Citizens Community Bank
You'll love banking here!

Security

Protocols To Keep YourSecurity

Money Safe! 

Check your statements regularly. 

If soemthing seems irregular, contact CCB to discuss it. a recent study showed that customers who monitor their accounts online discover problems sooner.

Check your credit report at least annually. 

You are entitled to one free credit report annually from each of the three major credit bureaus. If a hijacker is misusing your credit, clues are likely to show up here.

For a free report: www.annualcreditreport.com

Password Protection

If your password is easy for you to remember, the chances are good it is also easy for an Internet hacker to figure out.

Experts advise a combination of letters and numbers… and avoiding pet names, your home address, and similar easy-tocrack codes.

Anti-Virus Software

Your computer’s anti-virus software is like a vaccine—it works at first, but you need to keep it up-to-date to guard against new strains.

Anti-Spyware

Anti-spyware programs are readily available, and every computer connected to the Internet should have the software installed…and updated regularly.

Phising Awareness

If you receive an unexpected email, or one that you consider suspicious, delete it. Remember: your bank will never email you and ask you to go to another site to “verify information.”

 

What about security for your Business? 

 

Train employees in security principles

Establish basic security practices to protect sensitive business information and communicate them to all employees on a regular basis. Establish rules of behavior describing how to handle and protect customer information and other vital data.Clearly spell out the penalties for violating business policies.

 

Protect information, computers and networks from viruses, spyware and other malicious code

Install, use and regularly update anti-virus and anti-spyware software on every computer used in your business. Such software is readily available online from a variety of vendors. Most software packages now offer subscriptions to “security service” applications, which provide additional layers of protection. Set the anti-virus software to automatically check for updates and then set the software to do a scan after the software update.

 

Provide firewall security for your Internet connection

A firewall is set of related programs that prevent outsiders from accessing data on a private network. Install and maintain firewalls between your internal network and the Internet. If employees work from home, ensure that their home systems are protected by firewalls. Install firewalls on all computers – including laptops – used in conducting your business.

 

Download and install software updates for your operating systems and applications as they become available

All operating system vendors regularly provide patches and updates to their products to correct security problems and improve functionality. Configure all software to install such updates automatically.

 

Make backup copies of important business data and information.

Regularly backup the data on every computer used in your business. Critical data includes word processing documents, electronic spreadsheets, databases, financial files, human resources files and accounts receivable/payable files. Backup data automatically if possible, or at least weekly.

 

Control physical access to your computers and network components

Prevent access or use of business computers by unauthorized individuals. Laptops can be particularly easy targets for theft, so make sure they are stored and locked up when unattended.

 

Secure your Wi-Fi networks

  • If you have a Wi-Fi network for your workplace make sure it is secure and hidden. To hide your Wi-Fi network, set-up your wireless access point or router so it does not broadcast the network name also known as the
  • Service Set Identifier (SSID). In addition, make sure to turn on the encryption so that passwords are required for access. Lastly, it is critical to change the administrative password that was on the device when it was first purchased.

 

Require individual user accounts for each employee

Setup a separate account for each individual and require that strong passwords be used for each account. Administrative privileges should only be given to trusted IT staff and key personnel.

 

Limit employee access to data and information, and limit authority to install software

Do not provide any one employee with access to all data systems. Employees should only be given access to the specific data systems that they need for their jobs, and should not be able to install any software without permission.

 

Regularly change passwords

Passwords that stay the same, will, over time, be shared and become common knowledge to co-workers and can be easily hacked. Passwords should be changed at least every three months.

 

INTEGRATED SECURITY: One of the best ways to protect yourself is by taking an Integrated Approach to security. This simply means being aware of where your risks might lie, then addressing each of these risks.

 

  • Make an inventory of all your Internet connected devices— phone, tablet, computer, Smartwatch, etc.
  • Evaluate how each device is protected from hackers and malware.
  • Access your risk. Can a hacker gain access to any or all of your devices?
  • Purchase and install the appropriate software protections for each device.
  • Of key importance: Pay attention to the Wi-Fi router in your home—it is the main way devices connect to the Internet. use a strong password, name the device in a way that won’t et people know its your house, and keep the router software up to date.

 

Your Security Take-away

  • Treat your mobile phone, tablets, and other devices like your computer. Use strong passwords and security settings. Install and regularly update security software and firewalls on each of your internet connected devices.
  • Build strong protections around your Wi-Fi router, the main port through which your transactions are conducted. When banking in public, disable Wi-Fi and switch to your mobile network. Be wary of strangers watching your transactions.

 

WIRELESS NETWORKS AND HOTSPOTS

Public Wi-Fi and hotspots are very convenient, but not very secure. to be safe, avoid performing banking transactions on a public network. If you need to access your account, try disabling the Wi-Fi and switching to your mobile network. Keep in mind that the decidedly low-tech problem of a stranger looking over your shoulder is still one of the biggest threats to your opine security when you are in public.

 

Overall account fraud totals morethan $2.4 billion annually, $1,200 per victim.

 

An estimated 2 million people are hit with account hijacking each year; most say it was from a phising email.

 

People who monitor their accounts online (rather than just with mailed statements) can detect hijacking earlier. In one report, victims’ losses were one-eighth of those who detected the crime via paper statements due to early detection.

 

 

 

 

 

 

NOTICE OF EXPIRATION OF THE TEMPORARY FULL FDIC INSURANCE COVERAGE FOR NONINTERESTBEARING TRANSACTION ACCOUNTS

By operation of federal law, beginning January 1, 2013, funds deposited in a noninterest-bearing transaction account (including an Interest on Lawyer Trust Account) no longer will receive unlimited deposit insurance coverage by the Federal Deposit Insurance Corporation (FDIC). Beginning January 1, 2013, all of a depositor's accounts at an insured depository institution, including all noninterest-bearing transaction accounts, will be insured by the FDIC up to the standard maximum deposit insurance amount ($250,000), for each deposit insurance ownership category.

For more information about FDIC insurance coverage of noninterest-bearing transaction accounts, visit http://www.fdic.gov/deposit/deposits/unlimited/expiration.html

Security  |  Privacy
Deter * Detect * Defend. Avoid ID Theft.FDICEqual Housing Lender