Close Search

Popular Searches

Business LendingCareersCash ManagementPersonal Checking

Personal Protection and Detection

There is nothing more valuable than your own information. Whether you are traveling, using social media, or logging into accounts online, your information can be at risk. Learn how to avoid personal cybersecurity issues and combat attacks if they happen.

Nov 09, 2023

Check Fraud

In recent months, there has been a notable increase in digital check fraud cases. As we navigate through a world of online transactions, it’s important to stay vigilant and use advanced security measures.
Read Now

Protect Your Information Online

What is PII?

Personally Identifiable Information (PII) refers to any information that can be used to identify, locate, or contact an individual. Handling proper PII is essential to keeping your information protected. Unprotected PII is often the beginning of identity theft and other cyber attacks.
Social security numbers, date of birth, addresses, phone numbers and more should not be used in passwords PIN numbers, or passcodes.
When it comes to social media ensure that your social security number, date of birth, address, phone number, PIN number, or current whereabouts aren't posted.
Refrain from printing PII if possible and follow the U.S. Department of Homeland Security’s best practices for emailing or texting PII.

Information Security While Traveling

If you are traveling for leisure or embarking on a business trip, it is important to implement device safety measures and take precaution. Whether it is installing secure devices, using Wi-Fi properly, or setting strong passwords there are multitude of ways individuals can keep their information safe.
Consider investing in a VPN (Virtual Private Network) that can be bought on most mobile app stores.
Be mindful when using Public Wi-Fi. Your information is protected if there is a lock symbol or “https” in the address bar to the let of the website address.
Stay vigilant of your surroundings and keep your devices close to you.
Reset your passwords when you arrive home.

Fraud Awareness: Trending Scams

Check Fraud

Check fraud happens when a criminal obtains and uses a check without proper authorization, leading to unauthorized withdrawals or purchases. In recent months, there has been a notable increase in digital check fraud cases industry wide.
Today’s advanced technology allows these scammers to create convincing counterfeit checks and manipulate digital images for unauthorized transactions.
Cash management feature including ACH, Positive Pay and Check Positive Pay add a sophisticated layer for fraud protection and detection.
The United States Postal Service reported complaints of mail theft doubled in 2021 and Banks report that check fraud jumped to 680,000 reports in 2022, up from 300,000 the year prior.

Check Fraud Tips

1
Pick up mail promptly: Avoid leaving letters or packages in your mailbox or at your door for any length of time.
2
Inquire about overdue mail: If you haven’t received a check, or any other sensitive mail, contact the sender as soon as possible.
3
Don’t send cash or checks. If you must mail a check, bring the envelope directly to the post office to hand deliver to an employee. Do not leave in any mailbox.

Tax Season Fraud

Identity theft activity increases at this time, so it is important to be aware of how cybercriminals steal your information and use it to take out a loan, open a line of credit or file a tax return using your information.
Data breaches can provide cybercriminals a resource for personal information, they can also find the data they need right from personal devices and home computers.
Keeping all devices updated and using security features like multi-factor authentication (MFA), built-in firewalls, biometrics and long passwords (or passphrases) are some of the best ways to lower your risk of compromise.
Some of the most common tax scams are phone calls and emails from thieves pretending to be from the IRS.

How to Spot Phishing

1
Emails are centered around relevant topics
2
Sender is suspicious
3
Email contains deceitful hyperlinks
4
Messaging insists there is a sense of urgency
5
Wording contains poor spelling/grammar

Identity Theft

Avoid Identity Theft

Identity theft is the deliberate use of another person’s identity often for financial gain. There are many actions you can take to avoid losing your finances or other important valuables in your life.
Keep track of your financial statements and activity on your credit report.
Set up alerts on your banking app that notifies you of suspicious activity.
Sign up for a credit monitoring service and receive alerts about unexpected activity happening in your account.
To learn more visit your local branch.

Report Identity Theft

If you’ve fallen victim to identity theft, don't panic. When in this situation it is most important to seek guidance and report the theft. Read below to discover identity theft resources.
The first thing you should do is call your branch manager or visit your local branch for guidance on what to do next.
The FBI allows you to file a complaint about Identity theft.
The FTC allows you to report a stolen identity.
To learn where and how to report a scam visit below.

Protect Your Information Online

Multi Factor Authentication

Multi-Factor Authentication(MFA) is a login setting where you use multiple methods to verify your identity.
Oftentimes, hackers are able to find your passwords therefore an extra layer of protection is needed.
Multi-Factor Authentication can be used for email, social media, and other account logins.
MFA is an easy change for added protection.
Read what the CISA has to say about why MFA is important.

Forms of Multi-Factor Authentication (MFA)

1
TEXT MESSAGES
2
FINGERPRINTS OR FACE SCANS
3
EMAIL CODES
4
ONE TIME PASSWORDS (OTP)
5
AUTHENTICATOR APPS

Cyber Engineering Scams

Cyber Engineering Scams are fake messages pretending to be legitimate sources that trick users into compromising personal information.
Phishing is when deceptive emails are sent to obtain important information or hack a device.
Smishing is a cyber attack that attacks victims by texting them to give up personal information.
Vishing is when phone calls attempt to persuade the victim to verbalize important information.

Three Ways to Avoid Cyber Engineering Scams

1
If you receive an unwanted call listen carefully/ When in doubt hang up.
2
Register for the Do Not Call Registry on the FTC website. To reduce vishing calls to your phone.
3
When opening emails, think before you click. Set up MFA on email accounts.

Protect Your Personal Files

Update Phones and Computers Regularly

Ensuring devices are updated and patched is a simple yet, important step in keeping personal and business information safe, according to the Cybersecurity and Infrastructure Agency (CISA). Below are updating tips.
Update software as soon as possible to protect your digital devices against attackers.
Some software will automatically check for updates, confirm what processes your systems use.
Make sure you only download software updates from trusted vendor websites.
Explore additional tips from CISA in the link below.

What is Ransomware?

Ransomware is a type of malware that takes your files hostage and makes them unusable with restricted access. Cybercriminals threaten to publish your files or block access to them until a ransom is paid off.
Update software and operating systems with the latest patches.
Back up data frequently.
Do not click on links in unsolicited emails.
Educate family on ransomware.
Be mindful of your activity when connected to unknown or unfamiliar Wi-Fi networks.
The FTC provides advice to individuals and small businesses on ransomware.
For Informational/Educational Purposes Only: The content expressed on this site is educational and not intended as specific advice/recommendations/safeguards for any individual. You should carefully consider your needs and consult the appropriate professional(s) for the best solution to meet your needs. Outlooks and past performance are not guarantees of future results.