Skip Navigation Documents in Portable Document Format (PDF) require Adobe Acrobat Reader 5.0 or higher to view,download Adobe® Acrobat Reader.

Cybersecurity Tips

Posted Wednesday, October 10, 2018

 

With October being Cybersecurity Awareness Month, we want to share the affects of unsafe cybersecurity practices and how you can keep yourself from becoming a victim!

Safety is our number one priority. We are always striving to keep you and your information safe. Do yourself a favor and read up on these tips to keep yourself safe, too!

 

  1. YOU ARE A TARGET  Never assume “it won’t happen to me” – everyone is a potential target to hackers.

 

  1. EIGHT CHARACTERS IS NOT ENOUGH  Use strong password practices. Never use a word from any dictionary in any language. Use a combination of letters, numbers and characters.   Ex: P1zz@*3A+er

 

  1. LOCK IT UP  Never leave your devices unlocked and available for hackers. That includes phones and tablets.

 

  1. PRACTICE SAFE CLICKING  Do not click, download or open attachments from an email you’re not expecting.  Double check the spelling of links—often times the link will be misspelled to trick victims.   Ex: bankofarnerica.com

 

  1. TRUSTED BROWSING  Only browse the web to view sensitive information on a device that belongs to you and only on internet networks that are personal.  That means don’t check your credit card statement on the Starbucks WiFi – Anyone else who is on that network can access your device through it.

 

  1. BACK IT UP  Back up your data regularly and be sure to have current and up-to-date Anti-Virus software.

 

  1. SHARE LESS  Be conscious of how much you share on social media. When you share you’re going on vacation, criminals can pretend to be you, say they are lost on vacation and need money transferred. Only share that information with those who need to know and share it in person.

 

  1. PHYSICAL CYBER SAFETY  Malware can spread through infected devices such as USB drives when plugged into your computer. Be conscious of where the device came from.

 

  1. CUT OUT THE “MIDDLE MAN”  Question anyone asking for sensitive information or to make a purchase for a “prize” in return. Instead, ask for the company’s name and research a number to call them directly and verify credentials.

 

  1. STAY ON TOP OF YOUR ACCOUNTS  Check your accounts often for suspicious or unusual activity. These could be signs that you’ve been compromised.
 
women looking at her tablet and phone

eStatements

Now your statements are ready for you faster than ever.

Woman smiling while she writes a check

Checking

Finding the right account makes a difference. Explore your options and then apply online.