Security Procedures for Online Account Holders

Security Procedures for Online Account Holders

Evidence is mounting that cyber crimes are increasing. We’ve heard about the elevated risk from law enforcement and security experts. Financial institutions across the country have experienced ACH cyber crimes. With the growth in malware and ability for fraudsters to load virus programs on unsuspecting client computers, the need for heightened awareness and protection is of extreme importance.

We ask our clients to:

  • Protect online user names and passwords. Never leave account information, user names or passwords where unauthorized persons may view them.
  • Protect your answers to security questions. Select questions that are easy for you to answer – but hard for anyone else to guess.
  • Use dual control. Pinnacle strongly recommends that clients use a system that requires one authorized user to submit and a second authorized user to approve the transaction.
  • Call us immediately. Notify Treasury Management Support at 615.743.6200 or 866.839.2781 immediately if you suspect unauthorized access to your Treasury Management service.
  • Close your browser when you’re not using the internet. Never allow the browser to cache or keep your password for automatic logon purposes.
  • Always exit the system by executing the “log off” command.
  • Use a current web browser. Only transact business on https: Internet sites with a valid, recognizable SSL certificate.
  • Never download programs from unknown, unverified or non-trusted sources.
  • Avoid using email or doing non-business Internet browsing on a PC that is used to originate financial transactions. If you do use email on the PC, permanently delete email messages from unknown sources and scan all incoming email attachments for viruses.
  • Keep your computer operating system up to date to ensure the highest level of protection.
  • Install a personal firewall on your computer. Use it to deny incoming remote connections to your PC and limit application access to the Internet to only those required for business purposes.
  • Install, run and maintain updated anti-virus, anti-adware and anti-spyware software. Additionally report erratic or drastically slowed PC behavior to your IT staff. Request anti-rootkit solutions be run with standard security tools.
  • Turn your computer off completely when you are finished using it – don’t leave it in sleep mode.

Quick Links