Loading depends on your connection speed!

Security Tips

Keeping Our Customers Safe is Our First Priority!

There are many types of Cybercrimes, from online identity theft, financial fraud, stalking, bullying, hacking, email spoofing, to information piracy and forgery. Knowing how to prevent Cybercrime and what to do if you are a victim can make a huge difference in limiting its impact on you and your finances.

Prevention Tips

  • Protecting Your Devices
    Install security software on all devices and keep the software current. Most software will automatically send you updates. If it’s offered, be sure you turn on the automatic updates on your device. Also, use this software to scan any external devices you hook up or plug in to your own equipment.
  • Protecting Your Personal Information
    Create strong passwords by making them unique and long, combining numbers and symbols with capital and lowercase letters. If you write down your passwords, store them in a safe place away from your computer and devices. Don’t forget to check your device’s security level, it can often be changed to suit your individual needs. Also, regularly schedule back-ups to protect against permanent loss of your information and valuables.
  • Protecting Your Money
    If making financial transactions online, make sure the site is security enabled by watching for web addresses with https:// or “shttp://”. These sites make extra efforts to keep your personal and financial information safe. http:// is not secure.
  • Connect with Care
    Be wary of links, emails, posts, and tweets that look suspicious, even if you know the source. Delete it, and mark as junk email if appropriate. When using Wi-Fi hotspots, if necessary, adjust your security and limit yourself to transactions that don’t include sensitive, personal or bank account information.
  • Stay Educated
    Keep up with current Cybercrime activities, terms and ways to stay safe. Be cautious with communications asking for personal information or offers that sound too good to be true. They probably are.

Source: www.stopthinkconnect.org, 2013

Take Action

Reporting Cybercrime can be difficult, as it often goes beyond established legal jurisdictions and sometimes even international boundaries. However, acting quickly and contacting the appropriate organizations is very important in diminishing the effects of Cybercrimes, not just for you, but also for all cyber users.

Who To Contact

  • Local Law Enforcement
    Some local agencies and detectives now have departments that focus on Cybercrime. Even if they don’t and the crime is out of their jurisdiction, you will want to make a formal report. Keep a copy for your records because you may need it to show your employer, financial institution, and credit agencies. A written report will also help the local law enforcement agencies keep track of all crime within their jurisdiction.
  • IC3 – The Internet Crime Complaint Center
    The result of a partnership with the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center, IC3 will review your complaint and report it to the appropriate local, state and federal agencies. You can file a report at http://www.ic3.gov/default.aspx.
  • FTC – Federal Trade Commission
    According to the Stay Safe Online organization, the FTC does not resolve individual consumer complaints, but does operate the Consumer Sentinel, a secure online database that is used by law enforcement authorities worldwide to detect patterns of wrongdoing. File your complaint at https://www.ftccomplaintassistant.gov.
  • Your Local Victim Service Provider
    Many communities have victim advocates available to help victims with information, emotional support and advocacy as needed. Find local victims’ service providers here: http://ovc.ncjrs.gov/findvictimservices/search.asp.
  • Suspected Debit Card Fraud:
    For assistance with suspected fraud and risk mitigation on your VISA debit card, please contact Risk Management at 800-411-8498.  This number is available 24/7.  You may also contact your local First South branch during business hours.

Source: www.staysafeonline.org, 2013

Identity Theft

Identity Theft doesn’t just wreak havoc on your finances, credit and reputation; it can cost you a lot of time and money as well.

  • 11 million people are affected by Identity Theft each year1
  • 165 hours to repair your identity1
  • $54 billion in losses per year1

We can help protect you. First South Bank has partnered with Deluxe Provent and EZShield to bring you the best identity theft protection services available at a low monthly cost. For more information, click here.

Victims, Take Action

  • Change your passwords for all online accounts.
  • Close any unauthorized or compromised credit cards or charge accounts. Cancel them and get a new card with a new account number.
  • Evaluate and identify other personal information that might be at risk, such as social security card or driver’s license, and report it to the appropriate contact.
  • File a report with your local law enforcement agency.
  • Report to one of the three credit bureaus and request they place a fraud alert on your credit report. As soon as one of the bureaus issues a fraud alert, the other two will automatically be notified. (Equifax at 1-800-525-6285, Experian at 1-888-397-3742, or TransUnion at 1-800-680-7289)

For more information, including articles on how to repair your credit after identity theft, to sample letters and forms for victims, go to the Federal Trade Commission Consumer Information website at www.consumer.ftc.gov.

*Source: National Criminal Justice Reference Service, Bureau of Justice Statistics (BJS) report, “Identity Theft Reported by Households, 2005 – 2010.” https://www.ncjrs.gov/spotlight/identity_theft/facts.html

Know Your Terms

Part of staying protected means arming yourself with knowledge and information. The Stay Safe Online organization is one source for information, advice and definitions:

  • Botnet – a network of private computers, each of which is called a “bot”(short for “robot”), infected with malicious software (malware) and controlled as a group without the owners’ knowledge for nefarious and, often, criminal purposes; computers are typically infected when users open up an infected attachment or visit an infected website. Infected computers are also referred to as “zombies”.
  • Cloud computing a technology that uses the Internet and remote servers to maintain data and applications, allowing users to access applications without installation and access to their personal files from any computer with Internet access; centralizes storage, memory, processing, and bandwidth; examples include Yahoo email or Gmail with the software managed by the cloud service providers Yahoo and Google.
  • Denial of Service Attack/Distributed Denial of Service Attack (DDoS) type of online computer attack designed to deprive user or groups of their normally accessible online services; generally involves effort by hackers to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.
  • Encryption the conversion of digital information into a format unreadable to anyone except those possessing a “key” through which the encrypted information is converted back into its original form (decryption), making it readable again.
  • Firewall software or hardware that, after checking information coming into a computer from the Internet or an external network, either blocks the transmission or allows it to pass through, depending on the pre‐set firewall settings, preventing access by hackers and malicious software; often offered through computer operating systems.
  • Geotagging the process of adding geographical location, or label, to photographs, videos, Websites, SMS messages, QR Codes, or RSS feeds; a geotag usually consists of latitude and longitude coordinates, altitude, distance, place names, and other details about the origin of the media being tagged helping users find a variety of online, location‐specific information.
  • HTTPS – Hypertext Transfer Protocol Secure, provides secure communication over a network, such as the Internet; basically layers additional security measures over HTTP; used by financial and online commerce websites to ensure the security of private information.
  • Keylogger also called keylogging and keystroke logging, is the action of tracking (or logging) the keys struck on a computer keyboard; usually runs hidden in the background and automatically records all keystrokes so that users are unaware of its presence and that their actions are being monitored.
  • Malware short for malicious software, software that disrupts or damages a computer’s operation, gathers sensitive or private information, or gains access to private computer systems; may include botnets, viruses, worms, Trojans, keyloggers, spyware, adware, and rootkits.
    • Virus - type of malware that has a reproductive capacity to transfer itself from one computer to another spreading infections between online devices.
    • Worm - type of malware that replicates itself over and over within a computer.
    • Trojan - type of malware that gives an unauthorized user access to a computer.
    • Spyware - type of malware that quietly sends information about a user’s browsing and computing habits back to a server that gathers and saves data.
    • Adware - type of malware that allows popup ads on a computer system, ultimately taking over a user’s Internet browsing.
    • Rootkit - a type of malware that opens a permanent “back door” into a computer system; once installed, a rootkit will allow more and more viruses to infect a computer as various hackers find the vulnerable computer exposed and attack.
    • Phishing – sending emails that attempt to fraudulently acquire personal information, such as usernames, passwords, social security numbers, and credit card numbers, by masquerading as a trustworthy entity, such as a popular social website, financial site, or online payment processor; often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.
    • SMiShing an alternative form of phishing that occurs via text or SMS message.
    • Spam the use of electronic messaging systems to send unsolicited bulk messages (usually advertising or other irrelevant posts) to large lists of email addresses indiscriminately.
    • Spyware a type of malware (malicious software) installed on computers that collects information about users without their knowledge; can collect Internet surfing habits, user logins and passwords, bank or credit account information, and other data entered into a computer; often difficult to remove, it can also change a computer’s configuration resulting in slow Internet connection speeds, a surge in pop‐up advertisements, and un‐authorized changes in browser settings or functionality of other software.
    • WiFi a technology that allows an electronic device (personal computer, video game console, smartphone, tablet, digital audio player) to exchange data wirelessly (using radio waves) over a computer network.
    • WiFi Hotspot a wireless access point to the Internet or other computer network over a wireless local area network through the use of a router connected to a link to an Internet service provider; frequently found in coffee shops and other public establishments. Many smartphones provide built‐in ability to establish a Wi‐Fi hotspot as well.

Source: www.staysafeonline.org

Financial Security

Below are some helpful hints to remember when thinking about financial security.

  • Keep your debit card in a safe place. Do not write your Personal Identification Number (PIN) on your card. Safeguard your debit card as you would cash or checks.
  • Do not provide your debit card number over the phone unless you initiated the call.
  • Do not respond to an email or text request to provide your debit card number and/or PIN. If we should contact you, we will not request your debit card number.

How to Report Identity Theft

If you become the victem of identity theft, there are several resources you can utilize to report the theft, including the three credit reporting bureaus and the Federal Trade Commission.

Begin by clicking on any of the links below:

Equifax: www.equifax.com

Experian: www.experian.com

Trans Union: www.transunion.com

Federal Trade Commission: idtheft.gov

Learn More to Protect Yourself

One of the best ways to protect your personal information is by educating yourself. Check out these pages from the FDIC & Federal Trade Commission on Consumer Protection. www.fdic.gov/consumers/index and www.ftc.gov/bcp

How to Prevent Identity Theft & Fraud

Identity Theft and Identity Fraud are two seperate but equally serious crimes.

Identity theft is when someone steals your personal information, such as a Social Security number, in an attempt to obtain money or credit in your name without your knowledge or consent.

Identity Fraud is when someone makes a single attempt to steal money from your personal account without your knowledge or consent.

You can find useful tips by reviewing these pages from the FDIC & Federal Trade Commission. www.fdic.gov/consumers/assistance/protection/idtheft and www.consumer.ftc.gov

How to be Proactive Against Identity Theft

As a way to be proactive in your financial life, be sure to review your credit report from all three credit bureaus annually. You may review and download your credit report at no charge at www.annualcreditreport.com.



Mortgage Rates

Looking to purchase a home? Click here to see our mortgage rates.

Financial Resources

From calculators to savings and planning for retirement, our Financial Resources has the tools and tips you need.


Proudly supporting our communities and the causes that touch them since 1902.