Internet Security Tips
Q: What are some basic security techniques that are available online, which I need to take advantage of to help better protect my Internet banking account?
A: The Internet banking service has several effective security techniques that we encourage you to implement when you use the Internet banking service:
- Never reveal your password to anyone or leave your password anywhere that someone else can obtain and use it.
- Change your password on a regular basis.
- Use the Exit button to end each Internet banking session. Do not use the Back button to exit the site.
- Change your session timeout in User Options to a time that meets your needs.
- Balance your account on a regular basis. Internet Banking makes it easy!
Fraud and Identity Theft Prevention
Q: What secure technology does T Bank use to protect me?
Safeguard your Social Security number
- Never provide your Social Security number unless you have initiated the contact and have confirmed the business or person's identity
- Do not use your full or partial Social Security number as a login ID, Personal Identification Number (PIN) or a password
- If you must provide your Social Security number in an email or on a Website ensure that it is encrypted, and you know how the recipient will protect it
- Do not record your Social Security number on a check, traveler's check, gift certificates, etc., unless required by law
- Don't carry your Social Security card and be cautious of your surroundings when disclosing your Social Security number.
- Reduce the amount of mail and paper with your personal information printed on it to reduce the chance of criminals stealing it
- Stop receiving paper account statements and canceled checks. View and download them online instead.
- Sign up for direct deposit to have your funds put directly in your account without paper checks.
Secure your computer
- Anti-spyware and anti-virus protection detects and removes viruses and spyware, which can steal vital information
- A firewall prevents unauthorized users from gaining access to a computer, or monitoring transfers of information to and from the computer
- Operating system and software updates, sometimes called "patches" or "service packs," should be installed as soon as possible
- Web browser updates are deployed with your security in mind so keep them current
Q: What are some of the types of online fraud to watch out for?
Phishing and spoofing
Sometimes criminals may send you email that looks like it has come from T Bank or another financial institution. These phony emails ask you to go to a web site that also looks like T Bank or the other institution and provide your personal account information. These emails may even ask you to call a phone number and provide account information. But the web site is a fake.
- Asking for personal information should raise a flag since T Bank emails will never ask you to reply in an email with any personal information, such as your Social Security number, ATM or Debit Card PIN.
- Urgent appeals claim that your account may be closed if you fail to confirm, verify or authenticate your personal information. T Bank will not ask you to verify information in this way.
- Messages about system and security updates claim that the bank needs to confirm important information due to upgrades and state that you must update your information online. T Bank will not ask you to verify information in this way.
- Offers that sound too good to be true often are. You may be asked to fill out a short customer service survey in exchange for money being credited to your account, and you are then asked to provide your account number for proper routing of the supposed credit. T Bank will not request your information in this way.
- Typos and other errors are often the mark of fraudulent emails or websites. Be on the lookout for typos or grammatical errors, awkward writing and poor visual design.
To protect against phishing and spoofing:
- Always look for the ‘https://’ and the lock symbol in the browser when you sign in to Online Banking.
- Make sure you are at T Bank’s web site when you sign in to Online Banking.
- If you receive a suspicious email, do not click on any links or reply to it. Simply delete it.
- To report a suspicious email that uses T Bank's name, you can forward it to email@example.com.
Money mules are unsuspecting victims who become middlemen for criminals trying to launder stolen funds. Victims are lured by the promise of a new career opportunity making large sums of money for minimal work. Criminals recruit money mules, send them stolen money and then ask the money mules to wire or transfer the money unwittingly to the criminals. Using the money mule masks the criminal's identity.
The money mule may keep a commission for performing the transfer or wire. The victims of these scams may not only have their bank accounts closed and financial reputation ruined, but are often left financially responsible for returning the stolen funds.
Common signs of a money mule scam:
- Overseas companies requesting money transfer agents in the US
- Opening new bank accounts to receive money from someone you don't know
- Accepting large sums of money into your personal bank account for a new job
- Transferring or wiring funds out of your personal bank account to people you do not know
Malware, short for "malicious software," includes viruses, spyware and trojans that are designed to infiltrate or damage a computer system. Malware is often used to steal personal information and commit fraud. There are several easy ways to minimize the risk of malware:
- Downloads from file sharing and social networking sites can be distributions points for malware
- Attachments and free software from unknown sources shouldn’t be opened or installed
- Pop-up advertisements asking for personal or financial information are likely fraudulent, so it's better to close them
- Updated security and system software can protect your computer from malware threats
Vishing uses Voice over Internet Protocol (VoIP) to call, leaving an automated recording. It alerts the consumer that their account has experienced unusual activity. The message instructs the consumer to call the same phone number shown in the spoofed caller ID with the same name as the financial company they are pretending to represent. And sometimes, criminals who try to get consumers to turn over personal data send emails and text messages containing fraudulent phone numbers.Rather than provide any information, you should contact T Bank at the customer service number you normally use to verify the validity of the message.
Q: What are some types of mobile banking fraud and how can I better protect myself when banking from a mobile device?
Fake Mobile Banking Apps
Criminals may develop and publish fake mobile banking applications attempting to steal your Online Banking credentials. Here are tips for recognizing an unofficial T Bank application:
- The developer or author of the application is not T Bank
- The application is being promoted on a third party site, somewhere other than the official application store for your mobile device
- There is a charge for downloading the application—T Bank does not currently charge for mobile application downloads
To help protect your accounts and information, don't download or install a T Bank Mobile Banking App if you spot any of these warning signs.
SMShing is phishing that happens via SMS text message. A criminal sends a text messages tricking you into replying with financial or personal information or clicking on links that will sneak viruses onto your mobile device. To guard against these scams:
- Don't respond to a text message that requests personal or financial information. T Bank will never ask you to respond in this way.
- Verify the phone numbers that appear in a text message. Store T Bank phone numbers in your mobile contacts for a quick cross-check. Or, you can go to the Contact Us page.
Mobile phones and tablets offer convenience, but they’re also easy to lose or steal, which can put your information at risk.
- Password-protect your device so it can’t be accessed unless the password is entered
- Enable an automatic screen-locking mechanism to lock the device when it’s not actively being used
- Consider using a remote wipe program, this will give you the ability to send a command to your device that will delete any data
- Keep a record of the device's make, model and serial number in case it's stolen
The T Bank Mobile Banking Apps still require you to enter your Online ID and Passcode before accessing your financial information.
|Traditional online threats|
Viruses, malware and other programs that steal your personal information or financial details are also able to infect some mobile devices.
- Some tablets may support traditional anti-virus products. Consider installing AV if supported on your device
- Back-up the device's data. This will allow you to restore the data if you need to wipe the memory to remove a harmful software threat
Stay vigilant about security when taking advantage of the convenience these devices offer.