Security and Fraud
Here at Ann Arbor State Bank we handle privacy and the security of your financial data with the utmost care. We encourage you to use the following practices to protect your financial data from scams and identity theft.
Most Ann Arbor State Bank customers take advantage of our online banking services. Working together we can help ensure your financial information stays protected. Please consider the following online security tips.
Update your online banking password regularly
This is probably the easiest precaution you can take. While changing your password is not required we strongly recommend you change it on a regular basis. This will help keep your accounts secure should someone obtain your user ID and/or password.
Secure password guidelines
- Choose a unique password that would be difficult to guess
- Choose one that is at least 10 characters in length consisting of upper- and lower-case letters, numeric characters, and special characters
- Never share your password with anyone else
To change your password
- Login to online banking
- Select the ‘Options’ tab
- Select ‘Personal Data’
- Enter current and new password and submit
Verify your last login date
Your most recent login date and time appears under “Customer Summary Information” on the startup page when you log into your account. If this date doesn’t correspond to the last time you remember logging into your account, please call us immediately at (734) 761-1475.
Beware of misleading emails
Ann Arbor State Bank never solicits account information through email. Hackers will attempt to get personal information by sending you emails asking for verification of account information. These deceptive messages might claim your bank account has been closed due to fraudulent activity or that it needs to be verified. If you receive an email of this nature do not open the attached files, and do not provide any personal information.
If you receive an email from anyone requesting personal or account information, please treat it as fraudulent and call us at (734) 761-1475.
Install a firewall
A firewall is your computer’s first line of defense because it protects your machine from intruders. A firewall is a software program that guards the entrance to your private network and keeps out unauthorized and unwanted traffic. It acts as a buffer between your computer and the Internet.
Most firewall programs allow you to set the level of security protection you desire. We suggest starting with the highest protection setting and then relaxing them as necessary. You should also be able to select from features such as email attachment protection, advertisement blocking, popup-window protection, and other automatic functions.
If you’re unsure whether you have a firewall or not, consult with your Internet service provider (ISP), such as Comcast, Time Warner, or AT&T.
Use anti-virus software
Anti-virus software protects your computer against viruses, which are unauthorized computer scripts that attach to a program or portions of a computer system. Viruses reproduce and spread from one computer to another destroying stored information and interrupting operations. An anti-virus program can detect and destroy these unauthorized codes. With new viruses emerging daily, you need to have your anti-virus program updated regularly. Software manufacturers often sell their anti-virus programs with their firewall as a package since the components work better together.
Use anti-spyware software
Spyware is a software program that aids in gathering information electronically about people or organizations without their knowledge or consent. It then relays that information to an unauthorized third party. Users most often open the door to spyware unwittingly by downloading free software indiscriminately or by clicking on popups or dialogue boxes.
Some kinds of spyware will redirect your browser to a new home page (not of your choosing). Others generate multiple popup ads that can make web surfing a chore. Another type of spyware, known as a keystroke logger, can cause the most damage, because this type of program records a copy of each character you type (such as user names and passwords to secure websites) and sends that information to an unauthorized party who can then steal your personal information.
Read your user licensing agreements
It’s possible for you to inadvertently agree to accept spyware with a program you’re downloading. So be sure to thoroughly read any agreement included with applications or software you’re about to install. Complete the installation only if you recognize the additional programs included and you know they are safe. Always deal with companies you know or that are recommended by others you trust.
Examine browser security settings
Make sure the security settings in your browser (Internet Explorer, for example) are set to provide an appropriate level of protection. Browser-based attacks can occur when a user visits a web page containing hidden code intended to sabotage a computer or compromise your privacy. Use the ‘Help’ feature of your Internet browser to familiarize yourself with the security features available for your particular browser, or visit the browser manufacturer’s website for more information.
To edit your security settings in Internet Explorer
- Click on ‘Tools’ in the main menu bar
- Select ‘Internet Options’ from the pull-down menu
- Select ‘Security’
Take advantage of security updates
Your Internet browser software manufacturer (for example, Microsoft – Internet Explorer) and your operating system manufacturer (for example, Microsoft – Windows 8.1) periodically issue security updates. These updates are often include patch holes that previously allowed viruses to get through. Many reputable software manufacturers dedicate sections of their websites to security updates of this kind. If you don’t utilize automatic update mechanisms in your software it’s a good idea to visit the manufacturers’ websites regularly to make sure you have the latest fixes.
Use a computer that is secured at all times, even when traveling
Even if you follow all the steps outlined here for your home computer, none of it will matter if you use a different computer that isn’t secured. Be especially aware of this if you’re traveling, for instance, or whenever you’re using a work or personal computer that you typically don’t use. If you must use a computer other than your own, first make sure that it has all of the items on this checklist installed and updated on its system. For the same reasons it’s also recommended you avoid letting unfamiliar people have access to your computer. Whenever you’re not using the Internet, we recommend disconnecting your Internet access.