person using phone in front of laptop computer and holding credit card in other hand
Contact us immediately at 417-336-6310 if you notice any suspicious or unusual activity related to any of your First Community Bank accounts.
First Community Bank of the Ozarks encourages its business customers to perform a self-assessment of risks associated with the customer’s computer systems and business practices. This risk assessment should include an assessment of the risks associated with the following systems and other information technology that may apply, as well as mitigating controls that are in place to prevent the risks:
Are procedures utilized that require dual control over important functions?
The underlying purpose for the self-assessment is to determine where weaknesses exist and to identify controls that may help to mitigate these risks.
Corporate Account Takeover, or CATO, is the business equivalent of personal identity theft. Hackers backed by professional criminal organizations are targeting small and medium businesses to obtain access to their web banking credentials or remote control of their computers. These hackers will then drain the deposit and credit lines of the compromised bank accounts, funneling the funds through mules that quickly redirect the monies overseas into hackers’ accounts.
As a business owner, you need an understanding of how to take proactive steps and avoid, or at least minimize, most threats.
Call us immediately at 417-336-6310 if you believe that your First Community Bank of the Ozarks’ account has been compromised or you feel you need to consider additional authentication options.
Computer-related crimes affecting businesses and consumers are frequently in the news. While federally insured financial institutions are required to have vigorous information security programs to safeguard financial data, financial institution customers also need to know how to steer clear of fraudsters.
Protect your computer/mobile phone. Install software that protects against malware, or malicious software, which can access a computer system or mobile phone without your consent to steal passwords or account numbers. Password protect your computer or mobile phone, so others cannot access your information if it is lost or stolen.
Use the strongest method available to log in to financial accounts. Use the strongest authentication offered, especially for high-risk transactions. Use passwords that are difficult to guess and keep them secret. Do not save passwords on your phone or computer. Create “strong” user IDs and passwords for your computers, mobile devices, and online accounts by using combinations of upper- and lowercase letters, numbers, and symbols that are hard to guess, and then change them regularly. Although using the same password or PIN for several accounts can be tempting, doing so means a criminal who obtains one password or PIN can log in to other accounts. Also, always log out of financial accounts when you complete your transactions or walk away from the computer.
Monitor your records and accounts on a regular basis. Be sure to “Log out” once you have completed your mobile banking session. Monitor your accounts on a regular basis and report any suspicious activity to your financial institution.
Be careful where and how you connect to the Internet. Only access the Internet for banking or for other activities that involve personal information using your own laptop or mobile device through a known, trusted, and secure connection. A public computer, such as at a hotel business center or public library, and free Wi-Fi networks are not necessarily secure. In some cases, it’s easier for cyber criminals to intercept the Internet traffic in these locations.
When in doubt, don’t store it or send it! Never send any personal information (account numbers, Social Security numbers, passwords, etc.) via text message. These are not secure and can be intercepted by hackers. Do not store private information on your phone. Make a habit of frequently deleting any unnecessary information on your device including browser history and text messages. It is very important that you remove all sensitive information before discarding your telephone. Do not open any messages from an unknown sender, and do not click on unfamiliar links that may be sent via text message.
Be careful when using social networking sites. Cyber criminals use social networking sites to gather details about individuals, such as their place or date of birth, a pet’s name, their mother’s maiden name, and other information that can help them figure out passwords – or how to reset them. Don’t share your ‘page’ or access to your information with anyone you don’t know and trust. Cyber criminals may pretend to be your ‘friend’ to convince you to send money or divulge personal information.
Computer-related crimes affecting businesses and consumers are frequently in the news. While federally insured financial institutions are required to have vigorous information security programs to safeguard financial data, financial institution customers also need to know how to steer clear of fraudsters.
The cybersecurity tips were developed by the Federal Deposit Insurance Corporation to provide information to bank customers about protecting and maintaining their computer systems.