Businesswoman typing, laptop, digital security

Customer Education

Mobile Banking Security Tips

  • Fort Davis State Bank will never ask for your password under any circumstances. Never share your password with others. Fraudsters will try to obtain mobile banking passwords by e-mail, letter, phone calls, text message, by asking for your bank account number, username, password, and other important information. If you have any doubts, please contact Fort Davis State Bank immediately.
  • Always use strong passwords that cannot be easily guessed. They should be composed of numbers, letters (upper case and lower case) and special characters.
  • It is a good practice to change your mobile banking password regularly.
  • Do not lend others your phone with the mobile banking function open as this will allow for others to spy on your personal information.
  • Be careful about where and how you conduct mobile banking transactions. Don’t use your device over an unsecured Wi-Fi network or in a public place, such as a coffee shop because fraud artists might be able to access the information you are transmitting or viewing. Also, don’t send account numbers or other sensitive information through regular e-mails or text messages as these methods are not secure.
  • Password protect your mobile device and lock your device when it’s not in use. Always keep your mobile device in a safe location.
  • Delete text messages from your financial institution on your mobile device, especially if they contain sensitive information.
  • If you change your mobile number, immediately contact Fort Davis State Bank to change the details of your mobile banking profile. You should also take additional precautions in case your device is lost or stolen. Check with your wireless provider in advance to find out about features that enable you to remotely erase content or turn off access to your device or account if lost or stolen.
  • Do not modify (jailbreak) your mobile phone. It will make your mobile phone susceptible to an infection from a virus, Trojan, or malware.
  • When possible, install mobile security software on your mobile phone, similar to the Anti-virus software you have on your laptop or desktop computers.
  • Be alert to changes in your mobile phone performance. If you download any new applications and your mobile phone starts performing differently (for example, responding slowly to commands or the battery is draining faster than normal), that could be a sign that a malicious code is present on your mobile phone.
  • Monitor your financial records and accounts on a regular basis. Use the electronic account alerts feature to have alerts sent to you via e-mail for specific account activity. Regularly review your statements and account history with online banking. This will allow you to detect any suspicious activity in a timely manner.
  • One of the benefits of mobile banking is that it makes it very feasible to check your account activity daily and it gives you the opportunity to report anything unusual right away. Contact Fort Davis State Bank immediately if you see something suspicious in your account.

If at any time you notice suspicious activity on your account, please notify a Fort Davis State Bank representative immediately by calling 432-426-3211 for the Fort Davis location, 432-837-1888 for the Alpine Branch and 432-229-5000 for the Presidio Branch.

What is Corporate Account Takeover/Account Takeover?

Account Takeover is a fast growing crime where thieves typically use some form of malware to obtain login credentials to Online Banking accounts and fraudulently transfer funds from the account(s).

 

What is Malware?

Malware is short for malicious software, software designed to infiltrate a computer system without the owner’s consent. Malware includes computer viruses, worms, Trojan horses, spyware, dishonest adware, crime ware, most rootkits, and other malicious and unwanted software.

 

How does CATO/ATO work?

There are multiple ways that crooks can initiate an account takeover. They can target their victims with scams, causing them to unknowingly install software by clinking on a link or visiting an infected Internet site. They then start monitoring the system. The victim logs into the Online Banking platform and the fraudsters collect the login credentials. The fraudsters will then wait for the right time and then depending on the set controls—they login after hours or if the victim is utilizing a token they wait until the code is entered and then they will hijack the session and send a message that Online Banking is temporarily unavailable.

 

How does the money leave the account?

There are many methods that criminals use to accomplish their crime. Domestic and international wire transfers, business-to-business ACH payments, online bill pay, and electronic payroll payments have all been used to commit this crime.

 

Where does it come from?

Malicious software can come from malicious websites (including Social Networking Sites), E-mail, P2P Downloads (such as LimeWire) or from ads on popular websites.

 

How can I prevent CATO/ATO?

  • Make sure your firewalls are installed and updated on your personal computer
  • Do not open any attachments from e-mail and be on alert for suspicious e-mails
  • Reconcile your accounts daily
  • Note any changes in the performance of your computer—such as dramatic loss of speed, computer locks up, unexpected rebooting, unusual popups etc.
  • Make sure your employees know how and to whom to report suspicious activity to at your company and the bank
    Contact the bank if you:
  • Suspect a fraudulent transaction
  • If you receive an email claiming to be from the bank requesting personal or company information

 

What Fort Davis State Bank does to protect you:

At Fort Davis State Bank we strive to protect our customers from today’s common cyber threats. Our online banking platform has multiple security features integrated for your protection. Rather than being automated, all online access is granted through a customer service representative after thorough identity confirmation. Secure access codes are then required to specific delivery methods to ensure user access. Password requirements are set to increase security for the end user. While we do everything possible to protect your use of our services, always keep the following in mind:

  • Never give out your login information to anyone including friends or family and especially to ANY third parties over the phone or by email
  • Don’t write your credentials down anywhere
  • Always use strong passwords with additional characters and numbers
  • Change your password regularly
  • Do not store your credentials on browsers or toolbars, malicious software can retrieve this information
  • Install and update your firewall frequently
  • We will never request any sensitive information via e-mail; if you receive something that looks suspicious, do not reply

 

Stop Identity Theft–Preserve Your Identity…Recover Your Good Name

As with any crime you can’t guarantee that you will never be a victim, but you can minimize your risk. By managing your personal information wisely, cautiously and with an awareness of the issues, you can help guard against identity theft.

  • Don’t give out personal information on the phone, through the mail or over the internet, unless you’ve initiated the contact or are sure you know who you are dealing with.
  • Be wary of promotional scams. Identity thieves may use phone offers to get you to give them your personal information.
  • Carry only the identification information and the number of credit and debit cards that you’ll actually need.
  • Cancel all unused credit accounts.
  • Secure personal information in your home, especially if you have roommates, employ outside help or are having service work done in your home.
  • Guard your mail from theft by depositing outgoing mail in post office collection boxes or at your local post office, rather than in an unsecured mailbox. Promptly remove mail from your mailbox.
  • Thwart an identity thief, who may pick through your trash or recycling bins to capture your personal information, by tearing or shredding your charge receipts, copies of credit applications, insurance forms, physician statements, checks and bank statements, expired charge cards and credit offers you get in the mail.
  • When ordering new checks, pick them up at the bank, rather than having them sent to your home mailbox.
  • Keep your purse or wallet in a safe place at work, as well as copies of administrative forms that contain your sensitive personal information.

 

For additional information and advice, call the Federal Trade Commission (FTC) Identity Theft Hotline toll-free at 1-877-IDTHEFT (438-4338) or visit their ID Theft website: www.consumer.gov/scams