Home Contact Us
Business Banking Personal Banking Locations ATM Security Rates About Us
News & Events

                 

 

July 03, 2014
Email Do's and Don'ts  

Email has become one of the primary ways we communicate in our personal and professional lives. However, we can often be our own worst enemy when using it. In this newsletter, we will explain the most common mistakes people make and how you can avoid them in your day-to-day lives.

Click the article title to read the entire article.


June 23, 2014
Flagship Bank Minnesota Names Andy Schornack President  

Wayzata, MN – (June 23, 2014): Flagship Bank Minnesota, announced today that the bank has named Andrew Schornack as President. Mr. Schornack currently serves as a member of Flagship Bank and its parent company, Flagship Financial Group, Inc., Board of Directors. Mr. Schornack previously served the bank as Vice President and led the transition of Flagship Bank following its merger and sale of Flagship Bank Winsted and the sale of additional capital in Flagship Financial Group, Inc.

Click the article title to read the entire article.


June 04, 2014
Disposing of Your Mobile Device  

Mobile devices, such as smartphones and tablets, continue to advance and innovate at an astonishing rate. As a result, many of us replace our mobile devices as often as every 18 months. Unfortunately, too many people simply dispose of their older mobile devices with little thought on just how much personal data their devices have accumulated. In this newsletter we will cover what types of personal information may be on your mobile device and how you can securely wipe it before disposing of it or returning it. If your mobile device was issued to you by your employer or has any organizational data stored on it, be sure to check with your supervisor about proper backup and disposal procedures before following the steps below.

Click the article title to read the entire article.


May 08, 2014
I'm Hacked, Now What?  

We know you are concerned about protecting your computer and information and take steps to secure them. However—just like driving a car—no matter how safely you drive, sooner or later you may have an incident. In this newsletter we will teach you what to look for to determine if your computer is hacked, and if so what you can do about it. Ultimately, the quicker you detect your computer has been hacked and the faster you respond, the better you can mitigate any harm to you or your organization.

Click the article title to read the entire article.


April 23, 2014
Heartbleed - Why Do I Care?  

On Monday April 7th, a serious vulnerability was identified in one of the most popular implementations of the SSL protocol, called OpenSSL. SSL is a very important security protocol used throughout the Internet. Not only does SSL encrypt your online communications, but it helps ensure you are connecting to legitimate websites when you do thing like shop or bank online. In this newsletter we give a very simple overview of what this vulnerability means to you and what you can to do protect yourself.

Click the article title to read the entire article.


April 04, 2014
Yes, You Actually Are A Target  

A common misconception many people have is that they are not a target for cyber crime: that they or their computers do not have any value. Nothing could be further from the truth. If you have a computer, mobile device, an online account, email address, credit card, or engage in other type of online activity, you are worth money to cyber criminals. In this newsletter we explain why you are a target, how you are being attacked, and what you can do to protect yourself.

Click the article title to read the entire article.


March 05, 2014
The End of Windows XP  

Windows XP has proven to be one of the most popular operating systems in computing history, at one point it was used on most of the computers around the world. However Windows XP is old, and all support for it from Microsoft will soon end. First released more than twelve years ago, Microsoft is scheduled to End of Life (EOL) Windows XP on April 8, 2014. This means Microsoft will no longer release any end-user updates or security patches. With approximately 25% of the world’s desktop computers still running Windows XP (only Windows 7 is more popular), millions of people will be at greater risk once this happens. Keep in mind, home users are not the only ones who will be impacted as XP is still widely used in offices, industrial control systems, ATM machines, medical systems, point-of-sale terminals, and other devices. Below we describe what the risks are once Windows XP is no longer supported and steps you can take to protect yourself.

Click the article title to read the entire article.


February 05, 2014
What is Malware  

You may have heard of terms such as virus, worm, trojan or rootkit when people discuss cyber security. These terms describe types of programs used by cyber criminals to infect and take over computers and mobile devices. Today all of these different terms are now simply called malware. In this newsletter we will explain what malware is, who is developing it, why, and what you can to do protect yourself against it.

Click the article title to read the entire article.


January 28, 2014
Securing Your Home Network  

Home networks were relatively simple several years ago, perhaps nothing more than a wireless access point and a computer or two used to surf the Internet or play games online. However, home networks have become increasingly complex. Not only are we connecting more devices to our home networks, but we are doing more things with them. In this edition we will cover some basic steps to creating a more secure home network.

Click the article title to read the entire article.


December 14, 2013
Securing Your New Tablet  

Congratulations on your new tablet. This technology is a powerful and convenient way to communicate with others, shop online, read, listen to music, game and perform a myriad of other activities. Since this new tool may become an important part of your daily life, we strongly encourage you to take some simple steps to help keep it safe and secure.

Click the article title to read the entire article.


November 06, 2013
How to Shop Online Securely  

The holiday season is close upon us and soon millions of people around world will be looking to buy the perfect gifts. Many people will choose to shop online in search of a great deal or to avoid long lines and crowds. Unfortunately, this is also the time unscrupulous websites may attempt to scam you by selling counterfeit products, stealing your credit card information or failing to deliver anything. In this newsletter we will cover some of the dangers of shopping online and ways to protect yourself.

Click the article title to read the entire article.


October 09, 2013
Password Managers  

Often, one of the first things people learn about when protecting their personal identity and information is to use strong passwords. A strong password is one that is not only difficult for cyber criminals to guess, but also resists automated hacking tools. A common rule of thumb is this: the longer and more complex your password is, the stronger and more secure it is. The problem is that strong passwords can be hard to remember. As a result, people often create a single, strong password and use that same password, or slight variations of it, for all of their online accounts, applications and devices. Even more dangerous, many people use the same password for both their personal and work accounts. If you are one of those people reusing your password for multiple accounts, you are at risk. Once a cyber attacker gains access to your password, they can potentially gain access to all of your shared accounts. Ultimately, what you need is a strong and unique password for each of your accounts. That way, if someone gains access to the password for one of your accounts, your other accounts are still secure. Unfortunately, with so many different devices and accounts it has become almost impossible for anyone to remember their growing collection of passwords.

Click the article title to read the entire article.


September 05, 2013
Personal Backup and Recovery  

Backups are one of the most important steps you can take to protect your information. They allow you to recover your data when something goes wrong, such as hard drive failures, accidental file deletions, stolen or lost devices, or malware infections. In this issue we focus on ways that you can backup up your data and develop a strategy that’s right for you.

Click the article title to read the entire article.


August 07, 2013
Two-Step Verification  

The process of proving who you are (called authentication) is a key step to protecting your online information. You want to be sure only you have access to your private information, so you need a secure method to prove who you are, such as when you check email, purchase something online or access your bank accounts. You can prove who you are in three different ways: what you know, such as a password, what you have, such as your passport, and who you are, such as your fingerprint. Each one of these methods has its advantages and disadvantages. The most common authentication method is using what you know: passwords.

Click the article title to read the entire article.


July 03, 2013
Spear Fishing  

You may be familiar with phishing attacks. These are emails sent by cyber criminals to millions of potential victims around the world designed to fool, trick or attack them. Usually, these messages appear to come from a trusted source, such as your bank or someone you may know. The emails often have an urgent message or a deal for you that is simply too good to pass up. If you click on the link in a phishing email you may be taken to a malicious website that attempts to hack into your computer or harvest your username and password. Or perhaps the phishing email may have an infected attachment -- if you open the attachment it attempts to infect and take control of your computer. Cyber criminals send these emails to as many people as possible, knowing the more people that receive the email, the more people will likely fall victim.

Click the article title to read the entire article.


June 05, 2013
URL Shortners / QR Codes  

A Uniform Resource Locator (or URL) is nothing more than a fancy term for a website address, such as http://www.google.com. A URL is the name you type when you want to visit a website or web page. When you type a URL into your browser, your browser takes the name and resolves it into an IP address; that IP address is where the website is located on the Internet. Your browser then connects to the website and downloads the page to your browser, which you then view. The problem is cyber criminals can play a variety of tricks on you with URLs, making you think you are visiting a legitimate site when you are really visiting a different website controlled by them: one that is most likely designed to steal your information or attack your browser and infect your computer. Where you think you are going and where you are actually going can be two different things. Let’s review how a URL works, several common URL attacks and how you can protect yourself against them.

Click the article title to read the entire article.


May 07, 2013
Passwords  

Passwords are one of the primary ways we prove who we are. It is how you access your email, bank online, purchase goods and access devices such as your laptop or smartphone. In many ways, passwords are the keys to your kingdom. As a result, if someone has your password, they can steal your identity, transfer your money or access all of your personal information. Strong passwords are essential to protecting your identity and information. Let’s learn what makes a strong password and how to use them securely.

Click the article title to read the entire article.


April 04, 2013
Protecting Your Kids Online  

We all want the best for our children, including the ability to leverage technology. However, with technology come risks, risks that our children are often not aware of or prepared to deal with. As parents, it is our responsibility to ensure our children understand these risks and how to protect themselves. But this can be challenging, as we ourselves did not grow up in the same environment. In this newsletter, we explain the top three online threats to your children and how you can help them stay safe.

Click the article title to read the entire article.


April 04, 2013
Teach Children To Save

In observance of Teach Children to Save Day on April 23rd, families should communicate the value of saving money to the young people in their lives. This summer, many children and teens in the community will be working to put some extra cash in their pockets. Whether he or she is doing odd jobs around the house or working at the local golf course, it’s the perfect time to teach your child financial lessons that will last a lifetime.

Click the article title to read the entire article.

Read More

March 07, 2013
Social Networking Safely  

Social networking sites such as Facebook, Twitter, Google+, Pinterest and LinkedIn are powerful, allowing you to meet, interact and share with people around the world. However, with all these capabilities come risks; not to just you, but your family, friends and employer. In this newsletter we will discuss what these dangers are and how to use these sites more safely.

Click the article title to read the entire article.