Please take some time to familiarize yourself with our unique security features for debit cards and online banking
As part of our continuing effort to provide you, our customer, with as much security as possible, we are pleased to offer our 24 hour customized security system.
* - The measure of security is based upon the known methods of compromising accounts and is no guarantee of security.
While the bank does have fraud detection in place on your online banking and debit card usage, you still remain the best fraud detection on your accounts.
Protecting Your Personal Information and Your Company's Information Online
All consumer accounts are protected under Regulation E. Commercial and Business Accounts are not protected under Regulation E; however, The State Bank believes that our controls exceed the FFIEC guidance and industry standards required to protect your information.
By default, without special arrangement and additional controls, The State Bank does not allow ACH or Wire transfers through the Online Banking system as we have always recognized that Online Banking is NOT secure. There are too many methods of compromising your computer or system and there have been too many public incidents where businesses, churches, school districts have had money stolen from their accounts because of the insecure nature of Online Banking. Please 'google' – “ACH fraud”. Cybercrime losses exceed hundreds of millions of dollars from unauthorized funds transfers.
Because your account information is high risk and we value your security and trust, The State Bank has added an additional control of authenticating online banking customers. You will be provided with three different channels of authenticating your account. We encourage you to use the first two channels.
>Channel 1: Receive a phone call via cell or land line Preferred – most secure
>Channel 2: Receive a text message via a cell phone Preferred – somewhat secure
>Channel 3: Receive an email Not Preferred – least secure
Channel 1, You receive a phone call - is seen as the most secure. There are only two ways for the secure code to be intercepted – they would have to be monitoring your phone or they would have to clone your cell phone. Both are considered relatively technically difficult to do. The phone call will verbally give you a 4 letter/number sequence by reading it to you and is only valid for several minutes.
Channel 2, Receive a text message via a cell phone is preferred, but it can be compromised if you have your cell phone compromised. There have been incidents at other banks where the phone was relaying messages to the “bad guys” in order to compromise the account.
Channel 3, Receiving an email is seen as the least secure and is not recommended by the bank. Although this can be seen as a separate authentication channel – if the bad guys have control of your computer, they probably have access to your email as well. In addition, email can be slow – we send the email out immediately, but we don't have any control over the server which delivers the email to you.
Historically, the vast majority of online banking losses via ACH or Wire fraud have occurred at the home or business computer. At this time, The State Bank is not aware of any losses that have occurred due to a breach at any bank including The State Bank.
The bank has active systems which are monitoring various facets of your account. If we need to contact you we will do so by phone or email. You should recognize that any person claiming to be from The State Bank will NEVER ask you for your pin number, password or any identifying personal information for any of our systems. If you are in doubt of the callers identity, we encourage you to hangup and call us directly. We will only discuss the minimum to authenticate you and to review the issue with your account.
We may call you to verify suspicious transactions on your account or for information regarding your login or transaction behavior via the online banking. If we believe that your system or devices may be compromised, we may close them until we can investigate the suspicious activity.
It is vital that you maintain current contact information with the Bank.
To mitigate your risks, we recommend that you implement the following:
Monitor your
account on a daily basis – yes, daily
Use debit
card alerts for transactions on your debit card - provides
transaction activity and detail almost immediately to your cell
phone via text messages.
The online banking has a screen which
will show your recent login activity. Help -> history of logins
Use a dedicated
computer for online banking, or use a linux boot distribution to
start your computer and access your online banking. There are a
number of free desktop distributions which are free and can be
downloaded from the internet.
Examples: Use at your own
risk
Tails – https://tails.boum.org/index.en.html
– The Amnesic Incongnito Live System
Ubuntu –
http://www.ubuntu.com/download/ubuntu/download
- #2 Orange Option
Activate your
firewall
Use current
anti-virus and anti-malware which must be setup to update daily
Keep your
operating system up to date with any patches – also daily
Most
operating systems will do this automatically if you set them up
properly.
Corporate users should perform a risk assessment and evaluate their own controls in order to secure their networks. Remember: by default, The State Bank does not allow ACH transfers or Wire Transfers out of the Bank via the Online Banking system.
If you have any questions, please feel free to contact us. If you think that your account has been compromised or you see unusual activity. Please contact us immediately.
Note: We can only offer limited technical support.
Contacts at the Bank
Resources
FFIEC Guidance: http://www.ffiec.gov/pdf/Auth-ITS-Final%206-22-11%20(FFIEC%20Formated).pdf
What happens: A fraudster sends you an email saying you have won, earned, inherited, or that you can participate in something to win/make a lot of money
What they want: Your account information or debit/credit card details or send a wire/western union moneygram. Sometimes, they want you to meet them in person
What you should do: Delete the email - Never meet anyone unsolicited
Common Scenario(s):
You get an email letting you know of some scheme where you have made a lot of money. Scenarios involve: