) ●●● - Standard text messaging rates apply. Call * (●●●) ●●● - * (●●●) ●●● - Call (●●●) ●●● - Continue ANSWER SECURITY QUESTION BEFORE WE LOG YOU IN, PLEASE FIRST VERIFY YOUR IDENTITY BY ANSWERING YOUR SECURITY QUESTION. Answer Incorrect answer, please try again. Too many failed attempts will lock your account. Recognize this device in the future. i Already recognized this computer? You may need to recognize this computer again because the web browser you're using is either: * A different browser than you used before * Set to automatically clear your cookies * Running in "private browsing" or "incognito" mode. Continue UNRECOGNIZED DEVICE YOU ARE SIGNING IN FROM AN UNRECOGNIZED DEVICE. ENTER THE 5-DIGIT CODE VERIFICATION CODE RESENT A TEXT MESSAGE WITH A VERIFICATION CODE WAS JUST SENT TO (•••) ••• - . YOU'LL HAVE FIVE MINUTES BEFORE THE CODE EXPIRES. WE'RE CALLING YOU AT (•••) ••• - TO SEND YOU A VERIFICATION CODE THROUGH A RECORDED MESSAGE. YOU'LL HAVE FIVE MINUTES BEFORE THE CODE EXPIRES. Verification Code Wrong code. Try again. 5 failed tries locks account. Get a new code Expires in: : Resend Code Recognize this device in the future. i Already recognized this computer? You may need to recognize this computer again because the web browser you're using is either: * A different browser than you used before * Set to automatically clear your cookies * Running in "private browsing" or "incognito" mode. Continue SORRY! LOOKS LIKE SOMETHING WENT WRONG PLEASE CLICK HERE TO CONNECT WITH A MEMBER OF OUR PAYCHEX SUPPORT TEAM. ID: ● YOU’VE BEEN INACTIVE FOR A WHILE TO KEEP YOUR DATA SAFE, WE TIMED YOU OUT. ID: ● Start Over SORRY ABOUT THAT... MORE THAN ONE PART OF YOUR LOGIN HAS BEEN REQUESTED TO BE RESET. PLEASE FOLLOW THE EMAIL INSTRUCTION TO COMPLETE YOUR RESETS. ACCOUNT DISABLED FOR YOUR SECURITY, YOUR ACCOUNT HAS BEEN DISABLED. THIS CAN HAPPEN FOR A NUMBER OF REASONS. TRY RESETTING YOUR PASSWORD. IF THAT DOESN'T WORK, CONTACT YOUR COMPANY ADMIN OR CLICK HERE TO CONNECT WITH A MEMBER OF OUR PAYCHEX SUPPORT TEAM. ID: ● ACCOUNT DISABLED FOR YOUR SECURITY, YOUR ACCOUNT HAS BEEN DISABLED. THIS CAN HAPPEN FOR A NUMBER OF REASONS. PLEASE CLICK HERE TO CONNECT WITH A MEMBER OF OUR PAYCHEX SUPPORT TEAM. ID: ● SESSION TIMEOUT YOU HAVE BEEN AUTOMATICALLY LOGGED OUT BECAUSE THERE HAS BEEN NO ACTIVITY FOR MORE THAN 15 MINUTES.PLEASE LOG IN AGAIN. OK TERMS OF USE Close Paychex Flex Security Privacy Policy Terms of Use Trademarks Copyright © 2023 by Paychex,Inc. SECURITY A COMMITMENT TO SECURITY At Paychex, safety and security of your personal and account information is one of our top priorities. Below you will find a brief overview of how we undertake this responsibility and some easy-to-follow tips you can use to safeguard your information. OUR PART Paychex is committed to protecting the security and integrity of our customer information through procedures and technologies designed for this purpose. Here are some of the things we do with our technology and our internal training to ensure that your information in our systems is protected: * We maintain policies and procedures covering the physical security of our workplaces, systems, and records. * Our physical, electronic, and procedural safeguards are built on industry recognized best practices. * We use technological means such as backup files, virus detection and prevention, firewalls, and other computer hardware and software to protect against unauthorized access or alteration to customer data. * We encrypt sensitive information that is transmitted over the Internet. * We limit employee access to customer information to those who have a business reason to know through formal approval processes, access controls, and internal auditing. * We require our employees to take information security awareness training and to apply this training to their job every day. * We use advanced technologies for the backup and recovery of customer information. YOUR PART You can help prevent unauthorized access to your account and personal information by following these security tips: * Enhanced login features to protect against identity theft. Your user ID (user name), password, picture, and pin code represent the keys you use to access your account information on our system. Keep these "keys" in your possession only. Please protect them as you would your house keys. * Follow the password tips that are presented in the user maintenance page when you create a new password. That way no one else will be able to guess your password. * When you view your account or perform any other transaction online, make sure that you use the "Log Out" button when you are finished, then close your browser completely. This ensures that no one can use the computer after you and see your account information. * If you believe that an unauthorized person has accessed your account, let us know as soon as possible by contacting your Paychex representative. EMAIL SECURITY WHAT IS PHISHING? Phishing is the act of sending an email to a user falsely claiming to be an established, legitimate company in an attempt to trick the user into providing valuable personal data such as credit card numbers, passwords, account information, or other private information. The email often uses fear tactics in an effort to entice the intended victim into visiting a fraudulent website. Once on the website, which generally looks and feels much like the valid company website, the victim is instructed to enter sensitive personal information that is then sent to the attacker and often used to commit identity theft or financial fraud against the victim. HOW TO IDENTIFY A PHISHING OR FRAUDULENT EMAIL Many phishing emails look and feel like the real thing and often include official looking logos or web pages taken from real organizations. Phishing scams have become increasingly sophisticated in their techniques and technology. However there are certain red flags that Internet users can look for that are common in phishing emails. Look over the following to familiarize yourself with common techniques that are used by attackers: * Urgent Emails or Threats to Accounts Some fraudulent emails claim that the recipient's account has been inappropriately accessed or is in jeopardy and that authenticating information (name, password, account number, credit card number) is required to keep the account from being closed, suspended, billed, or restricted. * Lost Information Consumers should be cautious of claims that a company is "updating" its files or accounts. * Personal Information Requests. for a recipient to enter sensitive personal information such as a user ID, password, bank account or social security numbers by clicking on a link or completing an email form should be treated with suspicion. * Senders Address Email recipients should not rely on the sender's email address to validate the true origin of the email. The "From" field of an email can be easily altered or forged by the sender. * Links in Emails Can be Easily Forged Links in emails can be misleading, luring the recipient to a forged version of a legitimate website. * Other Signs of a Fraudulent Email Other telltale signs of fraudulent or phishing emails include spelling errors, incorrect grammar, pop-up windows that look like sign-in pages, and unsuspected attachments which may contain viruses or other malicious software. HOW TO PROTECT YOURSELF There are ways to protect yourself from a phishing scam. Don't be a victim. Here are some suggestions: * Be wary of hyperlinks embedded in email messages as they are constructed on the surface to look legitimate but underneath they will often redirect you to a fraudulent website. Rather than click on a suspicious link, type the link into your browser window. * Be alert to hyperlinks that are misspelled such as -.paychecks.com or -.paychx.com. * Make sure you use anti-virus, anti-spam, anti-spyware software and a personal firewall. These products should be updated regularly and kept current. * Always scan file attachments for viruses or malicious software before opening them. * Routinely review and apply software security patches to your computer operating system and applications. * Make sure you use the most current versions of Internet browsers. * Choose secure passwords to protect your account information. They should be at least eight characters in length with a combination of letters, numbers, and special characters and should not be easily guessable. * Change your password periodically to help reduce the likelihood that it can be guessed. * Avoid responding to emails that do not come from someone you know. If an email comes from someone you know, but you were not expecting it or it seems suspicious, contact the sender to confirm that they sent it prior to responding. IF YOU RECEIVE SUSPICIOUS EMAIL If you suspect you have received a suspicious or fraudulent email, please contact your Paychex representative. IDENTITY SECURITY WHAT IS IDENTITY THEFT? Identity or financial theft can occur when someone uses your personally identifiable information (PII), like your name, social security number (SSN), bank account, or medical insurance number; without your permission to commit fraudulent activities. Identity crimes can take a variety of forms including the use of your information to obtain a credit card, establish a utility account, rent property, or receive medical services in your name. You may not find out about the theft until you review your credit report or a bank account statement and notice suspicious charges. You may even be surprised by a call from a debt collector. Identity theft is a serious crime often resulting in consumers spending hundreds of hours and thousands of dollars attempting to repair the damage to their good name and credit record. HOW DO THIEVES STEAL A PERSON'S IDENTITY? Identity theft starts with the misuse of your personally identifiable information. Skilled identity thieves may use a variety of methods to get hold of your information including: * Dumpster Diving. The identity thief may rummage through a person's trash looking for bills, pre-approved credit card offers, or other paper that includes personal information on it. * Phishing. The identity thief may send an email to a user falsely claiming to be an established, legitimate company in an attempt to trick the user into providing valuable personal data such as credit card numbers, passwords, account information, or other private information. The email often uses fear tactics in an effort to entice the intended victim into visiting a fraudulent website. * Skimming. The identity thief may steal credit or debit card numbers by using a special storage device when processing your card for payment. * Pretexting. The identity thief may access your personal information under false pretenses. Very similar to a phishing attack, but is usually performed by calling a person directly and claiming that they have something to offer that would entice the person to disclose personal information. * Old Fashioned Stealing. The identity thief may steal your wallet, purse, or mail. * Changing Your Address. The identity thief may divert your mail such as billing statements to another location by completing a change of address form. WHAT DO THIEVES DO WITH A STOLEN IDENTITY? Once an identity thief has your information, they may use it in a variety of different ways. CREDIT CARD FRAUD: * The identity thief may open new credit card accounts in your name and not pay the charges that appear on the victim's account statement. * The identity thief may also change the billing address on the credit card and accumulate large charges. Since the bill is going to an alternate address, it often takes the victim some time before they realize what has happened. BANK AND FINANCIAL FRAUD: * The identity thief may open a bank account in the victim's name and write bad checks. * The identity thief may take a loan in the victim's name. * The identity thief may create counterfeit checks using the victim's name and bank account number. * The identity thief may create a fake ATM or debit card using the victim's name and account number and make withdrawals against the victim's account. PHONE OR UTILITIES FRAUD: * They may open a new phone or wireless account in the victim's name and rack up charges. * They may use the victim's name to acquire utility services such as heating, electricity, or cable TV. GOVERNMENT DOCUMENTS FRAUD: * The identity thief may sign up for a driver's license or other official ID card using the victim's name and social security number. * The identity thief may use the victim's social security number to apply for government benefits. * The identity thief may file a fraudulent tax return using the victim's information. OTHER/MISCELLANEOUS FRAUD: * The identity thief may apply for a job using the victim's social security number. * The identity thief may rent a house or obtain medical services under the victim's name. * The identity thief may give the victim's personal information to the police during an arrest. If they do not show up for a scheduled court date, a warrant is issued in the victim's name. HOW CAN YOU FIND OUT IF YOUR IDENTITY WAS STOLEN? The best way to find out is to monitor your accounts and bank statements each month and check your credit report on a regular basis. If you check your credit report regularly, you may be able to limit the damage caused by identity theft. WHAT SHOULD YOU DO IF YOUR IDENTITY IS STOLEN? If you believe your information has been stolen, you should act immediately to minimize the damage. Filing a police report, checking your credit reports, notifying creditors, and disputing any unauthorized transactions are some of the steps you must take to restore your good name. For more information on how to respond to perceived identity theft or to file a complaint, contact the Federal Trade Commission at (1-877-ID-THEFT) or visit them online at www.ftc.gov WHAT CAN YOU DO TO PROTECT YOURSELF AGAINST IDENTITY THEFT? Awareness is an effective weapon against many forms of identity theft. Be aware of how information is stolen and what you can do to protect yours, monitor your personal information to uncover any problems quickly, and know what to do when you suspect your identity has been stolen. Here are some basic steps that you can take to protect yourself. * Do not throw documents in the trash that could be used to identify you. Buy a cross-cut or confetti type shredder and be sure to destroy all documents that may have your personally identifiable information on them. * Protect your online accounts with difficult to guess passwords. Do not share these passwords with others and change them periodically to ensure they are not compromised. * Do not use common identifiers such as mother's maiden name, date of birth, children's names, pet's names or other easily guessable information. * When using your ATM or Debit card, be wary of "Shoulder Surfers" that may be watching over your shoulder in an attempt to steal your PIN number. * Mail theft is common and easy to do. Do not use your home mailbox to mail bills or checks. Use an official U.S. Post Office or U.S. mailbox to mail documents that contain your personal identifying information. * Be sure to cancel all credit cards that you do not use on a regular basis. Open credit is a favorite for identity thieves. * Remove any identifiers you do not need from your wallet or purse. Don't carry your birth certificate, social security card, or passport, unless necessary. * If you receive a call at home or work, never give out any of your personal information over the phone. If they claim to be a credit grantor or provider of a service, request an application be mailed to your home or work address. You may also look up the official company number and return the call to ensure you are speaking to a legitimate business representative. * Do not put your telephone number or social security number on your checks. * Take your name off all promotional lists. Call the three credit reporting bureau numbers below to monitor your credit history. Additionally, subscribe to the various opt-out services listed below or provided by your utility, bank, credit card, medical, or similar service provider. Additional Resources Credit Reporting Bureaus: Equifax: 800-525-6285 Experian: 888-397-3742 TransUnion: 800-680-7289 Federal Government: Federal Trade Commission Department of the Treasury Identity Theft Resource Page Opt-out Services: Do Not Call Registry Prescreened Credit Card Offers Direct Marketing Association Consumer and Professional Organizations: Privacy Rights Clearinghouse: Identity Theft Resources Close