Protect yourself from online banking Identity Fraud
Below is important information that can help you protect yourself from Identity Theft and Fraud.
How CNB Protects You
Identity Theft Terms
Tips to Prevent Fraud
1. Do not give out your personal information, such as your account numbers, card numbers, Social Security/tax identification numbers, passwords, or tokan security passwords, unless you have initiated the call.
2. Community National Bank will not make any unsolicited calls requesting your password, token security password, or personal information. If you have any additional questions regarding security, please contact us at 830-741-3066 or 830-426-3066.
How CNB Protects You
Keeping your online financial and personal information secure and confidential remains one of our top priorities.
We ensure your privacy and security by offering the latest technology and services in the online banking industry. These include:
Encryption: The privacy of communications between you (your Internet browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our NetTeller server.
Password Complexity: It is important to verify that only authorized users login to NetTeller, which is achieved by verifying the Password you enter with the Password we have stored in our secure data center. While we allow you to enter your Password incorrectly a limited number of times, too many incorrect Passwords will result in the locking of your NetTeller account until you call us to reinitialize the account. We monitor and record "bad-login" attempts to detect any suspicious activity. To help prevent someone from guessing your Password, you should avoid using easy-to-guess Passwords such as:
- Birth Dates
- First Names
- Pet Names
- Phone Numbers
- Social Security Numbers
Never reveal your Password to another person. You should also periodically change your Password in the "User Options" section of NetTeller.
Secure Architecture: The computers storing your actual account information are not linked directly to the Internet:
- Transactions initiated through the Internet are received online by NetTeller Web servers. These servers route your transactions through firewall servers.
- Firewall servers act as a traffic cop between segments of our CNB network used to store information, and the public Internet.
- This configuration isolates the publicly accessible Web servers from data stored on our CNB servers and ensures only authorized requests are processed.
- Various access control mechanisms, including intrusion detection and anti-virus, monitor for and protect our systems from potential malicious activity. Additionally, our CNB servers are fault-tolerant, and provide for uninterruptible access, even in the event of various types of failures.
NetTeller also provides a number of additional security features that help protect you:
- Timeout: This prevents curious persons from continuing your NetTeller session if you left your PC unattended without logging out. We recommend that you always sign off (logout) when done with NetTeller.
- Check Images: View an exact facsimile of your check transactions online to help prevent fraud.
- Notifications: Cleared check alerts, payment alerts and balance alerts are tools we provide to help you monitor your accounts more actively and to detect suspicious activity more easily.
Identity Theft Terms
Please note, Community National Bank will never call you or email you asking for your personal information. If you receive an unsolicited email or phone call from someone who is identifying themselves as a CNB Representative and is looking for you to disclose your personal information, please call our Customer Service Center immediately at 830-426-3066 to let us know.
Below are definitions of some of the methods identity thieves frequently use to gain access to someone else's personal information:
Dumpster Diving: Thieves rummage through trash looking for bills or other paper that includes your personal information. Make sure you always shred these types of documents before throwing them away.
Hacker: A person who tries to gain unauthorized access to a computer system.
Malware: Also known as "malicious software", malware is designed to harm, attack or take unauthorized control over a computer system. Also see Virus, Trojan Horse and Worm.
Pharming: Pharming takes place when users type in a valid URL and you are illegally redirected to a Web site that is not legitimate in order to capture personal information through the Internet such as credit card numbers, bank account information, Social Security Number, and other sensitive information.
Phishing: Phishing is the process of seeking to obtain personal information illegally through email or pop-up messages in order to deceive you into disclosing your credit card numbers, bank account information, Social Security Number, passwords or other sensitive information.
Pop-Up Ads: Although these are a popular form of Web advertising in order to increase Web traffic to a specific site or capture your email address, some pop-ups are designed with malicious intent like when they appear as a request for personal information from a financial institution. However, please note that the pop-ups (or prompts) you see within NetTeller are safe and are initiated by Community National Bank to inform you about a NetTeller service, etc.
Spoofing: A form of phishing, it's a way for cyber criminals to send emails that look legitimate, but are not, to falsely represent a legitimate company or organization. The false email from phishing will include a phony link to what closely resembles a legitimate Web site address. Once you click on the pop-up, you'll be asked to provide personal information which is then forwarded to criminals.
Spyware: Spyware can be loaded by your computer unbeknownst to you. It's a type of program that watches what users do and forwards information to hackers over the Internet.
Trojan Horse: A malicious program that is disguised or embedded within a legitimate software program that, when activated, unwittingly allows hackers to gain unauthorized access to the computer.
Virus: A self-replicating computer program, loaded onto your computer without your knowledge that spreads by making copies of itself and clogging up your computer's memory.
Worm: Similar to a computer virus, a worm attaches itself to, and becomes part of, another executable program. Able to self-propagate, worms generally harm the network and consume bandwidth.