Our website brings together a combination of industry-approved security technologies to protect data for the bank and you, our customer. It features a VeriSign-issued Digital ID for the bank’s Internet Service Provider hosting our website, Secure Sockets Layer (SSL) protocol for data encryption, and a router and firewall to regulate the inflow and outflow of server traffic.
Secure Data Transfer
Once a server session is established on a secure https page, the user and the server are in a secured environment. Since the server has been certified as a 256-bit secure server by VeriSign, data traveling between the user and the server is encrypted with Secure Sockets Layer (SSL) protocol. With SSL, data that travels between the bank and customer is encrypted and can only be decrypted with the public and private key pair. In short, the bank’s server issues a public key to the end user’s browser and creates a temporary private key. These two keys are the only combination possible for that session. When the session is complete, the keys expire, and the whole process starts over when a new end user makes a server session.
Router and Firewall
Secure forms must filter through a router and firewall before they are permitted to reach the server. A router and a piece of hardware, works in conjunction with the firewall, a piece of software, to block and direct traffic coming to the server. The configuration begins by disallowing ALL traffic, and then opens holes only when necessary to process acceptable data requests such as retrieving web pages or sending customer requests to the bank.
Using the above technologies, your Internet loan application and check reorder transactions are secure.
CYBER PROTECTION FOR YOUR MOBILE DEVICE:
Treat your mobile device with the same level of care as you would for a credit card. If it is lost or stolen, and you have not protected it adequately, you may be at risk.
- Password-protect your mobile device.
- Store your mobile device in a safe place.
- Do not send confidential information in an email or text messages (e.g. Account numbers). It is important to understand that text messages are not encrypted the same way your mobile device information is. If someone gains access to your phone, they will be able to view any text messages sent or received that have not yet been deleted.
- Delete messages that contain account information including account balances and any alerts you receive on a regular basis.
- Only download information (photos, ring tones, video clips, etc.) from trusted sources.
Follow the same rules you use on your computer concerning the opening an e-mail and attachments. Similar to phishing attacks on your computer, SMiShing attacks involve fraudsters using text messages with links in them on your mobile device. The fraudsters will use these text messages in an attempt to get you to download unsuspecting software containing viruses. This will then take you to a “spoofed” or fake website that is masquerading as a TSB site and requests your account credentials (e.g. password, user ID, etc.)
- Never open or respond to a text message from someone you do not know, and proceed with caution even if it comes from someone you do know.
Install antivirus software on your mobile device. Contact your carrier for specific information on available antivirus software for your device.
If you are concerned about the sites you are accessing from your mobile device, turn on the “show URL” or “show address bar” option so that you can see the actual site addresses to ensure they start with “https.” Check the information that came with your device for specific instructions.
Important disclaimer: From time to time, we provide links to other websites for the use of our visitors, which have been compiled from internal and external sources. By clicking “Continue” below, you will be opening a new browser window and leaving our website. Although we have reviewed the websites before creating the link, however, we are not responsible for the content of the sites.
Information on linked website pages may become dated or change without notice, and we do not represent or warrant that information contained on these linked pages is complete or accurate. We suggest that you always verify information obtained from linked websites before you act upon such information.
Click here to CONTINUE… then close your browser window to return to our website.