If you need to report fraud after the bank is closed, call the following numbers:

Clinton National Bank Credit Card 800-423-7503
Clinton National Bank Debit Card 800-236-2442

 

Password security

A strong password is your first line of defense against intruders for your information. With all the information people store on the computer, a good password can be the difference between being safe, sound, and secure and having information stolen. Here are a few tips for a strong password.

  1. 1.     Length- a long password is the best password. For example the password 4gti will take hackers about 28 minutes to guess. But the password 4gtiftw@ would take 1.66 centuries! Times figured at 1000 guesses per second)
  2. 2.     Never use the same password or slight variants of passwords for everything. Such as don’t use 4gtiftw for one thing and 5gtiftw for another.
  3. 3.     Be sure to include a capital letter, a number and a symbol (!@#) in your password.
  4. 4.     Don’t forget to change your passwords.
  5. 5.     If you must keep your passwords written on paper make sure it is in a locked place or with you.
  6. 6.     If you want to see how secure your password really is you can use online tools like www.howsecureismypassword.net there you can type in what you use and it will tell you how long before someone could hack your password.

 

 How can you tell if the email is a hoax or urban legend?
Some messages are more suspicious than others, but be especially cautious if the message has any of the characteristics listed below. These characteristics are just guidelines—not every hoax or urban legend has these attributes, and some legitimate messages may have some of these characteristics:

  • it suggests tragic consequences for not performing some action
  • it promises money or gift certificates for performing some action
  • it offers instructions or attachments claiming to protect you from a virus that is undetected by anti-virus software
  • it claims it's not a hoax
  • there are multiple spelling or grammatical errors, or the logic is contradictory
  • there is a statement urging you to forward the message
  • it has already been forwarded multiple times (evident from the trail of email headers in the body of the message)

What is fake antivirus?

Fake antivirus is malicious software (malware) designed to steal information from unsuspecting users by mimicking legitimate security software. The malware makes numerous system modifications making it extremely difficult to terminate unauthorized activities and remove the program. It also causes realistic, interactive security warnings to be displayed to the computer user.

How can my computer become infected with fake antivirus?

Criminals distribute this type of malware using search engines, emails, social networking sites, internet advertisements and other malware. They leverage advanced social engineering methodologies and popular technologies to maximize number of infected computers.

How will I know if I am infected?

The presence of pop-ups displaying unusual security warnings and asking for credit card or personal information is the most obvious method of identifying a fake antivirus infection.

Below are some tips for protecting your personal data.

  • Configure your device with security in mind. The “out-of-the-box” configurations of many devices and system components are default settings often geared more toward ease-of-use and extra features rather than securing your device to protect your information. Enable security settings, paying particular attention to those that control information sharing.
  • Turn on your firewall. Firewalls provide an essential function of protecting your computer or device from potentially malicious actors. Without a firewall, you might be exposing your personal information to any computer on the Internet.
  • Enable encryption. Encryption makes it hard for attackers who have gained access to your device to obtain access to your information. It’s a powerful tool that you should consider implementing.
  • Lock the device. Locking your device with a strong PIN/password makes unauthorized access to your information more difficult. Additionally, make sure that your device automatically locks after five minutes of inactivity. This way, if you misplace your device, you minimize the opportunity for someone to access your personal information.
  • Regularly apply updates. Manufacturers and application developers update their code to fix weaknesses and push out the updates and patches. Enable settings to automatically apply these patches to ensure that you’re fixing the identified weaknesses in the applications, especially your operating system, Web browser and associated third-party apps.
  • Install anti-virus software. Install anti-virus software if it’s available for your device to protect from known viruses. Additionally, enable automatic updating of the anti-virus software to incorporate the most recently identified threats.
  • Be careful downloading apps. When downloading a new app to your device, you’re potentially providing that app with a lot of information about you, some of which you may not want to share. Be proactive and make sure that you read the privacy statement, review permissions, check the app reviews and look online to see if any security company has identified the app as malicious. A good way to prevent accidental downloading of malware is to use a trusted store instead of third-party stores. The Google Play™ Store and Apple’s App Store proactively remove known malicious apps to protect users.
Disable unwanted services/calling. Capabilities such as wireless Bluetooth® technology, network connections and near field communication (NFC) provide ease and convenience in using your smartphone. They can also provide an easy

 

Tech Support Scams
In a recent twist, scam artists are using the phone to try to break into your computer. They call, claiming to be computer techs associated with well-known companies like Microsoft. They say that they’ve detected viruses or other malware on your computer to trick you into giving them remote access or paying for software you don’t need.
These scammers take advantage of your reasonable concerns about viruses and other threats. They know that computer users have heard time and again that it’s important to install security software. But the purpose behind their elaborate scheme isn’t to protect your computer; it’s to make money.


Scammers have been peddling bogus security software for years. They set up fake websites, offer free “security” scans, and send alarming messages to try to convince you that your computer is infected. Then, they try to sell you software to fix the problem. At best, the software is worthless or available elsewhere for free. At worst, it could be malware — software designed to give criminals access to your computer and your personal information.

The latest version of the scam begins with a phone call. Scammers can get your name and other basic information from public directories. They might even guess what computer software you’re using. Once they have you on the phone, they often try to gain your trust by pretending to be associated with well-known companies or confusing you with a barrage of technical terms. They may ask you to go to your computer and perform a series of complex tasks. Sometimes, they target legitimate computer files and claim that they are viruses. Their tactics are designed to scare you into believing they can help fix your “problem.” Once they’ve gained your trust, they may:ask you to give them remote access to your computer and then make changes to your settings that could leave your computer vulnerabletry to enroll you in a worthless computer maintenance or warranty programask for credit card information so they can bill you for phony services — or services you could get elsewhere for free trick you into installing malware that could steal sensitive data, like user names and passwordsdirect you to websites and ask you to enter your credit card number and other personal information. Regardless of the tactics they use, they have one purpose: to make money.

If you get a call from someone who claims to be a tech support person, hang up and call the company yourself on a phone number you know to be genuine. A caller who creates a sense of urgency or uses high-pressure tactics is probably a scam artist.


Don’t give control of your computer to a third party who calls you out of the blue. Do not rely on caller ID alone to authenticate a caller. Criminals spoof caller ID numbers. They may appear to be calling from a legitimate company or a local number, when they’re not even in the same country as you. Online search results might not be the best way to find technical support or get a company’s contact information. Scammers sometimes place online ads to convince you to call them. They pay to boost their ranking in search results so their websites and phone numbers appear above those of legitimate companies. If you want tech support, look for a company’s contact information on their software package or on your receipt. Never provide your credit card or financial information to someone who calls and claims to be from tech support.If a caller pressures you to buy a computer security product or says there is a subscription fee associated with the call, hang up. If you’re concerned about your computer, call your security software company directly and ask for help.Never give your password on the phone. No legitimate organization calls you and asks for your password.Put your phone number on the National Do Not Call Registry, and then report illegal sales calls.

  • If you think you might have downloaded malware from a scam site or allowed a cybercriminal to access your computer, don’t panic. Instead:Get rid of malware. Update or download legitimate security software and scan your computer. Delete anything it identifies as a problem. Change any passwords that you gave out. If you use these passwords for other accounts, change those accounts, too.If you paid for bogus services with a credit card, call your credit card provider and ask to reverse the charges. Check your statements for any other charges you didn’t make, and ask to reverse those, too.If you believe that someone may have accessed your personal or financial information, visit the FTC’s identity theft website. You can minimize your risk of further damage and repair any problems already in place.
  • File a complaint with the FTC at ftc.gov/complaint.How to Spot a Refund Scam

  • If you paid for tech support services, and you later get a call about a refund, don’t give out any personal information, like your credit card or bank account number. The call is almost certainly another trick to take your money.
    The refund scam works like this: Several months after the purchase, someone might call to ask if you were happy with the service. When you say you weren’t, the scammer offers a refund. Or the caller may say that the company is going out of business and providing refunds for “warranties” and other services. In either case, the scammers eventually ask for a bank or credit card account number. Or they ask you to create a Western Union account. They might even ask for remote access to your computer to help you fill out the necessary forms. But instead of putting money in your account, the scammers withdraw money from your account.

  • If you get a call like this, hang up, and report it at ftc.gov/complaint.

 

Top 10 List of Scams
There are many ways to measure the largest scams, but most measure them by the number of people affected and the total dollars scammed. 
Medical Alert Scam - This is a telemarketing scam that promises a 'free' medical alert system, that scam targeted seniors and caretakers. The robocalls claimed to be offering the medical alert devices and system free of charge because a family member or friend had already paid for it. In many cases, seniors were asked to provide their bank account or credit information to 'verify' their identity and, as a result, were charged the monthly $35 service fee. The system, of course, never arrived and the seniors were left with a charge they had trouble getting refunded. Easy rule of thumb - be wary of 'free' offers that require your personal information upfront and always verify with the supposed friend or family member that the caller says paid for the service.

  1. Ebay / Auction Reseller Scam - Scammers posing as buyers convice sellers into shipping goods prior to receiving payment. Usually the fake buyer claims it's an 'emergency' like a child's birthday and asks the seller to ship the same day. The seller receives an email that appears as though it came from PayPal for the payment, but emails like that are easy for scammers to fake.

  2. Arrest Warrant Scam - Scammers create a fake Caller ID, which allows them to call you and appear to be calling from a local police, sheriff or other law enforcement agency. They say there is a warrant out for your arrest, but that you can pay a fine in order to avoid criminal charges. Of course, these scammers don't take credit cards; only a Western Union Moneygram, other wire transfer or pre-paid debit card will do.

  3. Invisible Home Improvements - In addition to email, mail and phone, scammers now just show up at your door. Scammers posing as home improvement contractors come door-to-door sale and target seniors, those who live alone, and victims of weather-related disasters are common targets

  4. Casting Call Scam - Scammers pose as agents or talent scouts looking for actors, singers, models, reality show contestants, etc., and use phony audition notices to fool aspiring performers into paying to try out for parts that don't exist.

  5. Foreign Currency Scam - Investments in foreign currency can sound like a great idea, and scammers frequently use real current events and news stories to make their pitches even more appealing. They advertise an easy investment with high return and low risk when you purchase Iraqi Dinar, Vietnamese Dong or, most recently, the Egyptian Pound. The plan is that, when those governments revalue their currencies, increasing their worth against the dollar, you just sell and cash in. Unlike previous hoaxes, you may even take possession of real currency. The problem is that they will be very difficult to sell, and it's extremely unlikely they will ever significantly increase in value.

  6. Scam Text Messages - It looks like a text alert from your bank, asking you to confirm information or 'reactivate your debit card' by following a link on your smart phone. But it is just a way to steal personal information

  7. Do Not Call Scams - The National Do Not Call Registry (U.S.) or the National Do Not Call List (Canada) offer consumers a free way to reduce telemarketing calls. Scammers call anyway, of course, and they've even found a way to scam consumers by pretending to be a government official calling to sign you up or confirming your previous participation on the Dot Not call list!

  8. Facebook Fake Friend Scam - Did you ever get a Friend Request on Facebook from someone you already thought was your Friend? If you hit Accept, you may have just friended a scammer.

  9. Affordable Care Act Scams (ObamaCare) - Scammers love the Affordable Care Act ('Obamacare'), using it as a way to fool Americans into sharing their personal information.

Other common scams:

  1. Lottery Scams These include scams which can go under the name of genuine lotteries like the UK National Lottery and the El Gordo Spanish lottery.  Unsolicited email or telephone calls tell people they are being entered or have already been entered into a prize draw. Later, they receive a call congratulating them on winning a substantial prize in a national lottery. But before they can claim their prize, they are told they must send money to pay for administration fees and taxes. The prize, of course, does not exist. No genuine lottery asks for money to pay fees or notifies it's winners via email.

  2. Internet Auction Frauds - Auction frauds (commonly called Ebay or PayPal scams, after the two largest venues) is a misrepresentation of a product advertised for sale through an Internet auction site or the failure to deliver products purchased through an Internet auction site.
     
  3. Nigerian Advance Fee Frauds (AFF)  -These frauds take the form of an offer, via letter, e-mail or fax, to share a huge sum of money in return for using the recipient's bank account to transfer of the money out of the country.  The perpetrators will often then use the bank account details to empty their victim's bank account. Often, they convince the victim that money is needed up front, to pay fees or is needed to bribe officials.

  4. Phishing and Pharming for Identity Theft  -The victim receives an email that appears to be from a credible, real bank or credit card company, with links to a website and a request to update account information. But the website and email are fakes, made to look like the real website.
     
  5. Online Dating Scams -Fake profiles of scammers posing as attractive men and women, then claiming they need money to help in an emergency, typically when they claim to be out of the country on a business trip.

  6. "PASSIVE RESIDUAL INCOME" SCAMS    Get rich scheme and scam websites - Make $$$ in your spare time! It so EASY once you get their free book or cd and learn their secrets! Sure... These websites are themselves scams; claiming to offer you a good deal, when at best, their products are worthless, they have no real secrets, and worse, some are identity thieves!
     
  7. Counterfeit Checks  - You receive a check in the mail - either from a lottery you "won" (without buying a ticker) or from an EBay buyer or other source.  It looks real... but after you try to cash it, you find out it is a fake; and you're arrested for passing a counterfeit check! Read more about scam checks on this page and here about the EBay check scam.
     
  8. FreeCreditReport.com -  What a scam this one is!  The name of the website is freecreditreport.com, but you'll only get a credit report when you sign up for their paid service.  And worst of all there IS a government mandated website where you CAN get a free credit report! 
     
  9. Work At Home Scams   - Work-at-home and business opportunity scams are often advertised as paid work from home. After the would-be worker applies, they are asked for money up-front to pay for materials and, after paying, they hear nothing back. A variation of this is, people are asked to invest in a business that has little chance of success.

  10. Matric and Multilevel Marketing and  Pyramid Schemes "MAKE MONEY NOW!" scream their websites!  And do it in your spare time!  Earn big bucks for almost no work.  If that isn't enough to tell you it is a scam, let us explain why it is. These schemes are promoted through websites offering expensive electronic gadgets as free gifts in return for spending about $25 on an inexpensive product, such as a mobile phone signal booster.  Consumers who buy the product then join a waiting list to receive their free gift. The person at the top of the list receives his/her gift only after a prescribed number of new members join up.
    The majority of those on the list will never receive the item. Pyramid schemes offer a return on a financial investment based on the number of new recruits to the scheme. Investors are misled about the likely returns. There are simply not enough people to support the scheme indefinitely.

  11. Property Investment Scams  - Investors attend a free presentation, which aims to persuade them to hand over large amounts of money to enroll on a course promising to make them a successful property dealer, usually involving "no money down". Schemes can involve the offer of buying yet-to-be built properties at a discount.  Other variations include a buy-to-lease scheme where companies offer to source, renovate and manage properties, claiming good returns from rental income. The properties are generally near-derelict and the tenants non-existent.

  12. 900 Phone NumberScams  - Postal notification of a win in a sweepstake or a holiday offer in this scam include instructions to ring a premium rate number. This is generally an 900 toll number. Calls to the number incur significant charges, the recorded message is lengthy, and the prize often does not exist. It is a scam that has been around a long time, but it is still in use.
     
  13. Advance Fee Brokers.- Often these appear to be very professional operations with attractive websites and advertisements. However, it is illegal for a business to charge a fee prior to providing a loan. Typically, after wiring money to the scammer, the victim never receives the loan. These 'lenders' will use fake physical addresses or the addresses of real companies.

  14. Credit Repair Services with Advance Fees. - Consumers with bad credit ratings are particularly vulnerable to this scam. Everything a credit-repair operation offers an individual can do personally at little or no cost. Credit repair operations cannot ask for money in advance and they cannot automatically remove legitimate negative reports from your credit history
    .
  15. Foreign Lottery Scams. -  Any lottery from a foreign country is illegal in the United States. Stating a person can win or is a winner already provides a strong incentive; however, people should never send money to obtain lottery money. Scammers using fictitious addresses will request you send 'fees and taxes' to them through a wire service, take the cash and never provide any winnings because there are no winners.

  16. Office Supplies - Sale by Deceptive Telemarketing. This scam features fake invoices for office supplies being sent to a business, often for only a couple hundred dollars. This relatively low amount makes it easier for company personnel to quickly sign off and feel it is not worth their time to check the invoice's validity, which would be done if it was for a larger amount.

  17. Debt Relief Services - Non-Compliant with FTC rule). The Federal Trade Commission has established rules for debt relief services (for profit businesses that represent that they renegotiate, settle or alter the terms of payment for an unsecured debt). The FTC rule governs disclosures and representations that debt relief services can make and does not allow advance fees. There are legitimate debt relief companies that comply with the FTC rule and the Better Business Bureau is identifying only the non-compliant companies as scams. Please let us know about any suspicious calls or emails you receive.  We look for patterns so that we can alert the authorities and victims to new scams, before it is too late!

 

Protecting Yourself When Using Online Services

As consumers of online services, we create information through our use of social media, online shopping, and many other activities. Public records are also a source of information about individuals, which can get posted online. Be aware that once this data is online, it can be difficult to remove.

Your habits and tolerance for risk can change over time. The information you felt comfortable sharing publicly a few years ago may seem like information you would now rather take back. You may have found information about you online that is incorrect, misleading, or that you simply want removed. Below are some considerations on how to take ownership and control the data about you.

See What Information About You Is Available Online
It can sometimes be shocking how much information is collected about you and made publicly available. Search engines will help you to do a quick query of your public information. You can also take a proactive approach and set up alerts for search terms of your name.

Data service websites such as Spokeo and Pipl have massive amounts of data about individuals compiled from a variety of sources, including public records and social networking sites. This data can be used by credit issuers, criminal profilers, employers, and others for any number of purposes not necessarily intended by the data service providers.

The first reaction to seeing your data might be, “Oh my, that’s scary,” followed shortly by, “How do I remove this?” If you’ve experienced a similar reaction, take the actions outlined below. Be aware that some information posted about you is within your control, and some of it is not.

Clean Up Data You Can Control
Information that is under your control includes information you have posted, such as your social networking profiles and related information. In addition, there could be information about you on old blog postings, postings on a friend’s website, an old dating profile, a picture sharing account, or any other services that were useful at a point in time for you but are no longer necessary.

Review the accounts to which you have access. You basically have three options: remove the data, modify the privacy settings, and/or request that the account be deleted. If you are going to request that the account be deleted, remove all of the data first. Be sure to request that the account be deleted rather than deactivated.

Request Cleanup of Data You Do Not Control

  • Contact website owners — If the site does not make contact information for the site owners easily available, you can do a query on the WHOis.net website to find an administrative and technical contact for the site.

  • Opt out of data service providers — A data service provider is a company or group that will provide lists of contact information to individuals or companies that request it. They often charge a fee for this information. In many cases, data service providers provide individuals with the ability to opt out of having their data published. Keep in mind that these services are aggregators, so the original provider of the information will likely have to be contacted also to remove your information.The Privacy Rights Clearinghouse publishes the opt-out URLs for more than 240 of these types of services.

  • Use a professional service — The maintenance of your online data requires discipline and regular review. What if there is misinformation being posted about you that you cannot get removed through the steps discussed above? Then it is time to consider using a professional service. These services will constantly search for, analyze, and remove data that you do not want made public. Review the service terms from these companies carefully to ensure the service you desire is what is being provided.

The best course of action you can take is to be aggressive about maintaining a cycle of checking your public data and removing items that do not match your current risk tolerance.


Resources For More Information

  • Privacy Rights Clearinghouse: Opt-Out URLs
  • Google™ support page for removal of data

  • Did you know …
  • Someone becomes a victim of cyber crime every 18 seconds?
  • Cyber crime costs an average of nearly $200.00 per victim?
  • Forty percent of social network users have been victims of cyber crime on a social networking site?

  • Implement these basic cyber security best practices:

    • Secure your computer - Be sure to have a firewall installed and enabled on your computer. Use spyware and adware protection software. This software is designed to protect you against spyware or malware, which can extract private information from your computer without your knowledge. Set these programs to auto-update to avoid missing a critical update.

    • Use strong passwords on all your accounts - Use a minimum of eight characters and a mix of special symbols, letters, and numbers. Use separate passwords for each account, so that if one account password is breached, an attacker will not automatically have access to all your other accounts. Do not reuse your work password on other systems.

    • Secure your online transactions - When submitting your sensitive information, look for the "lock" icon on the browser's status bar to ensure your information is secure during transmission. Also be sure that "https" appears in the website's address bar before performing an online transaction. The "s" stands for "secure" and indicates that communication with the Web page is encrypted.

    • Do not reveal too much personal information online -The less information you post, the less data is available for a cyber criminal to use in a potential attack or scam.

    • Protect your laptop, smartphone, or other portable devices when traveling - Just as your wallet contains lots of important and personal information that you would not want to lose, so do your portable devices. Do not let them out of your sight! Never store your laptop as checked luggage. If there is a room safe available at your hotel, use it to securely store your devices. In addition, make sure you have strong passwords on these devices in case they are lost or stolen.

    • Be aware that public computers and public wireless access are not secure - Cyber criminals can potentially access any information you provide, such as credit card numbers, confidential information, or passwords. Do not conduct any sensitive transactions at the local free Wi-Fi site.

    • Understand if and how location data is used -Check to see if GPS location data is being stored when you upload pictures to your social media site from your mobile device, and disable it if you do not want the world to know exactly where the pictures were taken.

    • Do not email sensitive data - Beware of emails requesting account or purchase information. Delete these emails. Never email credit card information or other financial/sensitive information. Legitimate businesses do not solicit sensitive or confidential information through email.

    • Dispose of information properly - Before discarding your computer or portable storage device, ensure the data contained on the device has been erased or "wiped." Read/writable media (including your hard drive) should be wiped using Department of Defense (DOD)-compliant software.

Resources For More Information

  • MS-ISAC Awareness Month Resources - http://msisac.cisecurity.org/resources/toolkit/
  • National Cyber Security Alliance - http://www.staysafeonline.org/ncsam/

 

Debit Card Security

Clinton National Bank uses a fraud monitoring service to review transactions on our EasyCheck Cards and Shazam Cards for potential abuse. Transactions are reviewed by this system within minutes of being authorized. This monitoring does not affect your ability to make purchases.

If you have a a debit or credit card with Clinton National Bank, it's a good idea to notify us if you will be using your card somewhere out of state. When you make us aware of that, we can place an alert on your account to prevent transactions from getting denied because you are making a purchase in a location which is uncommon for you.

Transactions are monitored 24 hours a day, seven days a week. Fraud analysts will call cardholders if they detect suspicious activity. An automated call will be placed to you using the latest information we have on file for you.

If you confirm the suspected transaction is valid, no action is taken. If you confirm that the suspected transaction is fraudulent, the fraud analyst will block further activity for that card, and you will be asked to contact Clinton National Bank Customer Service. We will then reissue you a new card and assist you in disputing any fraudulent charges.

In the event you cannot be contacted, the fraud analyst will block further activity for that card, and you will be asked to call 1-800-830-1925 or contact Clinton National Bank.

Email and Internet Security
Keep Anti-Virus and Anti-Spyware software up to date on your computer. Be aware of cookie use on your computer. In many instances cookies are useful and will not cause a problem, such as ones that store a username/password so you won't have to re-enter it when you visit the website that issued it. In other cases they are used for "data mining", or tracking your motions through a website. This information can then be used for fraudulent purposes.

Be aware of a fraudulent practice known as Phishing: It is the act of sending an email to a user claiming to be from a legitimate establishment in an effort to obtain personal information. The email will look like it is coming from a known company but is in fact coming from a "look-alike" website. The email will most often tell you that your account with them needs to be updated and ask you to provide account numbers, social security numbers or passwords so they can update their records.

  • Be aware of sites that offer some sort of reward or prize in exchange for your contact information or other personal details.


  • Be aware of any site or email correspondence that asks you to send them money for any reason, especially if they are promising you a cash reward if you do.


  • Clinton National Bank does not solicit personal information via email. Never provide personal information such as account numbers, social security numbers, or usernames and passwords in any email correspondence. If you feel that you have received a fraudulent email please feel free to contact us for verification.

Read More About Credit Card Security

Tips for Making Your Home Computer Safe

Most workplaces have cyber-security policies, processes, and technologies. You can create a more cyber-secure environment at home by implementing similar strategies.

  • Determine a central location for your compute at home. This allows you to monitor your children’s activities online.

  • Whether you allow access to certain websites. You may choose to use parental control settings to block access to inappropriate websites.

  • Acceptable online behavior and expectations. Explain the rules and expectations regarding online behavior. Include issues such as cyber-bullying, keeping personal information private (not posting it online), and treating people online as strangers.

  • Your monitoring strategy. How will you ensure your family complies with your “acceptable use policy?” You may choose to monitor your family’s online activities and let them know their activity is being monitored.


To create a more cyber-secure environment at home, implement these processes:

  • Develop strong passwords and change them every 60 to 90 days. Passwords should be changed periodically to reduce the risk of disclosure. The more critical the account, such as banking or email, the more frequently the password should be changed. Use a minimum of eight characters with a combination of uppercase and lowercase letters, numbers, and special characters. Have different passwords for each account for which you provide personal information. Do not reuse work passwords.

  • Back up your information. Determine what needs to be saved, how frequently it needs to be saved, how to perform the backups, how to save the backups so you can restore information when needed, and how to test the backups to make sure they work properly.

  • Get support. Before your computer crashes or is infected with a computer virus, determine who is going to provide your support. 

  • Erase your hard drive. When it is time to dispose of your computer or mobile device, make sure you have the tools and processes to completely erase your information from it or physically destroy the hard drive. Properly erasing your hard drive thwarts efforts to steal your identity. There are many resources for the process of that disposal.

Technologies
Use the following technologies and tools to help keep your family and computers, tablets, smartphones, and other mobile devices secure. To help select the right tools, check product ratings and reviews from well-known personal computer (PC) and consumer magazines.

  • Parental control software. As mentioned previously, you may choose to use parental control software. These programs can prevent access to inappropriate websites, limit the amount of time spent online, set a schedule for what time of day Internet use is permitted, limit access to games based on Entertainment Software Rating Board (ESRB) ratings, and monitor instant messaging conversations. Most programs are hardened to prevent them from being disabled. 

  • Automatic updates. Set your computer to automatically update the latest security patches for operating systems and application software. This will minimize risk from hackers taking advantage of software vulnerabilities or bugs.

  • Security software. Ensure all computers have up-to-date security software on them. At a minimum, the security software should include anti-virus, anti-spyware, and a firewall. Newer products include functions to block downloads and access to and from malicious websites. Some browsers have safeguards built in, such as Internet Explorer®’s SmartScreen Filter that detects phishing websites and protects against downloading malicious software. For mobile devices — like tablets and smartphones — look for security software that allows you to locate a lost or stolen device and remotely erase it.

  • Wireless network. Configure your wireless network for security. Change the default password for your router to a secure password to prevent anyone from gaining access to it and disabling your security settings. You should also use a minimum of 128-bit encryption to make your network more secure. Choose WiFi Protected Access (WPA) 2 encryption over older encryption, like Wired Equivalent Privacy (WEP) or WPA. Lastly, change the service set identifier (SSID) from its default to something unique. Use a name you can remember to identify your network. Choose a name that does not identify you or your family. For example: Do not make your SSID “Smith’s home network.” Check your router vendor and Internet service provider (ISP) for secure configuration instructions.

 

 

Website Disclosure

Clinton National Bank has no control over and is not responsible for the subject matter, content, information or graphics of the web sites that have links here. Visiting these links are at your own risk. The accuracy, opinions expressed and other links provided by these resources are not investigated, verified, monitored or endorsed by Clinton National Bank. Please contact us with any concerns or comments.