Home Contact Us
Business Banking Personal Banking Locations ATM Security Rates About Us
History Board of Directors Our Team News & Events Contact Us Hours and Holidays
News & Events

                 

 

April 04, 2014
Yes, You Actually Are A Target  

A common misconception many people have is that they are not a target for cyber crime: that they or their computers do not have any value. Nothing could be further from the truth. If you have a computer, mobile device, an online account, email address, credit card, or engage in other type of online activity, you are worth money to cyber criminals. In this newsletter we explain why you are a target, how you are being attacked, and what you can do to protect yourself.

Click the article title to read the entire article.


March 05, 2014
The End of Windows XP  

Windows XP has proven to be one of the most popular operating systems in computing history, at one point it was used on most of the computers around the world. However Windows XP is old, and all support for it from Microsoft will soon end. First released more than twelve years ago, Microsoft is scheduled to End of Life (EOL) Windows XP on April 8, 2014. This means Microsoft will no longer release any end-user updates or security patches. With approximately 25% of the world’s desktop computers still running Windows XP (only Windows 7 is more popular), millions of people will be at greater risk once this happens. Keep in mind, home users are not the only ones who will be impacted as XP is still widely used in offices, industrial control systems, ATM machines, medical systems, point-of-sale terminals, and other devices. Below we describe what the risks are once Windows XP is no longer supported and steps you can take to protect yourself.

Click the article title to read the entire article.


February 05, 2014
What is Malware  

You may have heard of terms such as virus, worm, trojan or rootkit when people discuss cyber security. These terms describe types of programs used by cyber criminals to infect and take over computers and mobile devices. Today all of these different terms are now simply called malware. In this newsletter we will explain what malware is, who is developing it, why, and what you can to do protect yourself against it.

Click the article title to read the entire article.


January 28, 2014
Securing Your Home Network  

Home networks were relatively simple several years ago, perhaps nothing more than a wireless access point and a computer or two used to surf the Internet or play games online. However, home networks have become increasingly complex. Not only are we connecting more devices to our home networks, but we are doing more things with them. In this edition we will cover some basic steps to creating a more secure home network.

Click the article title to read the entire article.


December 14, 2013
Securing Your New Tablet  

Congratulations on your new tablet. This technology is a powerful and convenient way to communicate with others, shop online, read, listen to music, game and perform a myriad of other activities. Since this new tool may become an important part of your daily life, we strongly encourage you to take some simple steps to help keep it safe and secure.

Click the article title to read the entire article.


November 06, 2013
How to Shop Online Securely  

The holiday season is close upon us and soon millions of people around world will be looking to buy the perfect gifts. Many people will choose to shop online in search of a great deal or to avoid long lines and crowds. Unfortunately, this is also the time unscrupulous websites may attempt to scam you by selling counterfeit products, stealing your credit card information or failing to deliver anything. In this newsletter we will cover some of the dangers of shopping online and ways to protect yourself.

Click the article title to read the entire article.


October 09, 2013
Password Managers  

Often, one of the first things people learn about when protecting their personal identity and information is to use strong passwords. A strong password is one that is not only difficult for cyber criminals to guess, but also resists automated hacking tools. A common rule of thumb is this: the longer and more complex your password is, the stronger and more secure it is. The problem is that strong passwords can be hard to remember. As a result, people often create a single, strong password and use that same password, or slight variations of it, for all of their online accounts, applications and devices. Even more dangerous, many people use the same password for both their personal and work accounts. If you are one of those people reusing your password for multiple accounts, you are at risk. Once a cyber attacker gains access to your password, they can potentially gain access to all of your shared accounts. Ultimately, what you need is a strong and unique password for each of your accounts. That way, if someone gains access to the password for one of your accounts, your other accounts are still secure. Unfortunately, with so many different devices and accounts it has become almost impossible for anyone to remember their growing collection of passwords.

Click the article title to read the entire article.


September 05, 2013
Personal Backup and Recovery  

Backups are one of the most important steps you can take to protect your information. They allow you to recover your data when something goes wrong, such as hard drive failures, accidental file deletions, stolen or lost devices, or malware infections. In this issue we focus on ways that you can backup up your data and develop a strategy that’s right for you.

Click the article title to read the entire article.


August 07, 2013
Two-Step Verification  

The process of proving who you are (called authentication) is a key step to protecting your online information. You want to be sure only you have access to your private information, so you need a secure method to prove who you are, such as when you check email, purchase something online or access your bank accounts. You can prove who you are in three different ways: what you know, such as a password, what you have, such as your passport, and who you are, such as your fingerprint. Each one of these methods has its advantages and disadvantages. The most common authentication method is using what you know: passwords.

Click the article title to read the entire article.


July 03, 2013
Spear Fishing  

You may be familiar with phishing attacks. These are emails sent by cyber criminals to millions of potential victims around the world designed to fool, trick or attack them. Usually, these messages appear to come from a trusted source, such as your bank or someone you may know. The emails often have an urgent message or a deal for you that is simply too good to pass up. If you click on the link in a phishing email you may be taken to a malicious website that attempts to hack into your computer or harvest your username and password. Or perhaps the phishing email may have an infected attachment -- if you open the attachment it attempts to infect and take control of your computer. Cyber criminals send these emails to as many people as possible, knowing the more people that receive the email, the more people will likely fall victim.

Click the article title to read the entire article.


June 05, 2013
URL Shortners / QR Codes  

A Uniform Resource Locator (or URL) is nothing more than a fancy term for a website address, such as http://www.google.com. A URL is the name you type when you want to visit a website or web page. When you type a URL into your browser, your browser takes the name and resolves it into an IP address; that IP address is where the website is located on the Internet. Your browser then connects to the website and downloads the page to your browser, which you then view. The problem is cyber criminals can play a variety of tricks on you with URLs, making you think you are visiting a legitimate site when you are really visiting a different website controlled by them: one that is most likely designed to steal your information or attack your browser and infect your computer. Where you think you are going and where you are actually going can be two different things. Let’s review how a URL works, several common URL attacks and how you can protect yourself against them.

Click the article title to read the entire article.


May 07, 2013
Passwords  

Passwords are one of the primary ways we prove who we are. It is how you access your email, bank online, purchase goods and access devices such as your laptop or smartphone. In many ways, passwords are the keys to your kingdom. As a result, if someone has your password, they can steal your identity, transfer your money or access all of your personal information. Strong passwords are essential to protecting your identity and information. Let’s learn what makes a strong password and how to use them securely.

Click the article title to read the entire article.


April 04, 2013
Protecting Your Kids Online  

We all want the best for our children, including the ability to leverage technology. However, with technology come risks, risks that our children are often not aware of or prepared to deal with. As parents, it is our responsibility to ensure our children understand these risks and how to protect themselves. But this can be challenging, as we ourselves did not grow up in the same environment. In this newsletter, we explain the top three online threats to your children and how you can help them stay safe.

Click the article title to read the entire article.


April 04, 2013
Teach Children To Save

In observance of Teach Children to Save Day on April 23rd, families should communicate the value of saving money to the young people in their lives. This summer, many children and teens in the community will be working to put some extra cash in their pockets. Whether he or she is doing odd jobs around the house or working at the local golf course, it’s the perfect time to teach your child financial lessons that will last a lifetime.

Click the article title to read the entire article.

Read More

March 07, 2013
Social Networking Safely  

Social networking sites such as Facebook, Twitter, Google+, Pinterest and LinkedIn are powerful, allowing you to meet, interact and share with people around the world. However, with all these capabilities come risks; not to just you, but your family, friends and employer. In this newsletter we will discuss what these dangers are and how to use these sites more safely.

Click the article title to read the entire article.


February 06, 2013
Email Phishing Attacks  

Phishing was a term originally used to describe email attacks that were designed to steal your online banking username and password. However, the term has evolved and now refers to almost any email-based attack. Phishing uses social engineering, a technique where cyber attackers attempt to fool you into taking an action. These attacks often begin with a cyber criminal sending you an email pretending to be from someone or something you know or trust, such as a friend, your bank or your favorite online store.

Click the article title to read the entire article.


February 06, 2013
All You Need is Love and a Financial Plan

It's the season of love, but before couples take the next step in their relationship, they should discuss their personal finances. Taking the next step is not only a marriage of hearts but also a marriage of finances. It's no secret that people can become blinded by love, but if you stick to a plan, your financial situation doesn't have to be impaired.

Click the article title to read the entire article.

Read More

January 10, 2013
Java  

A common method cyber attackers use to hack into computers is to develop special programs that take advantage of and exploit weaknesses in your computer’s software. These weaknesses are usually specific to one type of computer. This means the hacking tools they develop to attack Microsoft Windows computers work only on Microsoft Windows; their tools do not work on any other type of computer such as an Apple Mac, or vice versa. This limits who they can attack and how.

Click the article title to read the entire article.


December 17, 2012
Seven Steps to a Secure Computer  

While handheld devices such as smartphones and tablets provide new ways for us to leverage technology, computers are often still the primary tool we use for our professional and personal lives. As a result, your computer, whether at work or at home, still remains a primary target for cyber criminals. By following the seven simple steps outlined below, you can help secure your computer and protect it against most known attacks.

Click the article title to read the entire article.


November 28, 2012
How to Avoid a Holiday Headache  

With consumer sentiment the highest it’s been since the recession, shoppers are expected to open their wallets a bit wider this year. Will holiday spending leave shoppers in the red? Not if they plan wisely and use some common sense tips from Flagship Bank.

Click the article title to read the entire article.