How We Protect You
Security Reminder: Never provide personally identifiable information (Social Security Number, Account Number, etc.) in response to an e-mail. For security purposes, City Bank will not contact you for this information over the phone or through unsecured e-mail. And if we direct you to login, we will always send you to our homepage at citybankonline.com.
How does it work?
City Bank takes a layered approach to help protect your accounts and your identity.
- Every time you login to City Bank Online Banking on a new device and/or internet browser you will be asked to select an option, like a phone number or email address, to be sent a temporary secure access code.
- Once you receive and enter the temporary secure access code you can choose to register or not register the device and/or internet browser. Once a device and/or internet browser is registered you will not be asked to receive and enter a secure access code again unless you perform computer maintenance and/or have settings on your device and/or internet browser that prevents the registration from being saved.
- This process is an out-of-band method of authentication that helps protect others from logging into your account without access to the phone number(s) and/or email(s) listed.
We do not sell or share your e-mail address with third parties to use to independently market you for their products.
Protect Yourself from Identity Theft & Fraud Attacks.
- Select passwords that are not obvious. Avoid using personal information as passwords, such as your last name or birthday. Also, avoid using the same user ID and password for multiple web sites.
- Do not share your username or password with anyone, including friends and family, and never divulge this information in response to an unexpected email or phone call.
- Do not use the Save/Remember Username and Password feature of your Internet browser (Internet Explorer, Chrome, Firefox, Safari, etc.) for your Online Banking account.
- Prevent unauthorized persons from using your computer by logging off or locking your workstation when you leave the area.
Anti-Virus Software and Download Tips
- Scan any software downloaded from the internet for viruses before installation.
- Ensure your computer's operating system and software is updated on a regular basis. Consult with your company's IT professional for assistance.
- Use anti-virus and anti-malware software, and keep the software up-to-date.
Learn more about our recommended anti-virus software, Trusteer Rapport®.
In a social engineering attack, an attacker uses human interaction to manipulate a person into providing them information. People have a natural tendency to trust. Social engineering attacks attempt to exploit this tendency in order to steal your information. Once the information has been stolen it can be used to commit fraud or identity theft.
Criminals use a variety of social engineering attacks to attempt to steal information, including:
- Website Spoofing
Website spoofing is the act of creating a fake website to mislead individuals into sharing sensitive information. Spoof websites are typically made to look exactly like a legitimate website published by a trusted organization.
- Pay attention to the web address (URL) of websites. A website may look legitimate, but the URL may have a variation in spelling or use a different domain.
- If you are suspicious of a website, close it and contact the company directly.
- Do not click links on social networking sites, pop-up windows, or non-trusted websites. Links can take you to a different website than their labels indicate. Typing an address in your browser is a safer alternative.
- Only give sensitive information to websites using a secure connection. Verify the web address begins with “https://” (the “s” is for secure) rather than just “http://”.
- Avoid using websites when your browser displays certificate errors or warnings.
Phishing is when an attacker attempts to acquire information by masquerading as a trustworthy entity in an electronic communication. Phishing messages often direct the recipient to a spoof website. Phishing attacks are typically carried out through email, instant messaging, telephone calls, and text messages (SMS).
- Delete email and text messages that ask you to confirm or provide sensitive information. Legitimate companies don’t ask for sensitive information through email or text messages.
- Beware of visiting website addresses sent to you in an unsolicited message.
- Even if you feel the message is legitimate, type web addresses into your browser or use bookmarks instead of clicking links contained in messages.
- Try to independently verify any details given in the message directly with the company.
- Utilize anti-phishing features available in your email client and/or web browser.
- Utilize an email SPAM filtering solution to help prevent phishing emails from being delivered.
Browsers and Encryption
City Bank's standards are among the highest on the Internet. For accessing our secure applications, such as City Bank Online Banking, City Bank requires that your browser supports SSL and 128-bit. It is important that you regularly update your browser in order to ensure that you are protected from the latest security vulnerabilities.
Clearing Your Internet Browser's Cache and History
To ensure your privacy, we recommend that you clear the Internet browser's cache and history after visiting any City Bank web site. Internet browsing software, such as Microsoft Internet Explorer and Netscape, stores or "caches" content of web sites visited during online sessions to display pages previously viewed more quickly. Additionally, the Internet browser's history list tracks web site addresses you visit. Clearing your browser's cache and history ensures that other people using the computer (particularly public computers) do not have access to your session information.
Additional Online Business Security Tips
- Maintain appropriate internal controls, including segregation of duties. For example, have different people involved in reconciling accounts from those making payments. One important step you can take to improve your controls is by requiring one user to set-up or initiate online payments and another to approve such payments.
- Perform a periodic risk assessment and evaluation of your own internal controls, including reviews of your users and the permissions you grant them.
- Regularly review your transactions and statements to detect unauthorized activity. Details of your transactions are promptly posted and available on City Bank online. It can be very useful to monitor and control transactions--including those originating online and through other channels, such as checks you've written or withdrawals you've made.
- City Bank's Online Cash Management offers an online Positive Pay Service to help you monitor and control checks clearing against your accounts.
- There are also several internal controls you can have set up within Cash Management that add layers of security. These include:
- Automatic E-mail Notifications for initiated ACH Batches.
- IP Address Restrictions
- Access time Restrictions
I think I'm a victim.
If you suspect that your personal and/or financial information has been compromised, City Bank recommends that you call us immediately. The sooner we know what's happened, the sooner we can begin helping you. Please call us now.
- Personal Identifiable Information – such as Social Security or Tax ID #
- Debit Cards (lost or stolen)
- Online User ID's or passwords
City Bank Fraud
806-792-7101 Or 1-800-OUR-BANK
City Bank Debit Card
806-792-7101 Or 1-800-OUR-BANK
City Bank Online Banking
806-792-7101 Or 1-800-OUR-BANK
City Bank also recommends taking these additional steps to report identity theft and fraud
Notify the authorities about the identity theft and fraud
It is recommended that you file a police report where you suspect the identity theft and fraud occurred. The local police station may not have an "identity theft" report per se, but ask if you can file a "miscellaneous incident" report. It is critical that you either obtain a copy of this report or get a copy of the report's number.
You can also file a report with the Federal Trade Commission, a government agency charged with protecting consumers. Although they are not a law enforcement agency, they can share your identity theft report with law enforcement agencies for investigation purposes.
Federal Trade Commission - consumer complaints: www.consumer.gov/idtheft or 1-877-IDTHEFT
Notify your other financial institutions
Although your other accounts may not be compromised, it is recommended that you make your other financial institutions aware of your identity theft. In case your problem is more widespread than you originally thought, they can place a fraud alert on your accounts and monitor for unusual activity.
Contact the credit bureaus
There are three main credit reporting agencies in the U.S.: Equifax, Experian (formerly TRW) and TransUnion. They compile reports on an individual's credit history, such as how many credit accounts they have, the dollar amounts of these accounts, and an assessment of the individual's payment history (good or bad).
If you suspect identity theft and fraud, it is critical that you:
- Contact one of the credit reporting agencies
- Place a fraud alert with them
They will notify the other two agencies. You will receive a confirmation in the mail that a fraud alert has been placed with all three of them.