Sign on to Online Banking

Fraud and Security Center


Protect Your PII

Personally Identifiable Information (PII) refers to any information that can be used to identify, locate, or contact an individual. This includes, but is not limited to – your name, Social Security number, date of birth, address and phone number.

It is important to be mindful of where you might use or share your PII. Be careful not to include any identifying information in your passwords, PIN numbers or passcodes.

We also recommend considering what you post online as social media is a huge source for cybercriminals to gain your private information. Look over the privacy settings of your social media accounts and enable multi-factor authentication when possible.

To learn more about how to protect, store, and use your PII, read the Department of Homeland Security’s factsheet. Learn More »

Stay Safe While at Home and On-the-Go

With scams and fraud still a significant part of our daily lives, it is imperative to implement both personal and device safety measures while at home.

Resist using public WI-FI to access personal accounts, make purchases, or sign into banking, credit or other applications where personal data is present.

Cybercriminals have the potential to intercept information being transmitted (aka “Man-in-the-Middle”) over unencrypted network connections and can use their findings in a wide variety of cyberattacks.

Security and Communication Devices

When you buy a security camera or a home internet communication device make sure you know what software you will use with it (Alexa, Siri, Google Home, etc). Every software has different privacy settings, which are critical to protecting your information.

WI-FI

Some WI-FI routers and extenders are secured through a universal login. Even when a WI-FI router comes with a password to access the network, the main router may not be fully secured because it can be accessed through a universal login. Check with the WI-FI provider before connecting to your network. If the network is secured with a universal login, work with the provider to adjust the settings.

Software Updates

Keep security software and system updates current. Having the latest version is the best defense against viruses, malware, and other online threats. It is critical to know what you are installing. BEFORE clicking install, do an online search to see if there are any known issues with the upgrade, particularly for your devices and computers.

Shred It

All mail contains your address. Some mail also contains hidden account information – especially in catalogs, coupons, and offers. Do not just throw out junk mail – shred it. While basic shredders are better than simply throwing out mail, cross shredding is considered the gold standard.

Sneaky Cameras

Cameras are in everything from phones, computers, baby and pet monitors, televisions and communication devices. Cameras can also be accessed without these devices being engaged. When you are not using the camera, put a blocker in place over the opening to protect yourself from unwanted invasions of your privacy.

Don’t Answer That Call

Vishing (Voice Phishing) is a social engineering scheme, that aims to gather personal and confidential information using verbal scams.

Like phishing, vishing calls may evoke a sense of panic, and attackers will attempt to persuade their victims to provide sensitive, personal material over the phone.

Cybercriminals may even leverage programs that can create bogus phone numbers using local area codes and numbers, or ones that resemble a reputable organization’s business number.

If you suspect that you might have received (or are on) a vishing call, it is always best to hang up and verify legitimacy by calling an official, public phone number of the company in question.

Federal Trade Commission’s National Do Not Call Registry

You may also wish to register for the Federal Trade Commission’s National Do Not Call Registry which will greatly reduce the telemarketing calls your number receives and help you spot a possible vishing attack.  Learn More »

Online and Mobile Security

Enhance Your Password Security

Strong passwords are essential in practicing online security and protecting your information. Strong passwords are those that include uppercase and lowercase letters, numbers, special characters, and are at least twelve to fifteen characters in length.

Remember to never write down, share, or store your passwords where others can access them. Instead, use a secure password manager to organize and keep track of your passwords.

It is important to update your passwords frequently, setup multi-factor authentication and enable biometric login when available.

Avoid the “Remember Me” and “Allow Autofill” options when logging into online or mobile accounts, as these settings store your credentials on the device or browser in use.

The United States Federal Bureau of Investigation (FBI) recommends using lengthy passphrases as passwords. To read more about creating a strong passphrase, check out the FBI’s article on Building a Digital Defense with Passwords.  Learn More »

Be Aware of Email Scams

Phishing refers to a type of social engineering attack in which a cybercriminal sends deceptive emails in an attempt to infect a user’s device with malware and/or obtain personal information, such as credit card numbers, login credentials, and other sensitive material.

These messages often use verbiage that creates a sense of urgency, so that the user is more likely to panic and act quickly on the fraudster’s requests.

Phishing emails are frequently centered around current events, like the COVID-19 pandemic; or sent at specific times of year, such as tax season.

Always be cautious when opening attached files as they can potentially have malicious programs embedded in them just waiting to be run by an unsuspecting user.

It is important to always think before you click, especially if the sender appears suspicious or if you were not expecting the email. Practice hovering your mouse over hyperlinks to see where they are really taking you.

How To Spot And Avoid A Social Engineering Attack
To learn more about how to spot a social engineering attack and how to avoid them, visit the United States Cybersecurity and Infrastructure Security Agency (CISA) website and review their tips on Avoiding Social Engineering and Phishing Attacks. Learn More »

Understand Ransomware

Ransomware is an ever-evolving form of malware designed to take your files hostage (encryption), rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for releasing files (decryption). Here are some important tips that will help protect your files:

  • Update software and operating systems with the latest patches. Outdated applications and operating systems are the targets of most attacks.
  • Never click on links or open attachments in unsolicited emails.
  • Back up data on a regular basis. Keep it on a separate device and store it offline.
  • Follow safe practices when using devices that connect to the Internet.

Learn more about how to protect yourself from Ransomware.  Learn More »

Update Your Devices

Ensuring your devices are updated is extremely important and is a simple step to help you stay safe online.

Software updates not only improve how your device runs – they also fix or remove bugs, patch security vulnerabilities that are exploitable by hackers, and add new and improved features.

By regularly updating your devices, you can help keep your personal information safe and out of the wrong hands.

Identity Theft Best Practices

Monitor Your Accounts and Credit Report

Identity theft is the deliberate and intentional use of another person’s identity, usually for financial gain. Luckily there are ways to lower your risk of becoming a victim of this crime.

Regularly monitoring your financial account statements, as well as keeping track of activity on your credit report, are good ways of being proactive and can help you stop identity theft before it’s too late.

Setting up alerts on your account and/or debit card is simple and will help you spot suspicious activity like invalid logins, transactions, or fraudulent online charges.   

Credit monitoring is easy to setup and tracks activity at all three major credit bureaus – Equifax, Experian, and TransUnion. This service will alert you when it detects newly opened loans or credit accounts, unexpected changes to your credit limits, a change in personal information on your credit file, and more.

Learn more about identity monitoring services and Identity Theft Protection Services by visiting the United States Federal Trade Commission’s website.  Learn More »

Report Suspicious Account Activity

Do you think you’ve been a victim of fraud? Don’t worry, we’re here to help.

If you suspect fraudulent activity on your account, please contact our office at (205)487-4277.

Setting up alerts on your account and/or debit card is simple and will help you spot suspicious activity like invalid logins, transactions, or fraudulent online charges.

Resources

Federal Trade Commission (FTC)

  • File a Complaint or Report a Scam

    You may wish to file a formal complaint or report a scam or consumer issue directly with the Federal Trade Commission (FTC): FTC Complaint Assistant  Learn More »

  • Identity Monitoring Services

    Learn more about identity monitoring services and Identity Theft Protection Services by visiting the United States Federal Trade Commission’s website.  Learn More »

  • Do Not Call Registry

    Register for the Federal Trade Commission’s National Do Not Call Registry which will greatly reduce the telemarketing calls your number receives and help you spot a possible vishing attack.  Learn More »

  • Ransomware

    Learn more about how to protect yourself from Ransomware 
    Learn More »

FBI Password Recommendations

The United States Federal Bureau of Investigation (FBI) recommends using lengthy passphrases as passwords. To read more about creating a strong passphrase, check out the FBI’s article on Building a Digital Defense with Passwords.  Learn More »

FBI’s Internet Crime Complaint Center (IC3)

You can also report stolen identities and finances to the FBI’s Internet Crime Complaint Center (IC3): Complaint Referral Form  Learn More »

Review Credit Report (Annual Credit Report)

Review your credit reports for accuracy.  You can get a free credit report once a year at www.annualcreditreport.com.  This is a free government website and you won’t be required to enter any debit or credit card information.

IRS Identity Theft 

Tax-related identity theft happens when someone steals your personal information to commit tax fraud. Your taxes can be affected if your Social Security number is used to file a fraudulent return or to claim a refund or credit.  Learn More »

Online Privacy and Security

Understanding online privacy, how to protect your devices from hackers and threats, and how to avoid common online scams.  Learn More »

CISA Social Engineering

To learn more about how to spot a social engineering attack and how to avoid them, visit the United States Cybersecurity and Infrastructure Security Agency (CISA) website and review their tips on Avoiding Social Engineering and Phishing Attacks.  Learn More »

Back to the top