Internet Banking Login

User Id:

 

 

FDIC Equal Housing Lender

Email Us

Privacy Policy

Consumers Warned of New Surge in IRS E-mail Schemes during 2016 Tax Season

 

Security Awareness Tip Of The Day Provided By SANS

When you forward an email to others or copy new people to an email thread, review all the content in the entire email and make sure the information contained in it is suitable for everyone. It is very easy to forward emails to others, not realizing there is highly sensitive information in the bottom of the email that people should not have access to.


When you delete a file, that file is actually still on your computer. The only way you can truly and securely remove a file is by wiping it or using some type of secure deletion.


Review your bank, credit card and financial statements regularly to identify unauthorized activity. This is one of the most effective ways to quickly detect if your bank account, credit card or identity has been compromised.


Privacy settings on social networks have limited value. They are confusing to configure and change often. Ultimately, if you do not want your parents or boss reading it, do not post it.


Make sure each of your accounts has a separate, unique password. Can't remember all of your passwords/passphrases? Consider using a password manager to securely store all of them for you.

A password is only as secure as the computer or network it is used on. As such, never log in to a sensitive account from a public computer, such as computers in a cyber cafe, hotel lobby or conference hall. Bad guys target public computers such as these and infect them on purpose. The moment you type your password on an infected computer, these cyber criminals can harvest your passwords. If you have no choice but to use a public computer, change your password at the next available opportunity you have access to a trusted computer.

Eventually, we all have an accident or get hacked. And when we do, backups are often the only way to recover. Backups are cheap and easy; make sure you are backing up all of your personal information (such as family photos) on a regular basis.

Eventually, we all get hacked. The bad guys are very persistent and we can all make a mistake. If a phone call from the "Help Desk" doesn't sound quite right, if an email seems suspicious or if a program you installed starts acting funny, ask for help! Your security team is there to help you. The sooner you report an incident, the sooner we can help resolve the problem.

Be careful: the more information you post online about yourself, the easier it is for a cyber attacker to target you and create custom attacks against you or your organization.

Did you know that according to the Verizon DBIR team, you are 16 times more likely to lose a laptop or mobile devices than have it stolen? When you are traveling, always double-check to make sure you have your mobile device with you, such as when you finish going through airport security, leave your taxi or check out of your hotel.

Technology alone cannot protect you. Bad guys are constantly developing new ways to get past firewalls, anti-virus and filters. You are the best defense against any attacker.


One of the most effective ways you can protect your computer at home is to make sure both the operating system and your applications are patched and updated. Enable automatic updating whenever possible.


Turn off Bluetooth if you are not using it on your computer or device. Not only does this make it more secure, but it also saves battery life.
Never send an email when you are angry; you will most likely regret it later. Instead, when you are emotional and want to reply to someone, open up an email and write everything you feel, but do not send it. (Be sure there is no name in the TO field so that you do not accidently send it.) After you have vented, save the email and come back an hour later. You only want to reply to any type of emotional situation after you have had time to cool down.


Companies you do business with should never ask for your account information, credit card numbers or password in an email. If you have any questions about an email you receive that supposedly came from your financial institution or service provider, find their number on their website and call them.

Eventually, we all have an accident or get hacked. And when we do, backups are often the only way to recover. Backups are cheap and easy; make sure you are backing up all of your personal information (such as family photos) on a regular basis.

Be careful with email auto-complete. This is an email feature that automatically completes a name for you when you begin typing it in the TO field. However, your email client can easily complete the wrong name for you. If you are emailing anything sensitive, always be sure to check the TO field a second time before hitting the send button.


Passphrases are the strongest type of passwords and the easiest to remember. Simply use an entire sentence for your password, such as "What time is coffee?" By using spaces and punctuation, you create a long password that is hard to guess but easy to remember.


Be careful: the more information you post online about yourself, the easier it is for a cyber attacker to target you and create custom attacks against you or your organization.

The most effective steps you can take to secure your wireless network at home is to change the default admin password, enable WPA2 encryption and use a strong password for your wireless network.

When you delete a file, that file is actually still on your computer. The only way you can truly and securely remove a file is by wiping it or using some type of secure deletion.

When you forward an email to others or copy new people to an email thread, review all the content in the entire email and make sure the information contained in it is suitable for everyone. It is very easy to forward emails to others, not realizing there is highly sensitive information in the bottom of the email that people should not have access to.

When traveling, it is very easy to forget where you are when discussing business with colleagues. That airport, taxi, restaurant or hotel lobby may have individuals nearby eavesdropping on your conversation. When discussing confidential information, agree to hold off on the conversation until you can be assured of privacy. Also, be careful not to share sensitive information with strangers you meet.

If you have kids with mobile devices, create a central home charging station in your bedroom. Before the kids go to bed at night, have them put their mobile devices there so they are not tempted to play with them when they should be sleeping.

Bad guys are targeting your social media accounts. One of the most effective ways you can protect them is with a unique, strong password called a passphrase. Enabling two-step verification (if your social media site offers it) is even better.

Never share your passwords with others, including your supervisor or coworkers. Your password is a secret; it only works if only you know it. If anyone else knows your password, you may be responsible for their actions. 

One of the most effective steps you can take to protect your cloud account is to make sure you are using two-step verification. In addition, always be sure you know exactly whom you are sharing files with. It is very easy to accidently share your files with the entire Internet when you think you are only sharing them with specific individuals. 

Do you plan on giving away or selling one of your older mobile devices? Make sure you wipe or reset your device before disposing of it. If you don't, the next person who owns it will have access to all of your accounts and personal information.

A common method cyber criminals use to hack into people's computers is to send them emails with infected attachments. People are tricked into opening these attachments because they appear to come from someone or something they know and trust. Only open email attachments that you were expecting. Not sure about an email? Call the person to confirm they sent it.

Never give your password to someone over the phone. If someone calls you and asks for your password while saying they are from the Help Desk or Tech Support team, it is an attacker attempting to gain access to your account. 

Review your bank, credit card and financial statements regularly to identify unauthorized activity. This is one of the most effective ways to quickly detect if your bank account, credit card or identity has been compromised. 

When browsing online, encrypting your online activities is one of the best ways to protect yourself. Make sure your online connection is encrypted by making sure HTTPS is in the website address and that there is a green lock next to it. 

 

New MasterCard Liability
CFPB Helps Assisted Living and Nursing Facilities Protect Seniors from Financial Abuse

The Consumer Financial Protection Bureau (CFPB) released a guide to help assisted living and nursing facility staff better protect the people in their care by preventing and addressing financial abuse and scams. The guide helps staff recognize, record, and report financial mistreatment by family members or other trusted people handling the finances of an incapacitated adult. The guide also addresses prevention of a wide variety of financial exploitation and scams.  "http://www.consumerfinance.gov/newsroom/cfpb-helps-assisted-living-and-nursing-facilities-protect-seniors-from-financial-abuse/"

Be aware of a new Cashnet Payday loan email scam!

"http://dfi.wa.gov/consumers/alerts/cashnet-payday.htm"

These scammer will email you a letter stating you owe a payday loan plus fees and that you will be prosecuted if you do not pay it. If you have not taken out any payday loans please do not respond to the emails and report it to Templeton Savings Bank. Please refer to the links above for more information on the scam.

Important News for our Online Banking users!
Beginning May 19, your Image & Pass Phrase will no longer be displayed when you log in to Online Banking.
We’re making it easier for you to access your account online, while continuing to protect you and your money with our powerful, multilayered security system.
Be aware of a new phone Scam!!!!!!!!
Scam details: You will receive a phone call from someone claiming to your Grandchild. They will say that they are in trouble with the law and need money to get out of jail. They may even know your grandchild's name. Do not give these callers any of your customer information.
Monitor your account!!!!
Nationally there has been in increase in debit and credit card fraud. Please monitor your checking and savings accounts and let us know if you notice any unauthorized activity.
NOTICE OF EXPIRATION OF THE TEMPORARY FULL FDIC INSURANCE COVERAGE FOR NONINTEREST-BEARING TRANSACTION ACCOUNTS

By operation of federal law, beginning January 1, 2013, funds deposited in a noninterest-bearing transaction account (including an Interest on Lawyer Trust Account) no longer will receive unlimited deposit insurance coverage by the Federal Deposit Insurance Corporation (FDIC). Beginning January 1, 2013, all of a depositor's accounts at an insured depository institution, including all noninterest-bearing transaction accounts, will be insured by the FDIC up to the standard maximum deposit insurance amount ($250,000), for each deposit insurance ownership category.

For more information about FDIC insurance coverage of noninterest-bearing transaction accounts, visit "http://www.fdic.gov/deposit/deposits/"

Debit Card Protection

Debit card fraud is on the increase. At Templeton Savings Bank, we are working hard to protect your debit card from fraud. We have teamed up with Shazam to offer Shazam Falcon Fraud protection. This system monitors debit card transactions as they occur and alerts SHAZAM fraud staff to those transactions with the greatest likelihood of fraud. You may receive a phone call in the future from a SHAZAM Fraud Specialist, or an employee of Templeton Savings Bank to verify a transaction. If they can not reach you, there may be a temporary block put on your card. Call SHAZAM 24/7 at 866-508-2693 if your card is subjected to a temporary block due to suspected fraud.

This program will be most effective if:

  • we have your current cell/home phone numbers on file to reach you if needed.
  • you have the SHAZAM number, 866-508-2693 with you to call in case your card is subjected to a temporary block.
  • you please let the bank know of travel plans that might include debit card use. (Debit card transactions made at locations out of the ordinary area are a red flag for possible fraud.) So if you are going away on business or vacation, give us a call so we can update your record.

Please contact John Horbach (712)669-3322 with any questions or concerns on this matter.

KIDS: Check out the US Mint's Website. Click the link below to start the fun:
"http://www.usmint.gov/kids/"
Our Internet Banking Service Provider has received an increased number of reported phishing attempts targeting the Internet Banking solution. The phishing has had these tendencies:

• The login process is modified by adding a Web page stating that computer cannot be identified, and that the user is required to enter credit card information to continue.
• The page that requests the user data does appear to originate from our Internet Banking site with the correct URL and certificate information. However, this page is generated by malware installed on the local computer and not from the Internet Banking site. Fiserv’s Internet Banking servers remain secure.
• This malware was most likely installed from an opened e-mail attachment or a compromised website viewed on the infected computers of your bank customers using Internet Banking.

Internet Banking WILL NOT ask customers to enter personal or account info during the login process. DO NOT enter sensitive information if prompted. All computers accessing Internet Banking should have anti-virus and anti-malware installed.

Possible Phishing or Spear Phishing Attacks

Once scammers know their victims’ names and email addresses, along with the companies the customers do business with, the scammers can craft very targeted email attacks that attempt to trick victims into revealing more sensitive information (for example: passwords or account numbers). Phishing and spear phishing are defined below.

 

Phishing – This fraud scheme refers to emails sent to your cardholders by fraudsters known as “phishers.” This fraud is designed to trick cardholders into providing personal banking information. Phishers attempt fraudulent transactions when they have the basic personal identity or account information that a cardholder provided to them through a fraudulent email.

Spear phishing – This is an email-spoofing fraud attempt that targets a specific person by name, seeking to gain confidential data. As with the email messages used in regular phishing, spear phishing messages appear to come from a trusted source.

Beware of Smishing
In computing, Smishing is a form of criminal activity using social engineering techniques similar to phishing. The name is derived from "SMs phISHING". SMS (Short Message Service) is the technology used for text messages on cell phones. Similar to phishing, smishing uses cell phone text messages to deliver the "bait" to get you to divulge your personal information. The "hook" (the method used to actually "capture" your information) in the text message may be a web site URL, however it has become more common to see a phone number that connects to automated voice response system. Templeton Savings Bank will not send you any text messages on your cell phone.