Education Center

• Create a “strong” password with at least 8 characters, includes a combination of upper and lower case letters, numbers, and special characters.
• Change your password frequently.
• Change your password if it has been compromised or if you think it may have been compromised.
• Never share usernames and password information.
• Avoid using an automatic login feature that saves usernames and passwords in browsers or programs.

• Do not use public or other unsecured computers or devices to log into Online Banking.
• Do not use public or unsecured Wi-Fi connections
• If possible, always use a Virtual Private Network (VPN).
• Check your last login date/time every time you log in.
• Review account balances and detail transactions daily to confirm payment and other transaction data.
• Immediately report any suspicious transactions to your financial institution.
• View transfer history available through viewing account activity information.
• Whenever possible, use Bill Pay instead of checks to limit account number exposure and to obtain better electronic records
• Take advantage of and regularly view system alerts. For example, balance alerts, transfer alerts, password change alerts, and ACH alerts if you use a cash management system.
• Do not use account numbers, social security numbers or other account or personal information when creating account nicknames or other titles.
• If possible, register your computer or device to avoid having to re-enter challenge questions and other authentication information with each login.
• Review historical reporting features of you online banking application on a regular basis to confirm payment and other transactional data.
• Never leave a computer unattended while using Online Banking.
• Never conduct banking transactions while multiple browsers are open on your computer.
• Take advantage of transaction limits.
• Ensure you log off to close the connections with the financial organization you are logged into.
• Use separate accounts for electronic and paper transactions to simplify monitoring and tracking any discrepancies.

• Use limits provided for monetary transactions.
• Review historical and audit reports regularly to confirm transaction activity.
• Utilize available alerts for funds transfer activity.