Online Security

Security Center > Online Security

Cyber security attacks can take many forms and utilize all web-capable devices to access and compromise your personal data. Arm yourself against the threat and immediately report questionable activity.

Multi-Level Security Layers

The best way to protect your information is not with a single practice, but rather several complementary security practices. By having multiple services to check, monitor and protect your sensitive info in our banking systems we are able to help ensure a safe online environment for our members. Security questions being presented to members periodically to confirm identity is just one way. Here are some common practices we use to protect your information while on our websites:

  • Encrypted usernames and passwords
  • Security questions
  • Activity monitoring
  • Text and email log in alerts
  • Secure communication connections

Liability for Unauthorized Use/Unauthorized Transfers

If you permit other persons to use your Online Banking account and password you are responsible for any transactions they authorize or conduct on your accounts. Notify us IMMEDIATELY if you believe anyone has accessed your accounts through Online Banking without your authorization and you have incurred a loss for any transactions made on your account. If you tell us within two (2) business days after you learn of a loss, your loss is limited to no more than $50.00. If you DO NOT notify us within two (2) business days after you learn of a loss you could lose as much as $500.00. Please review your statements thoroughly. If you find transactions you did not make, notify us IMMEDIATELY. If you do not notify us within sixty (60) days after the statement was delivered to you, you may not be reimbursed for any loss you may incur if we can prove we could have stopped someone from taking money from your account if you had told us in time. If a good reason, such as a long trip or a hospital stay kept you from telling us, we may extend the time period. If you believe that someone has transferred, or may transfer, money from your account without your permission, contact the Credit Union.

Phishing

"Phishing" refers to criminal activity that attempts to fraudulently obtain sensitive information via the Internet. There are several ways a scam artist will try to obtain sensitive information such as your driver's license, social security number, credit card information, or bank account information. Sometimes a scam artist will first send you a benign email (think of this as the bait) to lure you into a conversation and then follow that up with a phishing email. At other times, the scam artist will just send one phishing email.

Here are some questions to ask if you think you have received a phishing attack:

  • Do you know the sender of the email? If yes, still be cautious before clicking a link. If no, do not click any links.
  • Are there any attachments in the email? If so, is the attachment an executable (a file with the extension .exe, .bat, .com, .vbs, .reg, .msi, .pif, .pl, .php)? If so, do not click on the attachment. Even if the file does not contain one of the above mentioned extensions, be cautious about opening it. Contact the sender to verify its contents.
  • Does the email request personal information? If so, do not reply.
  • Does the email contain grammatical errors? If so, be suspicious.
  • If you have a relationship with the company, are they addressing you by name?
  • Have you checked the link? Mouse over the link and check the URL. Does it look legitimate or does it look like it will take you to a different Web site?

Related FAQs

    No related FAQs are available.
Suspect Fraud?

M-F, 7:30am-6pm: 800.897.6991

Contact us if you notice any fraudulent activity in your account, or need to report lost or stolen information, please contact us.
What to do next:
  1. Change your passwords from an uninfected computer.
  2. Ensure all firewall, anti-virus and spyware detection software you have installed is current.
  3. Run a virus scan on your computer and remove any threats that are detected.

Contact Us

 
Follow us