Internet Banking Login

User Id:

 

 

FDIC Equal Housing Lender

Email Us

Privacy Policy

Security Awareness Tip Of The Day Provided By SANS

Never share your passwords with others, including your supervisor or coworkers. Your password is a secret; it only works if only you know it. If anyone else knows your password, you may be responsible for their actions. 

One of the most effective steps you can take to protect your cloud account is to make sure you are using two-step verification. In addition, always be sure you know exactly whom you are sharing files with. It is very easy to accidently share your files with the entire Internet when you think you are only sharing them with specific individuals. 

Do you plan on giving away or selling one of your older mobile devices? Make sure you wipe or reset your device before disposing of it. If you don't, the next person who owns it will have access to all of your accounts and personal information.

A common method cyber criminals use to hack into people's computers is to send them emails with infected attachments. People are tricked into opening these attachments because they appear to come from someone or something they know and trust. Only open email attachments that you were expecting. Not sure about an email? Call the person to confirm they sent it.

Never give your password to someone over the phone. If someone calls you and asks for your password while saying they are from the Help Desk or Tech Support team, it is an attacker attempting to gain access to your account. 

Review your bank, credit card and financial statements regularly to identify unauthorized activity. This is one of the most effective ways to quickly detect if your bank account, credit card or identity has been compromised. 

When browsing online, encrypting your online activities is one of the best ways to protect yourself. Make sure your online connection is encrypted by making sure HTTPS is in the website address and that there is a green lock next to it. 

The number one step for protecting your mobile device is making sure it has a strong passcode or password lock on it so only you can access it. 
Every plugin or add-on you install in your browser can expose you to more danger. Only install the plugins you need and make sure they are always current. If you no longer need a plugin, disable or remove it from your browser via your browser's plugin preferences. 

A password is only as secure as the computer or network it is used on. As such, never log in to a sensitive account from a public computer, such as computers in a cyber cafe, hotel lobby or conference hall. Bad guys target public computers such as these and infect them on purpose. The moment you type your password on an infected computer, these cyber criminals can harvest your passwords. If you have no choice but to use a public computer, change your password at the next available opportunity you have access to a trusted computer. 

Two-step verification is one of the best steps you can take to secure any account. Two-step verification is when you require both a password and code sent to or generated by your mobile device. Examples of services that support two-step verification include Gmail, Dropbox and Twitter. 

When a major news event happens, cyber criminals will take advantage of the incident and send phishing emails with a subject line related to the event. These phishing emails often include a link to malicious websites, an infected attachment or are a scam designed to trick you out of your money.

One of the most effective steps you can take to protect your cloud account is to make sure you are using two-step verification. In addition, always be sure you know exactly whom you are sharing files with. It is very easy to accidently share your files with the entire Internet when you think you are only sharing them with specific individuals.

If you have kids with mobile devices, create a central home charging station in a place like your bedroom. Before the kids go to bed at night, have them put their mobile devices there so they are not tempted to play with them when they should be sleeping.

Never send an email when you are angry; you will most likely regret it later. Instead, when you are emotional and want to reply to someone, open up an email and write everything you feel, but do not send it. (Be sure there is no name in the TO field so that you do not accidently send it.) After you have vented, save the email and come back an hour later. You only want to reply to any type of emotional situation after you have had time to cool down.

Make sure you have anti-virus software installed on your computer and that it is automatically updating. However, keep in mind that no anti-virus can catch all malware; your computer can still be infected. That is why it's so important you use common sense and be wary of any messages that seem odd or suspicious.

Phishing is when an attacker attempts to fool you into clicking on a malicious link or opening an attachment in an email. Be suspicious of any email or online message that creates a sense of urgency, has bad spelling or addresses you as "Dear Customer."

When shopping online, always use your credit cards instead of a debit card. If any fraud happens, it is far easier to recover your money from a credit card transaction. Gift cards and one-time-use credit card numbers are even more secure.

Never share your passwords with others, including your supervisor or coworkers. Your password is a secret; it only works if only you know it. If anyone else knows your password, you may be responsible for their actions.

One of the most effective ways you can protect your computer at home is to make sure both the operating system and your applications are patched and updated. Enable automatic updating whenever possible.

Be aware of all the devices connected to your home network, including baby monitors, gaming consoles, TVs, appliances or even your car. Ensure all those devices are protected by a strong password and/or are running the latest version of their operating system

When you forward an email to others or copy new people to an email thread, review all the content in the entire email and make sure the information contained in it is suitable for everyone. It is very easy to forward emails to others, not realizing there is highly sensitive information in the bottom of the email that people should not have access to.

Eventually, we all have an accident or get hacked. And when we do, backups are often the only way to recover. Backups are cheap and easy; make sure you are backing up all of your personal information (such as family photos) on a regular basis. 

Never respond to emails asking for personal information. Companies you do business with should never ask for your account information, credit card numbers or password in an email. If you have any questions about an email you receive that supposedly came from your financial institution or service provider, find their number on their website and call them.

Turn off Bluetooth if you are not using it on your computer or device. Not only does this make it more secure, but it also saves battery life.

The most effective steps you can take to secure your wireless network at home is to change the default admin password, enable WPA2 encryption and use a strong password for your wireless network.

Never give your password to someone over the phone. If someone calls you and asks for your password while saying they are from the Help Desk or Tech Support team, it is an attacker attempting to gain access to your account

The number one step for protecting your mobile device is making sure it has a strong passcode or password lock on it so only you can access it.

A common method cyber criminals use to hack into people's computers is to send them emails with malicious links. People are tricked into opening these links because they appear to come from someone or something they know and trust. If you click on a link, you may be taken to a site that attempts to harvest your information or tries to hack into your computer. Only click on links that you were expecting. Not sure about an email? Call the person to confirm they sent it.

When a major news event happens, cyber criminals will take advantage of the incident and send phishing emails with a subject line related to the event. These phishing emails often include a link to malicious websites, an infected attachment or are a scam designed to trick you out of your money

Technology alone cannot protect you. Bad guys are constantly developing new ways to get past firewalls, anti-virus and filters. You are the best defense against any attacker.

Keep in mind that digital data is not the only thing that needs to be protected. Paper documents also need to be protected. When disposing of any confidential documents, make sure they are shredded first or disposed of in bins for shredding. Also, be sure to lock up any sensitive documents before you go home at the end of the day.

Eventually, we all have an accident or get hacked. And when we do, backups are often the only way to recover. Backups are cheap and easy; make sure you are backing up all of your personal information (such as family photos) on a regular basis.

Passphrases are the strongest type of passwords and the easiest to remember. Simply use an entire sentence for your password, such as "What time is coffee?" By using spaces and punctuation, you create a long password that is hard to guess but easy to remember.

A common method cyber criminals use to hack into people's computers is to send them emails with infected attachments. People are tricked into opening these attachments because they appear to come from someone or something they know and trust. Only open email attachments that you were expecting. Not sure about an email? Call the person to confirm they sent it.

Review your bank, credit card and financial statements regularly to identify unauthorized activity. This is one of the most effective ways to quickly detect if your bank account, credit card or identity has been compromised

Never give your password to someone over the phone. If someone calls you and asks for your password while saying they are from the Help Desk or Tech Support team, it is an attacker attempting to gain access to your account

New MasterCard Liability
CFPB Helps Assisted Living and Nursing Facilities Protect Seniors from Financial Abuse

The Consumer Financial Protection Bureau (CFPB) released a guide to help assisted living and nursing facility staff better protect the people in their care by preventing and addressing financial abuse and scams. The guide helps staff recognize, record, and report financial mistreatment by family members or other trusted people handling the finances of an incapacitated adult. The guide also addresses prevention of a wide variety of financial exploitation and scams.  "http://www.consumerfinance.gov/newsroom/cfpb-helps-assisted-living-and-nursing-facilities-protect-seniors-from-financial-abuse/"

Be aware of a new Cashnet Payday loan email scam!

"http://dfi.wa.gov/consumers/alerts/cashnet-payday.htm"

These scammer will email you a letter stating you owe a payday loan plus fees and that you will be prosecuted if you do not pay it. If you have not taken out any payday loans please do not respond to the emails and report it to Templeton Savings Bank. Please refer to the links above for more information on the scam.

Important News for our Online Banking users!
Beginning May 19, your Image & Pass Phrase will no longer be displayed when you log in to Online Banking.
We’re making it easier for you to access your account online, while continuing to protect you and your money with our powerful, multilayered security system.
Be aware of a new phone Scam!!!!!!!!
Scam details: You will receive a phone call from someone claiming to your Grandchild. They will say that they are in trouble with the law and need money to get out of jail. They may even know your grandchild's name. Do not give these callers any of your customer information.
Monitor your account!!!!
Nationally there has been in increase in debit and credit card fraud. Please monitor your checking and savings accounts and let us know if you notice any unauthorized activity.
NOTICE OF EXPIRATION OF THE TEMPORARY FULL FDIC INSURANCE COVERAGE FOR NONINTEREST-BEARING TRANSACTION ACCOUNTS

By operation of federal law, beginning January 1, 2013, funds deposited in a noninterest-bearing transaction account (including an Interest on Lawyer Trust Account) no longer will receive unlimited deposit insurance coverage by the Federal Deposit Insurance Corporation (FDIC). Beginning January 1, 2013, all of a depositor's accounts at an insured depository institution, including all noninterest-bearing transaction accounts, will be insured by the FDIC up to the standard maximum deposit insurance amount ($250,000), for each deposit insurance ownership category.

For more information about FDIC insurance coverage of noninterest-bearing transaction accounts, visit "http://www.fdic.gov/deposit/deposits/"

Debit Card Protection

Debit card fraud is on the increase. At Templeton Savings Bank, we are working hard to protect your debit card from fraud. We have teamed up with Shazam to offer Shazam Falcon Fraud protection. This system monitors debit card transactions as they occur and alerts SHAZAM fraud staff to those transactions with the greatest likelihood of fraud. You may receive a phone call in the future from a SHAZAM Fraud Specialist, or an employee of Templeton Savings Bank to verify a transaction. If they can not reach you, there may be a temporary block put on your card. Call SHAZAM 24/7 at 866-508-2693 if your card is subjected to a temporary block due to suspected fraud.

This program will be most effective if:

  • we have your current cell/home phone numbers on file to reach you if needed.
  • you have the SHAZAM number, 866-508-2693 with you to call in case your card is subjected to a temporary block.
  • you please let the bank know of travel plans that might include debit card use. (Debit card transactions made at locations out of the ordinary area are a red flag for possible fraud.) So if you are going away on business or vacation, give us a call so we can update your record.

Please contact John Horbach (712)669-3322 with any questions or concerns on this matter.

KIDS: Check out the US Mint's Website. Click the link below to start the fun:
"http://www.usmint.gov/kids/"
Our Internet Banking Service Provider has received an increased number of reported phishing attempts targeting the Internet Banking solution. The phishing has had these tendencies:

• The login process is modified by adding a Web page stating that computer cannot be identified, and that the user is required to enter credit card information to continue.
• The page that requests the user data does appear to originate from our Internet Banking site with the correct URL and certificate information. However, this page is generated by malware installed on the local computer and not from the Internet Banking site. Fiserv’s Internet Banking servers remain secure.
• This malware was most likely installed from an opened e-mail attachment or a compromised website viewed on the infected computers of your bank customers using Internet Banking.

Internet Banking WILL NOT ask customers to enter personal or account info during the login process. DO NOT enter sensitive information if prompted. All computers accessing Internet Banking should have anti-virus and anti-malware installed.

Possible Phishing or Spear Phishing Attacks

Once scammers know their victims’ names and email addresses, along with the companies the customers do business with, the scammers can craft very targeted email attacks that attempt to trick victims into revealing more sensitive information (for example: passwords or account numbers). Phishing and spear phishing are defined below.

 

Phishing – This fraud scheme refers to emails sent to your cardholders by fraudsters known as “phishers.” This fraud is designed to trick cardholders into providing personal banking information. Phishers attempt fraudulent transactions when they have the basic personal identity or account information that a cardholder provided to them through a fraudulent email.

Spear phishing – This is an email-spoofing fraud attempt that targets a specific person by name, seeking to gain confidential data. As with the email messages used in regular phishing, spear phishing messages appear to come from a trusted source.

Beware of Smishing
In computing, Smishing is a form of criminal activity using social engineering techniques similar to phishing. The name is derived from "SMs phISHING". SMS (Short Message Service) is the technology used for text messages on cell phones. Similar to phishing, smishing uses cell phone text messages to deliver the "bait" to get you to divulge your personal information. The "hook" (the method used to actually "capture" your information) in the text message may be a web site URL, however it has become more common to see a phone number that connects to automated voice response system. Templeton Savings Bank will not send you any text messages on your cell phone.