Banking Tips

Keeping you Safe

Banking looks a lot different than it did when we first opened! With so many ways to access your bank accounts, transfer money, deposit checks and customize how you bank, it’s best to stay up to date on tips and tricks that keep your money safe. Let’s take a look at some of our favorites!

Online Banking Fraud Prevention Best Practices

Protect your personal information, because confidentiality matters.

User ID and Password Guidelines

Create a “strong” password with at least 8 characters that includes a
combination of mixed case letters, numbers, and special characters.

Change your password frequently.

Never share username and password information with third-party providers.

Avoid using an automatic login feature that saves usernames and passwords.

General Guidelines

Do not use public or other unsecured computers for logging into Online Banking.

Check your last login date/time every time you log in.

Review account balances and detail transactions regularly (preferably daily) to confirm payment and other transaction data and immediately report any
suspicious transactions to your financial institution.

View transfer history available through viewing account activity information.

Whenever possible, use Bill Pay instead of checks to limit account number
dissemination exposure and to obtain better electronic record keeping.

Take advantage of and regularly view system alerts; examples include:

– Balance alerts
– Transfer alerts
– Password change alerts
– ACH Alerts (for cash management users)
– Wire Alerts (for cash management users)

Do not use account numbers, your social security number, or other account or personal information when creating account nicknames or other titles.

Review historical reporting features of your online banking application on a
regular basis to confirm payment and other transaction data.

Never leave a computer unattended while using Online Banking.

Never conduct banking transactions while multiple browsers are open on your computer.

An FBI recommended best practice is to suggest that company users dedicate a PC solely for financial transactions (e.g., no web browsing, emails, or social media).

Tips to Protect Online Payments & Account Data

Take advantage of transaction limits. Establish limits for monetary transactions at multiple levels: per transaction, daily, weekly, or monthly limits.

When you have completed a transaction, ensure you log off to close the
connection with the financial organization’s computer.

Use separate accounts for electronic and paper transactions to simplify
monitoring and tracking any discrepancies.

Reconcile by carefully monitoring account activity and reviewing all transactions initiated by your company on a daily basis.

Tips for Wireless Network Management

Wireless networks can provide an unintended open door to your business network. Unless a valid business reason exists for wireless network use, it is recommended that all wireless networks be disabled. If a wireless network is to be used for legitimate business purposes, it is recommended that wireless networks be secured as follows:

Change the wireless network hardware (router /access point) administrative
password from the factory default to a complex password. Save the password in a secure location as it will be needed to make future changes to the device.

Disable remote administration of the wireless network hardware (router / access point).

If possible, disable broadcasting the network SSID.

If your device offers WPA encryption, secure your wireless network by enabling WPA encryption of the wireless network. If your device does not support WPA encryption, enable WEP encryption.

If only known computers will access the wireless network, consider enabling
MAC filtering on the network hardware. Every computer network card is
assigned a unique MAC address. MAC filtering will only allow computers with
permitted MAC addresses access to the wireless network.

Account Transfer

Review historical and audit reports regularly to confirm transaction activity.

Utilize available alerts for funds transfer activity.

ACH (Automated Clearing House Batches)

Use pre-notification transactions to verify that account numbers within your ACH payments are correct.

Use limits for monetary transactions at multiple levels: per transaction, daily,
weekly, or monthly limits.

Review transaction reporting regularly to confirm transaction activity.

Utilize available alerts for ACH activity.

Wire Transfer

Use limits provided for monetary transactions at multiple levels: per transaction, daily, weekly, or monthly limits.

Review historical and audit reports regularly to confirm transaction activity.

Utilize available alerts for wire transfer activity.

Administrative Users

Limit administrative rights on users’ workstations to help prevent the
inadvertent downloading of malware or other viruses.

Dedicate and limit the number of computers used to complete online banking transactions; do not allow Internet browsing or e-mail exchange and ensure these computers are equipped with latest versions and patches of both antivirus and anti-spyware software.

Delete online user IDs as part of the exit procedure when employees leave your company.

Assign dual system administrators for online cash management services.

Use multiple approvals for monetary transactions and require separate entry and approval users.

Establish transaction dollar limits for employees who initiate and approve online payments such as ACH batches, wire transfers, and account transfers.

Tips to Avoid Phishing, Spyware and Malware

Do not open e-mail from unknown sources. Be suspicious of e-mails purporting to be from a financial institution, government department, or other agency requesting account information, account verification, or banking access credentials such as usernames, passwords, PIN codes, and similar information. Opening file attachments or clicking on web links in suspicious e-mails could expose your system to malicious code that could hijack your computer.

Never respond to a suspicious e-mail or click on any hyperlink embedded in a
suspicious e-mail. Call the purported source if you are unsure who sent an email.

If an e-mail claiming to be from your financial organization seems suspicious,
checking with your financial organization may be appropriate.

Install anti-virus and spyware detection software on all computer systems. Free software may not provide protection against the latest threats compared with an industry standard product.

Update all of your computers regularly with the latest versions and patches of
both anti-virus and anti-spyware software.

Ensure computers are patched regularly, particularly operating system and key application with security patches.

Install a dedicated, actively managed firewall, especially if using a broadband or dedicated connection to the Internet, such as DSL or cable. A firewall limits the potential for unauthorized access to your network and computers.

Check your settings and select, at least, a medium level of security for your

Clear the browser cache before starting an online banking session in order to
eliminate copies of Web pages that have been stored on the hard drive. How the cache is cleared depends on the browser and version you are using. This
function is generally found in the browser’s preferences menu.

Mobile Banking Education

One of the biggest barriers to consumers adopting Mobile Financial Services is fear of security
threats. Most consumers are afraid that their mobile device may be “hijacked”; some fear their
sensitive information may be intercepted as it travels across a wireless network; and still others
worry about the consequences if their mobile phone is lost or stolen. With most mobile devices
lacking the personal firewall, anti-virus software and other protections common today on personal
computers, these devices can be vulnerable to a variety of security threats, including:

Malware: A term for “malicious software” that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity or availability of the victim’s data, applications or operating system, or otherwise annoying or disrupting the victim

Phishing: Luring unsuspecting customers to provide sensitive personal information or downloading malware through an email. Popular scams including phishing emails that appear to be coming from a FI and contain a link to a spoofed website; the site tricks victims into logging in using their personal credentials, which are then captured by the criminal.

SmiShing: A contraction of “SMS and phishing”, in which criminals pose as a FI and use SMS in an attempt to gain access to confidential account information. The typical scam informs the mobile device owner that the person’s account was compromised or credit/ATM card was deactivated. The victim is directed to call a phone number or visit a spoofed website to reactivate the card. Once at the website or through an automated phone system, the victim is asked for card, Pass code and/or account numbers.

Vishing: A contraction of “voice and phishing”, in which victims are tricked into disclosing sensitive personal information through a phone call or voice response unit (VRU).

Mobile Fraud Prevention


An example of fraud monitoring is the ability to detect a “bad digital identity (MUID)”. Fraud detection in this case ensures a secure identity between the device and the host system. MNB utilizes an MUID to secure communications, preventing anyone who acquires a consumer’s credentials from actually using them.

Account/Customer Data

Additional security measures were taken in building the Mobile Banking solution. No customer identification or account information is stored within the Mobile Banking databases other than the mobile phone number. This information is used for logging purposes to report on activity and transactions that may be used by customer service representatives to support end-users.

Best Practices for Mobile Banking

Modify the phone’s settings so that only messages from authorized numbers are allowed.

Add the FI short code and customer service phone number to your contacts and only initiate SMS and phone calls from your contact list. Do not reply to SMS messages that do not exist in your contact list.

Do not click on links in SMS messages unless you initiated the SMS conversation with your FI.

Do not call phone numbers not in your contact list. If you are unsure about a phone number, you may text “Help” to your FI short code and compare the phone numbers. Only call the numbers in your Help response or in your contact list to avoid Vishing

Bookmark the FI’s mobile web site and only use this bookmark to access the site to avoid phishing.

Avoid using unsecured, public WiFi networks to access financial accounts with mobile devices.

Always use your cellular network when conducting mobile financial services.

Only download apps from stores, such as Apple & Android, that are submitted and branded by the FI.

Finally, know that FIs will not ask users to provide confidential information over an email or SMS message.

Always use your cellular network or a secured private network when conducting mobile financial services.

Do not access Mobile Financial Services from a “jail broken device”

Powered by Lapero