Skip Navigation

Branch Locations

Find

Fraud Prevention

Best Practices

 

User ID and Password Guidelines

  • Use a password manager tool like LastPass or KeePass to help maintain strong and different passwords for every online account you have.
  • Create a "strong" password with at least 8 characters that includes a combination of mixed case letters, numbers, and special characters.
  • Change your password frequently.
  • Never share username and password information with anyone.
  • Avoid using an automatic login feature for shared company or personal computers.

General Guidelines

  • Do not use public or other unsecured computers for logging into online banking.
  • Users should check the last login date/time every time they log in.
  • If the system does not recognize your computer or location, you will be asked to provide additional information to log into online banking. This is called Out-of-Band Authentication via phone or SMS text message.
  • Review account balances and detail transactions regularly (preferably daily) to confirm payment and other transaction data and immediately report any suspicious transactions to your financial institution.
  • View transfer history available by viewing account activity information.
  • Whenever possible, use Bill Pay instead of checks to limit account number exposure and to obtain better electronic record keeping.
  • Take advantage of and regularly view system alerts; examples include: ACH Alerts, Wire Alerts, Password change alerts.
  • Do not use account numbers, your social security number, or other account or personal information when creating account nicknames or other titles.
  • Use the historical reporting features of your online banking application on a regular basis to confirm payment and other transaction data.
  • Never leave a computer unattended while logged into online banking.
  • Never conduct banking transactions while multiple browsers are open on your computer.
  • User a dedicated PC solely for financial transactions (e.g., no web browsing, emails, or social media). Another easier way to do this is to create a LiveCD/DVD/USB.

Tips to Avoid Phishing, Spyware and Malware 

  • Do not open e-mail from unknown sources. Be suspicious of e-mails purporting to be from a financial institution, government department, or other agency requesting account information, account verification, or banking access credentials such as usernames, passwords, PIN codes, and similar information. Opening file attachments or clicking on web links in suspicious e-mails could expose your system to malicious code that could hijack your computer.
  • Never respond to a suspicious e-mail or click on any hyperlink embedded in a suspicious e-mail. Call the purported source if you are unsure who sent an e-mail.
  • If an e-mail claiming to be from your financial organization seems suspicious, call your financial institution.
  • Install anti-virus and spyware detection software on all computer systems. Free software may not provide protection against the latest threats compared with an industry-standard product.
  • Update all of your computers regularly with the latest versions and patches of both anti-virus and anti-spyware software.
  • Ensure computers are patched regularly, particularly operating systems, browsers, and key applications.
  • Turn your Operating System’s firewall on.
  • Check your settings and select, at least, a medium level of security for your browsers.
  • Be advised that you will never be presented with a maintenance page after entering login credentials. Legitimate maintenance pages are displayed when first reaching the URL and before entering login credentials.
  • Online Banking does not use pop-up windows to display login messages or errors. They are displayed directly on the login screen.
  • Online Banking never displays pop-up messages indicating that you cannot use your current browser.
  • Online Banking error messages never include an amount of time to wait before trying to login again.
  • Be advised that repeatedly being asked to enter your password/token code are signs of potentially harmful activity.

Tips for Wireless Network Management

Wireless networks can provide an unintended open door to your business or home network. It is recommended that wireless networks be secured as follows:
  • Change the wireless network hardware (router/access point) administrative password from the factory default to a complex password. Save the password in a secure location as it will be needed to make future changes to the device.
  • Disable remote administration of the wireless network hardware (router/access point).
  • Disable broadcasting the network SSID.
  • Use WPA2 (aka WPA2-PSK) with AES encryption. DO NOT USE WEP OR WPA, they are older technologies and no longer considered secure.
  • If only known computers will access the wireless network, consider enabling MAC filtering on the network hardware. Every computer network card is assigned a unique MAC address. MAC filtering will only allow computers with permitted MAC addresses access to the wireless network.

Additional Fraud Prevention Tips For Business eBanking 

Administrative Users
  • Prohibit the use of “shared” usernames and passwords for Business eBanking.
  • Limit administrative rights on users' workstations to help prevent the inadvertent downloading of malware or other viruses.
  • Dedicate and limit the number of computers used to complete online banking transactions; do not allow Internet browsing or e-mail exchange and ensure these computers are equipped with latest versions and patches of both anti-virus and anti-spyware software.
  • Delete online user IDs as part of the exit procedure when employees leave your company.
  • Assign dual system administrators for online cash management services.
  • Use multiple approvals for monetary transactions and require separate entry and approval users.
  • Establish transaction dollar limits for employees who initiate and approve online payments such as ACH batches, wire transfers, and account transfers.

Tips to Protect Online Payments & Account Data

  • Take advantage of transaction limits. Establish limits for monetary transactions at multiple levels: per transaction, daily, weekly, or monthly limits.
  • When you have completed a transaction, ensure you log off to close the connection with the financial organization.
  • Use separate accounts for electronic and paper transactions to simplify monitoring and tracking any discrepancies.
  • Reconcile by carefully monitoring account activity and reviewing all transactions initiated by your company on a daily basis.

ACH (Automated Clearing House Batches)

  • Use pre-notification transactions to verify that account numbers within your ACH payments are correct.
  • Use limits for monetary transactions at multiple levels: per transaction, daily, weekly, or monthly limits.
  • Review historical and audit reports regularly to confirm transaction activity.

Wire Transfer

  • Use limits provided for monetary transactions at multiple levels: per transaction, daily, weekly, or monthly limits.
  • Review historical and audit reports regularly to confirm transaction activity.

Account Transfer

  • Use limits provided for monetary transactions at multiple levels: per transaction, daily, weekly, or monthly limits.
  • Review historical and audit reports regularly to confirm transaction activity.