Learn More - iBanking

Internet Banking Awareness and Education

Legacy Bank is committed to protecting your personal information.  Legacy Bank would like to offer some education on how to combat your electronic banking credentials or bank account(s) from being compromised.

Purpose

The purpose of our Customer Awareness and and Education Program is to ensure that our electronic banking customers are aware of the risk associated with using banking services.  The program will remind customers about the importance of security measures that can be used to protect them from being victims of fraud.

Unsolicited Request for Credentials

Legacy Bank will NEVER contact a customer on an unsolicited basis (i.e. phone, email, text) and request your electronic banking credentials such as user name and password.  Please read Legacy Bank's Internet Banking customer agreement for more information.  Contact your local branch if you believe your account has been compromised.

Business Online Banking Customers

Business online banking customers are encouraged to periodically perform a risk assessment and controls evaluation, establish internal policies related to employee use of internet, and ensure all company computers are equipped with up-to-date antivirus software.

Who is Covered by Regualtion E - Electronic Funds Transfer?

An Electronic Fund Transfer (EFT) is the electronic exchange or transfer of money from one account to another, either within a single financial institution or transfer of money from one account to another, either within a single financial institution or across multiple institutions initiated through electronic -based systems.  The term includes, but is not limited to:

  • Point-of-sale transfers
  • ATM transfers
  • Direct deposits or withdrawal of funds
  • Transfers initiated by telephone
  • Transfers resulting from debit card transactions
  • Transfers initiated through internet banking/bill pay

Regulation E is a consumer protection law for accounts established primarily for personal, family, or household purposes.  Non-consumer accounts, such as corporations, partnerships, trusts, etc., are excluded from coverage.  Regulation E gives consumers a way to notify their financial institution that an EFT has been make on their account without their permission.

Online Security

ü  Never click on suspicious links in emails, tweets, posts, or online advertising.  Links can take you to a different website than their labels indicate.  Typing an address in your browser instead of clicking a link in an email is a safer alternative.

ü  Only give sensitive information to websites using encryption so your information is protected as it travels across the Internet.  Verify the web address begins with “https://” (the”s” is for secure) rather than just “http://”. Some browsers also display a closed padlock.

ü  Do not trust sites with certificate warnings or errors.  These messages could be caused by your connection being intercepted or the web server misrepresenting its identity.

ü  Avoid using public computers or public wireless access points for online banking and other activities involving sensitive information when possible.

ü  Always “sign out” or “log off” of password protected websites when finished to prevent unauthorized access.  Simply closing the browser window may not actually end your session.

ü  Be cautious of unsolicited phone class, emails, or texts directing you to a website or requesting information.

General PC Security

ü  Maintain active and up-to-date antivirus protection provided by a reputable vendor.  Schedule regular scans of your computer in addition to real-time scanning.

ü  Update your software frequently to ensure you have the latest security patches.  This includes your computer’s operating system and other installed software (e.g. Web Browsers, Adobe Flash Player, Adobe Reader, Java, Microsoft Office, etc.).

ü  Automate software updates, when the software supports it, to ensure it’s not overlooked.

ü  If you suspect your computer is infected with malware, discontinue using it for banking, shopping, or other activities involving sensitive information.  Use security software and/or professional help to find and remove malware.

ü  Use firewalls on your local network to add another layer of protection for all the devices that connect through the firewall (e.g. PCs, smart phones, and tablets).

ü  Require a password to gain access.  Log off or lock your computer when not in use.

ü  Use a cable lock to physically secure laptops, when the device is store in an untrusted location.

Passwords

ü  Create a unique password for all the different systems you use.  If you don’t, then one breach leaves all your accounts vulnerable.

ü  Never share your password over the phone, in texts, by email, or in person.  If you are asked for your password, it’s probably a scam. 

ü  Use unpredictable passwords with a combination of lowercase letters, capital letters, numbers, and special characters.

ü  The longer the password, the tougher it is to crack.  Use a password of at least 8 characters.  Every additional character exponentially strengthens a password.

ü  Avoid using obvious passwords such as:

o Your name
o Your business name
o Family member names
o Your user name
o Birthdates
o Dictionary words

ü  Choose a password you can remember without writing down.  If you do choose to write it down, store it in a secure location.

ü  Avoid saving passwords to a computer.

To learn more about information security, visit any of the following websites:

ü  OnGuardOnline.gov

ü  StaySafeOnline.org

ü  BBB.org/Data-Security