Truity’s Mobile Banking service incorporates the convenience you want with industry-leading safety and security features that provide peace of mind. We’ve also assembled some common-sense steps you can take to help protect yourself and the important information on your mobile device.
What We Do
Mobile Apps
Truity offers a full suite of mobile banking services included in our Mobile App for Apple™ and Android™. We also provide a wireless application protocol (WAP) mobile banking for all other devices.
Security Features
Mobile App: Truity's mobile banking app offers superior security via two-factor authentication, SSL encryption, device identification and timeout, user entitlements, and Passcode, Face ID, or Touch ID. Our advanced security features give members the peace of mind that their data and transactions are safeguarded.
Browser-Based Mobile Banking: Our mobile banking service through a browser utilizes best security practices, such as HTTPS, 128-bit SSL encryption and site time-out when the session expires.
What We Do
Mobile Apps
Truity offers a full suite of mobile banking services included in our Mobile App for Apple™ and Android™. We also provide a wireless application protocol (WAP) mobile banking for all other devices.
Security Features
Mobile App: Truity's mobile banking app offers superior security via two-factor authentication, SSL encryption, device identification and timeout, user entitlements, and Passcode, Face ID, or Touch ID. Our advanced security features give members the peace of mind that their data and transactions are safeguarded.
Browser-Based Mobile Banking: Our mobile banking service through a browser utilizes best security practices, such as HTTPS, 128-bit SSL encryption and site time-out when the session expires.
What We Do
Mobile Apps
Truity offers a full suite of mobile banking services included in our Mobile App for Apple™ and Android™. We also provide a wireless application protocol (WAP) mobile banking for all other devices.
Security Features
Mobile App: Truity's mobile banking app offers superior security via two-factor authentication, SSL encryption, device identification and timeout, user entitlements, and Passcode, Face ID, or Touch ID. Our advanced security features give members the peace of mind that their data and transactions are safeguarded.
Browser-Based Mobile Banking: Our mobile banking service through a browser utilizes best security practices, such as HTTPS, 128-bit SSL encryption and site time-out when the session expires.
What We Do
Truity is continually monitoring for threats and suspicious activity
What We Do
Mobile Apps
Truity offers a full suite of mobile banking services included in our Mobile App for Apple™ and Android™. We also provide a wireless application protocol (WAP) mobile banking for all other devices.
Security Features
Mobile App: Truity's mobile banking app offers superior security via two-factor authentication, SSL encryption, device identification and timeout, user entitlements, and Passcode, Face ID, or Touch ID. Our advanced security features give members the peace of mind that their data and transactions are safeguarded.
Browser-Based Mobile Banking: Our mobile banking service through a browser utilizes best security practices, such as HTTPS, 128-bit SSL encryption and site time-out when the session expires.
What You Can Do
Good security starts with you. It includes ensuring that no one has access to your phone without your permission. It means never storing important information on your cell phone such as login information or passwords.
Password protect all mobile phones
Devices with a password are more difficult to access.
Use caution when on a public network
Refrain from logging into the Truity mobile app or apps with your confidential information on a public Wi-Fi network; the network is not secure, and therefore more vulnerable to cyber attacks. Use your phone's data network when in doubt.
Only download applications from trusted sources
Apps should be from an approved source and endorsed by your provider; refrain from enabling the “install from unknown sources” feature in mobile banking platforms using the Android operating system.
Avoid storing usernames and passwords on the mobile phone
Storing passwords may seem like a good idea, but should someone infiltrate your mobile device, they could potentially have access to ALL of your confidential information.
Notify Truity and your wireless carrier immediately if your mobile phone is lost or stolen
Truity can’t deactivate your device, but we can deactivate your Truity Mobile account so that it can’t be accessed from any device.
Update your operating system
System updates may be painful, but often they include security updates that could offer more protection for your device.
Download and install antivirus software
No mobile device is 100% protected from viruses, spyware or malware. Take time to research what type, if any, of antivirus software would be best for your device.
Check account activity frequently
By logging into Digital Banking daily and monitoring your account activity you could prevent or catch fraud on your account early. If you do notice some unusual activity, contact us immediately.
Adopt safe practices modeled after those of your personal computer
You want to utilize the same practices as when using your computer, such as not opening attachments or clicking on links contained in emails received from an unfamiliar source. Additionally, with a mobile device, you should be wary and unresponsive to text messages from unknown sources that ask you to validate or confirm personal information.
Delete all personal information when trading in or getting rid of your phone
Some providers will do this for you, but better safe than sorry; take a few minutes to transfer all your contacts, photos and delete anything confidential before getting your new device.
What You Can Do
Good security starts with you. It includes ensuring that no one has access to your phone without your permission. It means never storing important information on your cell phone such as login information or passwords.
Password protect all mobile phones
Devices with a password are more difficult to access.
Use caution when on a public network
Refrain from logging into the Truity mobile app or apps with your confidential information on a public Wi-Fi network; the network is not secure, and therefore more vulnerable to cyber attacks. Use your phone's data network when in doubt.
Only download applications from trusted sources
Apps should be from an approved source and endorsed by your provider; refrain from enabling the “install from unknown sources” feature in mobile banking platforms using the Android operating system.
Avoid storing usernames and passwords on the mobile phone
Storing passwords may seem like a good idea, but should someone infiltrate your mobile device, they could potentially have access to ALL of your confidential information.
Notify Truity and your wireless carrier immediately if your mobile phone is lost or stolen
Truity can’t deactivate your device, but we can deactivate your Truity Mobile account so that it can’t be accessed from any device.
Update your operating system
System updates may be painful, but often they include security updates that could offer more protection for your device.
Download and install antivirus software
No mobile device is 100% protected from viruses, spyware or malware. Take time to research what type, if any, of antivirus software would be best for your device.
Check account activity frequently
By logging into Digital Banking daily and monitoring your account activity you could prevent or catch fraud on your account early. If you do notice some unusual activity, contact us immediately.
Adopt safe practices modeled after those of your personal computer
You want to utilize the same practices as when using your computer, such as not opening attachments or clicking on links contained in emails received from an unfamiliar source. Additionally, with a mobile device, you should be wary and unresponsive to text messages from unknown sources that ask you to validate or confirm personal information.
Delete all personal information when trading in or getting rid of your phone
Some providers will do this for you, but better safe than sorry; take a few minutes to transfer all your contacts, photos and delete anything confidential before getting your new device.
What You Can Do
Good security starts with you. It includes ensuring that no one has access to your phone without your permission. It means never storing important information on your cell phone such as login information or passwords.
Password protect all mobile phones
Devices with a password are more difficult to access.
Use caution when on a public network
Refrain from logging into the Truity mobile app or apps with your confidential information on a public Wi-Fi network; the network is not secure, and therefore more vulnerable to cyber attacks. Use your phone's data network when in doubt.
Only download applications from trusted sources
Apps should be from an approved source and endorsed by your provider; refrain from enabling the “install from unknown sources” feature in mobile banking platforms using the Android operating system.
Avoid storing usernames and passwords on the mobile phone
Storing passwords may seem like a good idea, but should someone infiltrate your mobile device, they could potentially have access to ALL of your confidential information.
Notify Truity and your wireless carrier immediately if your mobile phone is lost or stolen
Truity can’t deactivate your device, but we can deactivate your Truity Mobile account so that it can’t be accessed from any device.
Update your operating system
System updates may be painful, but often they include security updates that could offer more protection for your device.
Download and install antivirus software
No mobile device is 100% protected from viruses, spyware or malware. Take time to research what type, if any, of antivirus software would be best for your device.
Check account activity frequently
By logging into Digital Banking daily and monitoring your account activity you could prevent or catch fraud on your account early. If you do notice some unusual activity, contact us immediately.
Adopt safe practices modeled after those of your personal computer
You want to utilize the same practices as when using your computer, such as not opening attachments or clicking on links contained in emails received from an unfamiliar source. Additionally, with a mobile device, you should be wary and unresponsive to text messages from unknown sources that ask you to validate or confirm personal information.
Delete all personal information when trading in or getting rid of your phone
Some providers will do this for you, but better safe than sorry; take a few minutes to transfer all your contacts, photos and delete anything confidential before getting your new device.
What You Can Do
There are several steps you can take to prevent fraud. Follow these tips to minimize your risk.
What You Can Do
Good security starts with you. It includes ensuring that no one has access to your phone without your permission. It means never storing important information on your cell phone such as login information or passwords.
Password protect all mobile phones
Devices with a password are more difficult to access.
Use caution when on a public network
Refrain from logging into the Truity mobile app or apps with your confidential information on a public Wi-Fi network; the network is not secure, and therefore more vulnerable to cyber attacks. Use your phone's data network when in doubt.
Only download applications from trusted sources
Apps should be from an approved source and endorsed by your provider; refrain from enabling the “install from unknown sources” feature in mobile banking platforms using the Android operating system.
Avoid storing usernames and passwords on the mobile phone
Storing passwords may seem like a good idea, but should someone infiltrate your mobile device, they could potentially have access to ALL of your confidential information.
Notify Truity and your wireless carrier immediately if your mobile phone is lost or stolen
Truity can’t deactivate your device, but we can deactivate your Truity Mobile account so that it can’t be accessed from any device.
Update your operating system
System updates may be painful, but often they include security updates that could offer more protection for your device.
Download and install antivirus software
No mobile device is 100% protected from viruses, spyware or malware. Take time to research what type, if any, of antivirus software would be best for your device.
Check account activity frequently
By logging into Digital Banking daily and monitoring your account activity you could prevent or catch fraud on your account early. If you do notice some unusual activity, contact us immediately.
Adopt safe practices modeled after those of your personal computer
You want to utilize the same practices as when using your computer, such as not opening attachments or clicking on links contained in emails received from an unfamiliar source. Additionally, with a mobile device, you should be wary and unresponsive to text messages from unknown sources that ask you to validate or confirm personal information.
Delete all personal information when trading in or getting rid of your phone
Some providers will do this for you, but better safe than sorry; take a few minutes to transfer all your contacts, photos and delete anything confidential before getting your new device.
Types of Fraud
Smishing
Smishing uses cell phone text messages to lure consumers in. Often the text will contain a URL or phone number. The phone number often has an automated voice response system. You could receive an email or text message from someone posing as your credit card company, asking you to confirm your account numbers or passwords.
Smishers may use the first few digits of your debit or credit card as bait, since credit and debit cards all follow the same standard method for card numbers. Their text message might include a link to a bogus bank website that looks and acts like your real bank's website. Alternately, it might prompt you to download a fake bank app or call a number to clear up a supposed issue with your account. Once spammers capture your personal information, they can sell it on the black market or use it to commit fraud.
Do not respond to smishing messages.
Vishing
Unfortunately, phishing emails are not the only way people can try to fool you into providing personal information in an effort to steal your identity or commit fraud. Criminals also use the phone to solicit your personal information. This telephone version of phishing is sometimes called vishing. Vishing relies on “social engineering” techniques to trick you into providing information that others can use to access and use your important accounts. People can also use this information to pretend to be you and open new lines of credit.
To avoid being fooled by a vishing attempt:
- If you receive an email or phone call asking you to call and you suspect it might be a fraudulent request, look up the organization’s customer service number and call that number rather than the number provided in the solicitation email or phone call.
- Forward the solicitation email to the customer service or security email address of the organization, asking whether the email is legitimate.
Types of Fraud
Smishing
Smishing uses cell phone text messages to lure consumers in. Often the text will contain a URL or phone number. The phone number often has an automated voice response system. You could receive an email or text message from someone posing as your credit card company, asking you to confirm your account numbers or passwords.
Smishers may use the first few digits of your debit or credit card as bait, since credit and debit cards all follow the same standard method for card numbers. Their text message might include a link to a bogus bank website that looks and acts like your real bank's website. Alternately, it might prompt you to download a fake bank app or call a number to clear up a supposed issue with your account. Once spammers capture your personal information, they can sell it on the black market or use it to commit fraud.
Do not respond to smishing messages.
Vishing
Unfortunately, phishing emails are not the only way people can try to fool you into providing personal information in an effort to steal your identity or commit fraud. Criminals also use the phone to solicit your personal information. This telephone version of phishing is sometimes called vishing. Vishing relies on “social engineering” techniques to trick you into providing information that others can use to access and use your important accounts. People can also use this information to pretend to be you and open new lines of credit.
To avoid being fooled by a vishing attempt:
- If you receive an email or phone call asking you to call and you suspect it might be a fraudulent request, look up the organization’s customer service number and call that number rather than the number provided in the solicitation email or phone call.
- Forward the solicitation email to the customer service or security email address of the organization, asking whether the email is legitimate.
Types of Fraud
Smishing
Smishing uses cell phone text messages to lure consumers in. Often the text will contain a URL or phone number. The phone number often has an automated voice response system. You could receive an email or text message from someone posing as your credit card company, asking you to confirm your account numbers or passwords.
Smishers may use the first few digits of your debit or credit card as bait, since credit and debit cards all follow the same standard method for card numbers. Their text message might include a link to a bogus bank website that looks and acts like your real bank's website. Alternately, it might prompt you to download a fake bank app or call a number to clear up a supposed issue with your account. Once spammers capture your personal information, they can sell it on the black market or use it to commit fraud.
Do not respond to smishing messages.
Vishing
Unfortunately, phishing emails are not the only way people can try to fool you into providing personal information in an effort to steal your identity or commit fraud. Criminals also use the phone to solicit your personal information. This telephone version of phishing is sometimes called vishing. Vishing relies on “social engineering” techniques to trick you into providing information that others can use to access and use your important accounts. People can also use this information to pretend to be you and open new lines of credit.
To avoid being fooled by a vishing attempt:
- If you receive an email or phone call asking you to call and you suspect it might be a fraudulent request, look up the organization’s customer service number and call that number rather than the number provided in the solicitation email or phone call.
- Forward the solicitation email to the customer service or security email address of the organization, asking whether the email is legitimate.
Types of Fraud
Reduce The Risk Of Being A Victim Of Mobile Fraud
Types of Fraud
Smishing
Smishing uses cell phone text messages to lure consumers in. Often the text will contain a URL or phone number. The phone number often has an automated voice response system. You could receive an email or text message from someone posing as your credit card company, asking you to confirm your account numbers or passwords.
Smishers may use the first few digits of your debit or credit card as bait, since credit and debit cards all follow the same standard method for card numbers. Their text message might include a link to a bogus bank website that looks and acts like your real bank's website. Alternately, it might prompt you to download a fake bank app or call a number to clear up a supposed issue with your account. Once spammers capture your personal information, they can sell it on the black market or use it to commit fraud.
Do not respond to smishing messages.
Vishing
Unfortunately, phishing emails are not the only way people can try to fool you into providing personal information in an effort to steal your identity or commit fraud. Criminals also use the phone to solicit your personal information. This telephone version of phishing is sometimes called vishing. Vishing relies on “social engineering” techniques to trick you into providing information that others can use to access and use your important accounts. People can also use this information to pretend to be you and open new lines of credit.
To avoid being fooled by a vishing attempt:
- If you receive an email or phone call asking you to call and you suspect it might be a fraudulent request, look up the organization’s customer service number and call that number rather than the number provided in the solicitation email or phone call.
- Forward the solicitation email to the customer service or security email address of the organization, asking whether the email is legitimate.