Please contact us immediately and provide a description of the fraudulent activity and a telephone number where you can be reached during the day. You may email or call Monday through Friday from 8am to 5pm at 907-228-4474 or toll free at 800-478-6101.
Zix Corporation Encrypted Email Service
To ensure the confidentiality of private information that our company sends you via email, and to comply with financial regulations, we use an email encryption service through Zix Corporation, the leader in email encryption services. For more information on receiving encrypted email from First Bank, please refer to our FAQ.
Shopping Safely Online
Online shopping has become a popular way to purchase items without the hassles of traffic and crowds. However, the internet has unique risks, so it is important to take steps to protect yourself when shopping online.
For more information please visit the US-CERT website: https://www.us-cert.gov/
Firewalls and Spyware
A firewall is a barrier between the Internet and your computer that protects your computer from harmful attacks that linger out in the online land. Spyware is a bug that was downloaded on your computer with or without your consent. Spyware infections usually show up in the form of non-stop pop-ups, hijacked browser (where your browser takes you to other sites than the one you want), and slow performance of your computer.
For more details on firewalls and spyware, please visit onguardonline.gov: https://www.consumer.ftc.gov/features/feature-0038-onguardonline
Only connect to WiFi networks that you absolutely trust. Turn off the automatic connect function on your phone. Turn off shared folders. Run a comprehensive security suite and keep it up to date to prevent spyware and viruses. Beware of information you are sharing - even logins to sites that you think are unimportant can give hackers access to more important information.
We all know that passwords are a pain to remember, but in the long run, you will be happy that they are required. There are many malicious hackers out there in the world today and having a complicated password is just one step to making it even more difficult for them to get your personal information.
Some tips on protecting yourself with your passwords are:
- Make the password as long in length as you can.
- Use numbers and letters.
- If the form is case sensitive, make some characters upper case and some lower case.
- Do not use generic passwords such as the word password, 123456789, any part of your name, address, birthday, phone number.
- Try to make the password at least seven (7) characters in length
- Any additional password characters such as * is more complicated to figure out.
- Never give out your password to anyone (not even to the bank).
- Do not write your passwords down to where someone could easily see them. Hide them in a safe spot or get a program on your computer to store them.
Phishing and Pharming
Phishing is a scam that is used mainly through emails in which they are trying to offer something that seems too good to be true. In the emails, there is usually a link that you "need" to click on to claim a prize or whatever they are offering. Once the link is clicked, the new site that comes up will prompt for verification your personal information. Once personal information is entered, the scammers behind the phishing email will then use the sensitive information for financial gain.
Pharming is the practice of hijacking a web site where a bank customer will input their sensitive information such as login credentials and bank account information. The hijacker will then use the sensitive information for financial gain.
For more information on phishing and pharming, please visit: https://www.consumer.ftc.gov/features/feature-0038-onguardonline
Social Networking and Identity Theft
Link to funny video.
The link does not connect to a Video. Instead, malicious software is downloaded and installed on the device. In reality, a friend's site was hacked and the malicious software collected contact information where the information was sent back the malicious software's creator so the link can be sent to even more potential victims.
The potential victim is introduced to a fake introductory page to a social networking site where they are asked to reenter their password. They are routed to the fake page via a link in an e-mail, private message with a link or public post with a link. If you are already logged in and are asked to log in again â€“ be aware.
Smishing, Vishing and Caller ID spoofing
By using a person's text services on their phone, a smishing attack asks the account holder to call a specified number to resolve a possible compromise of their bank account. The smishing attack could include the last four digits of the user's debit card making the text appear legitimate.
Vishing scams uses a combination social engineering and phishing to find victims that can be tricked into providing credit card or personally identifying information. Typically, the criminal sends the victim some kind of notice or leaves a message, requesting that the victim returns a call to verify an account or some similar ploy. When the victim returns the call, they are asked to provide account and identifying information under the guises of "updating" the account.
Caller ID spoofing is used to make it look like calls are coming from a legitimate or known number. It's a very similar technique to email spoofing, which makes e-mail addresses look like they are coming from a trusted source.
Scams requiring divulging some level of personal information to fully benefit from the invitation
Use caution when accepting invitations or downloading free applications to connect from unfamiliar persons or contacts who maybe mining for your personal information.
Do not give your password or other account details to people you know. Your sign on information was created for you only so the website or organization can not be held responsible for the sign on or the information which comes with it from being misused.
Participating in quizzes which may require you to divulge a lot of personal information which could be misused to harm your identity and increase your chances of fraudulent activities with your accounts.
Use caution when clicking on links you do not know or look suspicious which could install malware and viruses on your Internet enable device.
Be wary of E-mail scams asking you to update your profiles. Most businesses or organizations will not ask you by Email for profile updates. If there is any doubt, contact the business or organization directly.
A key tracking device is attached to a keyboard where it collect a finite number or key strokes. The thief sees all key strokes made on the computer so sign ons, passwords, account information and other sensitive information is unknowingly passed to the thief. Avoid using public use Internet enabled devices found in such places as hotel business centers and etc.
Key tracking software is installed unknowingly to the user on their Internet enabled device to transmit your exact key strokes to a remote location where the thief can have access. The key tracking software is installed from a Trojan or virus delivered by bogus e-mail or some other malicious attack.
What is a Credit Score?
A credit score is a complex mathematical model that evaluates many types of information in a credit file. A credit score is used by a lender to help determine whether a person qualifies for a particular credit card, loan, or service. Most credit scores estimate the risk a company incurs by lending a person money or providing them with a service; specifically, the likelihood that the person will make payments on time in the next two to three years. Generally, the higher the score, the less risk the person represents.
Why do I need to monitor my credit?
There are several good reasons to monitor your credit reports and score:
It can help you to reduce losses if you are a victim of identity theft. If you notice some inquiries or open accounts that you do not know anything about, it could be a sign that someone else is using your identity to receive goods and services. Chances are that they are not planning to pay the bills, so be sure to contact the companies and find out how to stop the service immediately.
It is a good way to make sure that your credit history is reported accurately. If it is not accurate, you can go back to the responsible companies and ask them to fix it for you.
It is good to have an idea of where you stand before applying for loans or credit cards. If you are thinking about buying a house, you might decide to take six months to get your score up before applying for a loan. Taking time and improving your credit score could help you to get a better interest rate, which saves you money!
How do I monitor my credit reports and score?
You are entitled to a free credit report from each of the three major credit reporting bureaus each year. Request your free credit report at www.annualcreditreport.com.
Your credit score will not be included in your free credit report. If you would like to see your credit score as well, you can request it with your credit report, but there is a fee for this service.
Where can I find out about repairing my credit score?
The Federal Trade Commission (FTC) has information on who to contact about credit score reporting at https://www.ftc.gov/.
Account Monitoring with Online Banking
Account monitoring with First Bank's Online Banking is available for personal or business accounts.
Checking your account activity is a great way to protect your identity. When you log into online banking regularly and monitor your account activity, you are more likely to notice fraudulent transactions sooner than waiting for your statement. The earlier you notice unusual activity and report it, the less damage can be done to your accounts and your identity.
National Do Not Call Registry https://www.donotcall.gov/