Internet Banking Login

User Id:

 

FDIC Equal Housing Lender

Email Us

Privacy Policy

 
Security Awareness Tip Of The Day Provided By SANS

Kids and Screenshots August 10, 2017
If you have kids with mobile devices, create a central home charging station in a place like your bedroom. Before the kids go to bed at night, have them put their mobile devices there so they are not tempted to play with them when they should be sleeping.
Detecting Fraud August 9, 2017
Review your bank, credit card and financial statements regularly to identify unauthorized activity. This is one of the most effective ways to quickly detect if your bank account, credit card or identity has been compromised.
Kids and Education August 8, 2017
One of the most effective methods you can use to protect kids online is to talk to them. The younger you start talking to them, and they to you, the better. Hold regular conversations about online safety issues, even going so far as to show them actual negative events that have taken place. If you don't know what your kids are doing, simply ask. Play the clueless parent and ask them to show you what the latest technologies are and how they use them. Quite often, kids love the idea of being the teacher and will open up.
Social Media Postings August 7, 2017
Be careful: the more information you post online about yourself, the easier it is for a cyber attacker to target you and create custom attacks against you or your organization.
Security Technology Cannot Stop All Attacks August 4, 2017
Technology alone cannot protect you. Bad guys are constantly developing new ways to get past firewalls, anti-virus and filters. You are the best defense against any attacker.

Don't Lose That Device July 27, 2017
Did you know that according to the Verizon DBIR team, you are 16 times more likely to lose a laptop or mobile devices than have it stolen? When you are traveling, always double-check to make sure you have your mobile device with you, such as when you finish going through airport security, leave your taxi or check out of your hotel.
Conversations July 26, 2017
When traveling, it is very easy to forget where you are when discussing business with colleagues. That airport, taxi, restaurant or hotel lobby may have individuals nearby eavesdropping on your conversation. When discussing confidential information, agree to hold off on the conversation until you can be assured of privacy. Also, be careful not to share sensitive information with strangers you meet.
Go With Passphrases July 25, 2017
Passphrases are the strongest type of passwords and the easiest to remember. Simply use an entire sentence for your password, such as "What time is coffee?" By using spaces and punctuation, you create a long password that is hard to guess but easy to remember.
Plugins July 24, 2017
Every plugin or add-on you install in your browser can expose you to more danger. Only install the plugins you need and make sure they are always current. If you no longer need a plugin, disable or remove it from your browser via your browser's plugin preferences.
Email Auto-Complete July 21, 2017
Be careful with email auto-complete. This is an email feature that automatically completes a name for you when you begin typing it in the TO field. However, your email client can easily complete the wrong name for you. If you are emailing anything sensitive, always be sure to check the TO field a second time before hitting the send button.

Securely Deleting Files July 13, 2017
When you delete a file, that file is actually still on your computer. The only way you can truly and securely remove a file is by wiping it or using some type of secure deletion.
Trust Your Instincts July 12, 2017
Ultimately, common sense is your best protection. If an email, phone call or online message seems odd, suspicious or too good to be true, it may be an attack.
Major News Events July 10, 2017
When a major news event happens, cyber criminals will take advantage of the incident and send phishing emails with a subject line related to the event. These phishing emails often include a link to malicious websites, an infected attachment or are a scam designed to trick you out of your money.
Reporting an Incident July 7, 2017
Eventually, we all get hacked. The bad guys are very persistent and we can all make a mistake. If a phone call from the "Help Desk" doesn't sound quite right, if an email seems suspicious or if a program you installed starts acting funny, ask for help! Your security team is there to help you. The sooner you report an incident, the sooner we can help resolve the problem.
You Are a Target July 6, 2017
You may not realize it, but you are a target. Your computer, your work and personal accounts and your information are all highly valuable to cyber criminals. Be mindful that bad guys are out to get you.

Shopping Online June 29, 2017
When shopping online, always use your credit cards instead of a debit card. If any fraud happens, it is far easier to recover your money from a credit card transaction. Gift cards and one-time-use credit card numbers are even more secure.
CEO Fraud June 28, 2017
CEO Fraud is a type of targeted attack. It commonly involves a cyber criminally pretending to be your boss, then tricking or fooling you into sending the criminal highly sensitive information or initiating a wire transfer. Be highly suspicious of any emails demanding immediate action and/or asking you to bypass any security procedures.
Two-Step Verification June 27, 2017
Two-step verification is one of the best steps you can take to secure any account. Two-step verification is when you require both a password and code sent to or generated by your mobile device. Examples of services that support two-step verification include Gmail, Dropbox and Twitter.
Kids and Mobile Devices June 26, 2017
If you have kids with mobile devices, create a central home charging station in your bedroom. Before the kids go to bed at night, have them put their mobile devices there so they are not tempted to play with them when they should be sleeping.
Back up Your Files June 23, 2017
Eventually, we all have an accident or get hacked. And when we do, backups are often the only way to recover. Backups are cheap and easy; make sure you are backing up all of your personal information (such as family photos) on a regular basis.

Reporting an Incident June 15, 2017
Eventually, we all get hacked. The bad guys are very persistent and we can all make a mistake. If a phone call from the "Help Desk" doesn't sound quite right, if an email seems suspicious or if a program you installed starts acting funny, ask for help! Your security team is there to help you. The sooner you report an incident, the sooner we can help resolve the problem.
Browse With Encryption June 14, 2017
When browsing online, encrypting your online activities is one of the best ways to protect yourself. Make sure your online connection is encrypted by making sure HTTPS is in the website address and that there is a green lock next to it.
Social Media Postings June 13, 2017
Be careful: the more information you post online about yourself, the easier it is for a cyber attacker to target you and create custom attacks against you or your organization.
Kids and Education June 12, 2017
One of the most effective methods you can use to protect kids online is to talk to them. The younger you start talking to them, and they to you, the better. Hold regular conversations about online safety issues, even going so far as to show them actual negative events that have taken place. If you don't know what your kids are doing, simply ask. Play the clueless parent and ask them to show you what the latest technologies are and how they use them. Quite often, kids love the idea of being the teacher and will open up.
Plugins June 9, 2017
Every plugin or add-on you install in your browser can expose you to more danger. Only install the plugins you need and make sure they are always current. If you no longer need a plugin, disable or remove it from your browser via your browser's plugin preferences.

Kids and Screenshots June 1, 2017
If you have kids with mobile devices, create a central home charging station in a place like your bedroom. Before the kids go to bed at night, have them put their mobile devices there so they are not tempted to play with them when they should be sleeping.

Use Caution Opening Email Attachments May 31, 2017
A common method cyber criminals use to hack into people's computers is to send them emails with infected attachments. People are tricked into opening these attachments because they appear to come from someone or something they know and trust. Only open email attachments that you were expecting. Not sure about an email? Call the person to confirm they sent it.

Shopping Online May 30, 2017
When shopping online, always use your credit cards instead of a debit card. If any fraud happens, it is far easier to recover your money from a credit card transaction. Gift cards and one-time-use credit card numbers are even more secure.

Trust Your Instincts May 29, 2017
Ultimately, common sense is your best protection. If an email, phone call or online message seems odd, suspicious or too good to be true, it may be an attack.

Cloud Security May 26, 2017
One of the most effective steps you can take to protect your cloud account is to make sure you are using two-step verification. In addition, always be sure you know exactly whom you are sharing files with. It is very easy to accidently share your files with the entire Internet when you think you are only sharing them with specific individuals.

Email and Emotions
Never send an email when you are angry; you will most likely regret it later. Instead, when you are emotional and want to reply to someone, open up an email and write everything you feel, but do not send it. (Be sure there is no name in the TO field so that you do not accidently send it.) After you have vented, save the email and come back an hour later. You only want to reply to any type of emotional situation after you have had time to cool down.


Protecting Your Social Media Account
Bad guys are targeting your social media accounts. One of the most effective ways you can protect them is with a unique, strong password called a passphrase. Enabling two-step verification (if your social media site offers it) is even better.


Unique Passwords
Make sure each of your accounts has a separate, unique password. Can't remember all of your passwords/passphrases? Consider using a password manager to securely store all of them for you.


Kids and Mobile Devices
If you have kids with mobile devices, create a central home charging station in your bedroom. Before the kids go to bed at night, have them put their mobile devices there so they are not tempted to play with them when they should be sleeping.


If You Are a Victim of Identity Theft
Report any identity theft immediately by following these steps: Contact the three major credit bureaus and have them place a fraud alert on your credit report.If a credit card was involved, contact the credit card company and have a new credit card with a new number issued. Contact your local law enforcement agency and file a report. File a complaint with the Federal Trade Commission. Document all conversations so you know whom you spoke to and when.

A common method cyber criminals use to hack into people's computers is to send them emails with infected attachments. People are tricked into opening these attachments because they appear to come from someone or something they know and trust. Only open email attachments that you were expecting. Not sure about an email? Call the person to confirm they sent it.


If you have kids with mobile devices, create a central home charging station in a place like your bedroom. Before the kids go to bed at night, have them put their mobile devices there so they are not tempted to play with them when they should be sleeping.


When you delete a file, that file is actually still on your computer. The only way you can truly and securely remove a file is by wiping it or using some type of secure deletion.


Eventually, we all have an accident or get hacked. And when we do, backups are often the only way to recover. Backups are cheap and easy; make sure you are backing up all of your personal information (such as family photos) on a regular basis.


Never send an email when you are angry; you will most likely regret it later. Instead, when you are emotional and want to reply to someone, open up an email and write everything you feel, but do not send it. (Be sure there is no name in the TO field so that you do not accidently send it.) After you have vented, save the email and come back an hour later. You only want to reply to any type of emotional situation after you have had time to cool down.

Malware is software--a computer program--used to perform malicious actions. In fact, the term malware is a combination of the words malicious and software. Cyber criminals install malware on your computers or devices to gain control over them or gain access to what they contain. Once installed, these attackers can use malware to spy on your online activities, steal your passwords and files, or use your system to attack others.


A password is only as secure as the computer or network it is used on. As such, never log in to a sensitive account from a public computer, such as computers in a cyber cafe, hotel lobby or conference hall. Bad guys target public computers such as these and infect them on purpose. The moment you type your password on an infected computer, these cyber criminals can harvest your passwords. If you have no choice but to use a public computer, change your password at the next available opportunity you have access to a trusted computer.


Do you plan on giving away or selling one of your older mobile devices? Make sure you wipe or reset your device before disposing of it. If you don't, the next person who owns it will have access to all of your accounts and personal information.

New MasterCard Liability
CFPB Helps Assisted Living and Nursing Facilities Protect Seniors from Financial Abuse

The Consumer Financial Protection Bureau (CFPB) released a guide to help assisted living and nursing facility staff better protect the people in their care by preventing and addressing financial abuse and scams. The guide helps staff recognize, record, and report financial mistreatment by family members or other trusted people handling the finances of an incapacitated adult. The guide also addresses prevention of a wide variety of financial exploitation and scams.  "http://www.consumerfinance.gov/newsroom/cfpb-helps-assisted-living-and-nursing-facilities-protect-seniors-from-financial-abuse/"

Be aware of a new Cashnet Payday loan email scam!

"http://dfi.wa.gov/consumers/alerts/cashnet-payday.htm"

These scammer will email you a letter stating you owe a payday loan plus fees and that you will be prosecuted if you do not pay it. If you have not taken out any payday loans please do not respond to the emails and report it to Templeton Savings Bank. Please refer to the links above for more information on the scam.

Important News for our Online Banking users!
Beginning May 19, your Image & Pass Phrase will no longer be displayed when you log in to Online Banking.
We’re making it easier for you to access your account online, while continuing to protect you and your money with our powerful, multilayered security system.
Be aware of a new phone Scam!!!!!!!!
Scam details: You will receive a phone call from someone claiming to your Grandchild. They will say that they are in trouble with the law and need money to get out of jail. They may even know your grandchild's name. Do not give these callers any of your customer information.
Monitor your account!!!!
Nationally there has been in increase in debit and credit card fraud. Please monitor your checking and savings accounts and let us know if you notice any unauthorized activity.
NOTICE OF EXPIRATION OF THE TEMPORARY FULL FDIC INSURANCE COVERAGE FOR NONINTEREST-BEARING TRANSACTION ACCOUNTS

By operation of federal law, beginning January 1, 2013, funds deposited in a noninterest-bearing transaction account (including an Interest on Lawyer Trust Account) no longer will receive unlimited deposit insurance coverage by the Federal Deposit Insurance Corporation (FDIC). Beginning January 1, 2013, all of a depositor's accounts at an insured depository institution, including all noninterest-bearing transaction accounts, will be insured by the FDIC up to the standard maximum deposit insurance amount ($250,000), for each deposit insurance ownership category.

For more information about FDIC insurance coverage of noninterest-bearing transaction accounts, visit "http://www.fdic.gov/deposit/deposits/"

Debit Card Protection

Debit card fraud is on the increase. At Templeton Savings Bank, we are working hard to protect your debit card from fraud. We have teamed up with Shazam to offer Shazam Falcon Fraud protection. This system monitors debit card transactions as they occur and alerts SHAZAM fraud staff to those transactions with the greatest likelihood of fraud. You may receive a phone call in the future from a SHAZAM Fraud Specialist, or an employee of Templeton Savings Bank to verify a transaction. If they can not reach you, there may be a temporary block put on your card. Call SHAZAM 24/7 at 866-508-2693 if your card is subjected to a temporary block due to suspected fraud.

This program will be most effective if:

  • we have your current cell/home phone numbers on file to reach you if needed.
  • you have the SHAZAM number, 866-508-2693 with you to call in case your card is subjected to a temporary block.
  • you please let the bank know of travel plans that might include debit card use. (Debit card transactions made at locations out of the ordinary area are a red flag for possible fraud.) So if you are going away on business or vacation, give us a call so we can update your record.

Please contact John Horbach (712)669-3322 with any questions or concerns on this matter.

KIDS: Check out the US Mint's Website. Click the link below to start the fun:
"http://www.usmint.gov/kids/"
Our Internet Banking Service Provider has received an increased number of reported phishing attempts targeting the Internet Banking solution. The phishing has had these tendencies:

• The login process is modified by adding a Web page stating that computer cannot be identified, and that the user is required to enter credit card information to continue.
• The page that requests the user data does appear to originate from our Internet Banking site with the correct URL and certificate information. However, this page is generated by malware installed on the local computer and not from the Internet Banking site. Fiserv’s Internet Banking servers remain secure.
• This malware was most likely installed from an opened e-mail attachment or a compromised website viewed on the infected computers of your bank customers using Internet Banking.

Internet Banking WILL NOT ask customers to enter personal or account info during the login process. DO NOT enter sensitive information if prompted. All computers accessing Internet Banking should have anti-virus and anti-malware installed.

Possible Phishing or Spear Phishing Attacks

Once scammers know their victims’ names and email addresses, along with the companies the customers do business with, the scammers can craft very targeted email attacks that attempt to trick victims into revealing more sensitive information (for example: passwords or account numbers). Phishing and spear phishing are defined below.

 

Phishing – This fraud scheme refers to emails sent to your cardholders by fraudsters known as “phishers.” This fraud is designed to trick cardholders into providing personal banking information. Phishers attempt fraudulent transactions when they have the basic personal identity or account information that a cardholder provided to them through a fraudulent email.

Spear phishing – This is an email-spoofing fraud attempt that targets a specific person by name, seeking to gain confidential data. As with the email messages used in regular phishing, spear phishing messages appear to come from a trusted source.

Beware of Smishing
In computing, Smishing is a form of criminal activity using social engineering techniques similar to phishing. The name is derived from "SMs phISHING". SMS (Short Message Service) is the technology used for text messages on cell phones. Similar to phishing, smishing uses cell phone text messages to deliver the "bait" to get you to divulge your personal information. The "hook" (the method used to actually "capture" your information) in the text message may be a web site URL, however it has become more common to see a phone number that connects to automated voice response system. Templeton Savings Bank will not send you any text messages on your cell phone.