The security of your personal information is very important to us, and we’ve taken a number of precautions to ensure your information remains confidential and secure.
A few of these methods include:
- Unique Identifiers. To access your account on our website, you will be required to enter valid access codes such as a customer/user identification code (ID) and password. Without proper identification, access to your account information is denied.
- Web Browsers and Encryption. Web browsers seek to protect information by encrypting it while being exchanged between you and our site. We require the use of a browser supporting modern encryption technologies to access your account. You can tell encryption is being used when you see a URL that begins with "https" (instead of "http") in the address line and a secure symbol, such as a closed padlock or key icon, at the bottom of your browser screen.
- Firewalls. Monitored firewalls are used as a barrier between the internet, our website and our secure computer network to assist in protecting against unauthorized access.
- Virus Protection. We employ modern anti-virus technology to detect viruses and protect against entry into our computer network.
- Timeout Feature. For additional protection, our online applications have a timeout feature that automatically ends your session after a certain period of inactivity.
Protecting Your Personal Accounts
While we take precautions to keep your personal information secure, we consider you our partner in safeguarding your accounts. It's important that you review your account statement regularly. If you encounter suspicious account activity or notice unusual system behavior when conducting online banking, then immediately contact customer service toll-free at 866.351.5646.
There are some additional steps you can take in protecting your accounts:
- Never give out personal identifying information via email or text. If you receive texts or email requesting personal information — such as your account numbers, passwords, Social Security number or birth date — do not provide this data or click on any links provided in the texts or emails without confirming that the requests are legitimate. Be mindful over the phone as well. If you ever feel uncertain about the party contacting you, call their customer service center number from their website or your print records to verify and get routed to the correct contact. You can verify the authenticity of requests that appear to be from us by calling us at 866-351-5646, or visiting a bank location near you.
- Enroll in eStatements link to and/or log into your account to sign up for online bill pay to avoid a paper trail of confidential information and potential mail fraud.
- Keep up to date on Federal Deposit Insurance Corporation (FDIC) consumer fraud alerts. Especially keep an eye out for common text, email and calling scams.
- Learn from the FDIC on how to protect yourself from identity theft and fraud.
We’re fully committed to identifying, detecting and preventing fraud. To accomplish this task, we have created a Fraud Hotline for our customers, employees, suppliers, contractors, service providers, third parties, etc. This hotline is for the reporting of potential crimes, fraudulent and/or suspicious activities or to notify us of possible unethical conduct.
Please report these concerns as soon as possible by calling 1.866.822.8115. Please provide your name, phone number and specific details about the incident you are reporting so that we can better assist you. We will review all incidents reported. As necessary, we may make disclosures to local, state and federal law enforcement.
Grow your financial knowledge and understanding with our collection of helpful tips on preventing identity theft and improving your personal finances.
Some techniques most commonly used by fraudsters
Fraudulent Emails (Phishing)
The term phishing is used to refer to an attempt to acquire information by masquerading as a trustworthy entity. Phishing attempts can come in various formats such as emails or phone calls. They are a scam designed to steal your money and sensitive information. Phishing attempts often involve requests, threats, fake alerts or seemingly legitimate graphics and web addresses resembling the names of well-known companies or people. Be cautious of any solicitations conveyed with a sense of urgency. Always validate the requestor by alternate means such as official website or contact information.
Text Message Phishing (Smishing)
A phishing attempt sent via SMS (Short Message Service) or text to a mobile phone or device is also known as smishing. As with traditional email phishing, the purpose is the same — to convince you to share your confidential information.
Voice or Telephone Phishing (Vishing)
Voice phishing, or vishing, is an attempt made through a telephone call or voice message. Fraudsters may spoof your caller ID to mask the call and make the call appear to be coming from a legitimate company.