Create a “strong” password with at least 8 characters that includes a combination of mixed case letters, numbers, and special characters.
Change your password frequently.
Never share username and password information with third-party providers.
Avoid using an automatic login feature that saves usernames and passwords.
Do not use public or other unsecured computers for logging into online banking.
Users should check the last login date/time every time they log in.
If the system does not recognize your computer or location, you will be asked to provide additional information to log into e-banking. This may include Out-of-Band Authentication via phone or SMS.
Review account balances and detail transactions regularly (preferably daily) to confirm payment and other transaction data and immediately report any suspicious transactions to your financial institution.
View transfer history available by viewing account activity information.
Whenever possible, use bill pay instead of checks to limit account number exposure and to obtain better electronic record keeping.
Take advantage of and regularly view system alerts; examples include:
Password change alerts
Do not use account numbers, your social security number, or other account or personal information when creating account nicknames or other titles.
Use the historical reporting features of your online banking application on a regular basis to confirm payment and other transaction data.
Never leave a computer unattended while logged into your online banking account.
Never conduct banking transactions while multiple browsers are open on your computer.
Do not open email from unknown sources. Be suspicious of emails claiming to be from a financial institution, government department, or other agency requesting account information, account verification, or banking access credentials such as usernames, passwords, PIN codes, and similar information. Opening file attachments or clicking on web links in suspicious emails could expose your system to malicious code that could hijack your computer.
Never respond to a suspicious email or click on any hyperlink embedded in a suspicious email. Call the purported source if you are unsure who sent an email.
If an email claiming to be from your financial organization seems suspicious, call your financial institution directly and verify the email’s validity.
Install anti-virus and spyware detection software on all computer systems. Free software may not provide protection against the latest threats compared with an industry standard product.
Update all of your computers regularly with the latest versions and patches of both anti-virus and anti-spyware software.
Ensure computers are patched regularly, particularly operating systems, browsers, and key applications.
Install a dedicated, actively managed firewall, especially if using a broadband or dedicated connection to the Internet, such as DSL or cable. A firewall limits the potential for unauthorized access to your network and computers.
Check your settings and select, at least, a medium level of security for your browser.
Wireless networks can provide an unintended open door to your network. Unless a valid business reason exists for wireless network use, it is recommended that all wireless networks be disabled. If a wireless network is to be used for legitimate business purposes, it is recommended that wireless networks be secured as follows:
Change the wireless network hardware (router /access point) administrative password from the factory default to a complex password. Save the password in a secure location as it will be needed to make future changes to the device.
Disable remote administration of the wireless network hardware (router / access point).
If possible, disable broadcasting the network SSID.
If your device offers WPA encryption, secure your wireless network by enabling WPA encryption of the wireless network. If your device does not support WPA encryption, enable WEP encryption.