Online banking offers the convenience of accessing your Western
Bank accounts from the comfort of your home or office. Whether
you need to transfer funds between accounts or you just need a
balance, the power is at your fingertips 24 hours a day, 7 days
a week with Online Banking.
Best Practices for Secure Online Banking
Online banking is an extremely
valuable tool in today's high-paced business world.
Having access to your personal or business bank account
via the Internet affords you numerous conveniences, including
checking your account balance, transferring money, stop payments
on checks, ordering new checks and the ability to see if the
checks you wrote have posted against your account. However,
online banking also brings increased chances of fraud, breeched
security, and the possibility that someone can hack into your
account. Here are some important best practices to help make
your online banking experience a secure one.
- Set a cryptic password and username. Cryptic passwords are
usually comprised of upper- and lowercase letters, numbers, and
symbols, cryptic passwords decrease the chance of someone
accessing your accounts. Avoid using obvious words or numbers
that will be easy for others to figure out, allowing them easy
access to your account. Also, do not use the same username and
password that you use for other accounts or websites.
Always sign out of your account and close your internet
connection when you are finished with your online banking.
Never leave the account open on your computer screen
where others can see it
Only open your online banking account from trusted internet /
Wi-Fi sources. Do not open your account from public /free Wi-Fi
zones commonly found in hotels, restaurants and airports.
Open your account using only a private, secure computer. Do not
open your account on a public computer, such as one rented at a
café or copy center.
Remain wary of phishing scams, which send you emails that appear
to have come from Western Bank or other seemingly legitimate
businesses. These fraudulent emails are sent in an attempt to
obtain personal information from you. Should you receive an
authentic looking email that is asking for personal information,
do not provide the information and contact us at (575) 542-3521
Contact us immediately if your computer or online banking
account has been compromised in any way.
Keep your personal information private and secure.
Do not write
down your password or reveal it to anyone.
auto-complete or similar features on any computer you use for
Only use your
credit card number, Social Security number or other sensitive
information online when it's absolutely necessary. Also read the
being "encrypted" (scrambled) so it can't be read by outsiders.
- Commercial Users also should follow the above best
practices for consumers with the following additional
Limit the number of employees that have access to your account
if you are running a business. There may be a reason that a
manager or supervisor needs access to your online banking
information, but make sure to limit their access and teach them
safe online banking practices.
engineering is still often used to obtain sensitive information.
For example, never trust e-mails requesting personal information
such as user names or passwords. If there is no one in the
office qualified to provide this type of training, find a
trusted IT professional or consultant to educate employees.
Contact Kim Garrison at Western Bank for training options.
Secure systems: Ensure your business systems (PCs, file servers,
and mail servers) are protected by trustworthy internet security
business products and are using the latest updates. Consumer
solutions (paid or free) are not sufficient to provide adequate
coverage for the security of your business.
If possible dedicate an online banking PC. Designate a single
computer to use as your business's online account computer. This
computer should solely be used for online banking and not for
other online activities such as e-mail, web browsing, or file
Learning the Lingo
Trojans: Programs that perform
malicious actions but have no replication abilities. Like the
original Trojan horse, these programs may arrive as seemingly
harmless files or applications, but actually have malicious
intent within their code. Banking Trojans are specifically
designed to gain control and compromise online accounts.
Phishing: A form of identity theft in
which a scammer uses an authentic-looking e-mail to trick
recipients into giving out sensitive personal information, such
as credit card numbers, bank account numbers, Social Security
numbers or other sensitive personal information.
Site spoofing: Websites that appear
professionally designed and legitimate with the purpose of
collecting sensitive information from unsuspecting visitors.
Key logger: Often referred to as key
logging, is the action of recording the keys struck on a
keyboard, typically in a covert manner so that the person using
the keyboard is unaware that their actions are being monitored.