Insite National Bank

Knowledge is the Key

Computer Security
Shopping Online
What To Watch For

Secure Your Computer

  • Make certain that your computer is equipped with spyware and virus-protection software.
  • Consider installing anti-key-logging software, which can detect hidden keystroke logging malware and encrypt the keystrokes on your computer keyboard.
  • Make certain that your computer is equipped with a firewall, which prevents unauthorized users from gaining access to your computer or monitoring transfers of information to and from the computer.
  • Be sure to download and install any operating system and software updates (sometimes called patches or service packs) in a timely manner.
  • Be sure your browser software is up to date.

Monitor your account activity

Check your account activity frequently to detect fraud earlier. You can receive information quickly about activity in your accounts when you set up Alerts. To set up Alerts, sign in to Online Banking, Click My Profile then Click Alerts & Notifications.

Update your knowledge

Follow Internet security issues in the news and discuss them with friends, family and colleagues. Explore online resources like the National Cyber Security Alliance and Microsoft® Security At Home websites that provide information about securing your computer and safe online precautions.

Phishing and spoofing

Phishing and spoofing emails ask you to go to a fake website that looks like First Savings Bank of Danville and provide your personal account information. These emails may even ask you to call a phone number and provide account information.

Ways to identify phishing and spoofing emails include:

  • Requests for personal information. First Savings Bank of Danville emails will never ask you to reply in an email with any personal information such as your Social Security number, ATM or PIN.

Avoiding Fraud and Identity Theft When Shopping Online

With online shopping popularity, there's a good chance you now make some of your purchases on the Web. To ensure your Internet shopping is as secure as it is convenient, we've compiled these online shopping guidelines and identity protection tips.

Know who you are buying from. If you haven't shopped at the retailer before, research it online to see what other customers are saying. Or call the customer service number to ask about their policies and guarantees. If the website doesn't include a phone number, email the company and start a dialogue with them before buying anything.

Watch for emails from companies you don't know, offering to sell products at steep discounts. It's probably an email sent indiscriminately to thousands of people.

Use a secure means of payment. Credit cards are one of the safest ways to make online purchases.

Online payment services offer some protection as well. Never send cash or a wire transfer, as you will have little recourse if you don't get what you paid for.

*Always protect yourself from identity theft offline as well. Shred any document with personal or financial information before throwing it out.

Make sure the website you are visiting is encrypted. Once you get to the purchase page, check that the address begins "https" rather than just "http" before hitting "send". The "s" means the site is secure, and your financial and personal information is encrypted before being sent over the Internet

Review the website’s policies. Before making your purchase, review the websites online shopping and return policies. Make sure the site's commitment to customer service is what you'd expect from any retailer.

Keep your computer security current. Use a security software tool to help prevent viruses, identity theft and fraud, and check for updates regularly to protect yourself from the latest threats.

Trust your instincts. If you have any doubts about the site, listen to your gut instincts and don't buy from them. Warning signs that the site may be illegitimate are lack of contact information and deals that are too good to be true - which means they probably are.

Review your bills and purchases. Print and save your online bills, and compare them to your credit card or bank statement to make sure you've been billed correctly. When your purchase arrives, check it immediately to make sure it's what you ordered and is of good quality.


Online Security and What to Watch For

We all know to be wary of giving strangers your personal information and especially your bank account details. But can you be sure the website you’re logging into is that of your bank or a trusted company and not a website created by a cybercriminal using different methods to lure you into parting with your confidential personal or business information.

As an Individual or Company doing business on the Internet, we all need to be aware of these methods, exercise caution and protect ourselves when online.

These are some helpful hints to help protect your information while online:

  • Avoid downloading of any file or attachment unless you are absolutely certain of what it is and who is providing it.
  • Avoid clicking on an advertisement that asks for personal or financial information.
  • Update your security and system software to protect your computer from malware threats.

Here’s a quick explanation of some of the most common security threats you may come across:

Malware: Malware is short for “malicious software.” Malware is a term used to describe variety of forms of hostile, intrusive, or annoying software or program code. Malware could be computer viruses, worms, Trojan horses, dishonest spyware, and malicious rootkits—all of which are defined below.

  • Computer virus: A computer virus is a small piece of software that can spread from one infected computer to another. The virus could corrupt, steal, or delete data on your computer—even erasing everything on your hard drive. A virus could also use other programs like your email program to spread itself to other computers.
  • Rogue security software: Have you ever seen a pop-up window that advertises a security update or alert? It appears legitimate and asks you to click on a link to install the "update" or "remove" unwanted malicious software that it has apparently detected. This could be rogue security software designed to lure people into clicking and downloading malicious software.
  • Trojan horse: Users can infect their own computers with Trojan horse software simply by downloading an application they thought was legitimate but was in fact malicious. Once inside your computer, a Trojan horse can do anything from record your passwords by logging keystrokes to hijacking your webcam to watch and record your every move.
  • Malicious spyware: Malicious spyware is used to describe an application that was created by cybercriminals to spy on their victims. An example would be key logger software that records a victim's every keystroke on his or her keyboard. The recorded information is periodically sent back to the originating cybercriminal over the Internet. Keylogging software is also widely available and marketed to parents or businesses that want to monitor their children's online activity or their employees' Internet usage.
  • Spam: Spam in the online security context is primarily used to describe email spam —unwanted messages in your email inbox. Spam, or electronic junk mail, is a nuisance as it can clutter your mailbox as well as potentially take up space on your mail server. Unwanted junk mail advertising items you don't care for is harmless, relatively speaking. However, spam messages can contain links that when clicked on could go to a website that installs malicious software onto your computer.
  • Phishing and Spoofing: Phishing and Spoofing scams are fraudulent attempts by cybercriminals to obtain private information. They often appear as email messages designed to appear as though they are from legitimate sources. For example, the message would try to lure you into giving your personal information by pretending that your bank or email service provider is updating its website and that you must click on the link in the email to verify your account information and password details.

Phishing and Spoofing emails may include:

  • Requests for your personal information. First Savings Bank of Danville emails will never ask you to reply in an email with any personal information such as your Social Security number, ATM Card Number or PIN
  • Urgent Requests. We will never state that your account may be closed if you fail to confirm, verify or authenticate your personal information via email.
  • Messages about system and security updates. First Savings Bank of Danville will never request for you to confirm important information due to upgrades and state that you must update your information online.
  • An Offer that sounds too good to be true, usually is. For example, you may be asked to fill out a short customer service survey in exchange for money, then be asked to provide your account number to receive the credit. First Savings Bank of Danville will never require you to submit such information as a condition for a survey.
  • Obvious typos and other errors or poor wording. These examples are often an indication of fraudulent emails and websites. Watch for obvious typos, grammatical errors, awkward writing or poor visual design.

If you happen to notice any of the above issues while visiting the First Savings Bank of Danville website or receive an unusual email claiming to be from First Savings Bank of Danville, please contact us directly at 217-446-3854 and report the issue.

These are some of the most common security issues you'll come across to describe the different methods cybercriminals use.