Our website brings together a combination of industry-approved security technologies to protect data for the bank and for you, our customer. It features a VeriSign-issued Digital ID for the bank’s Internet Service Provider hosting our website, Secure Sockets Layer (SSL) protocol for data encryption, and a router and firewall to regulate the inflow and outflow of server traffic.
WHAT DOES MORGAN FEDERAL BANK DO TO PROTECT YOU AND YOUR ACCOUNT?
- Multifactor authentication (MFA) when accessing our website:
- We use more than one form of authentication to verify the legitimacy of a transaction.
- Site-to-user feature when accessing our website:
- A security enhancement that confirms that you are logging in to our legitimate website. You choose a unique image and phrase known only to you.
- Red-Flag Compliance:
- We comply with the Identity Theft Prevention (Red Flag) Regulations of the Fair and Accurate Credit Transactions Act. We have developed a program and strategies that identify patterns, practices, and specific forms of activity that indicate the possible existence of identity theft for all accounts.
- When you make any essential changes to your account, such as an address change, for example, we will request specific information about you to verify your identity before any changes are made.
- We stay in contact with our customers regarding suspicious activity associated with any of their accounts.
- Secure Data Transfer:
- Our server has been certified as a 128-bit secure server by VeriSign and is encrypted with Secure Sockets Layer (SSL) protocol.
- Routers and Firewalls:
- Secure forms filter through a router and firewall before they are permitted to reach the server.
WHAT IS IDENTITY THEFT?
Identity theft occurs when someone acquires confidential information of another individual’s identity, such as their name, date of birth, or social security number with the intent to commit fraud. Using stolen information, criminals impersonate their victims for personal gain.
HOW DOES IDENTITY THEFT OCCUR?
Identity theft can potentially happen to anyone, at any time, regardless of Internet use. Identity theft can happen most commonly by fraudulent emails, pretext telephone calls, and “dumpster diving.”
WHAT CAN YOU DO TO PREVENT IDENTITY THEFT AND AVOID BEING A VICTIM?
You can’t control whether you will become a target of identity theft, but there are certain steps you can take to help prevent it:
- Secure your bank account:
- Review all of your account statements and ask about anything suspicious.
- Report lost or stolen checks immediately.
- Avoid printing your Social Security or driver’s license numbers on your checks.
- Use Online Banking to monitor your accounts often.
- Secure your debit and credit cards:
- Never write down or share your PIN with anyone.
- If possible, use signature based transactions.
- Do not give your card numbers through email.
- Do not give your card numbers over the phone unless you have initiated the call or know who you’re dealing with.
- Keep all your cards in a safe and secure location.
- Cancel and destroy unused cards.
- Securely dispose of any transaction receipts.
- When making online purchases, make sure the site is adequately secured with the “secure transaction” symbol (“lock” icon) at the bottom right-hand corner of the web browser window or look for https:// in the address bar of the website.
- Always log off from any website after you have made a transaction.
- Secure your ATM transactions:
- Be vigilant about your surroundings.
- Never allow strangers to assist you with ATM transactions.
- Ensure that no one sees your PIN when you enter it.
- After your transaction is complete, remember to remove your card, cash and any printed documents.
- Helpful tips you can use to keep your computer – and the personal information it stores – safe:
- Update virus protection software frequently.
- Do not open files, click on hyperlinks or download programs sent to you from people you don’t know.
- Use a firewall, especially if you use a high-speed Internet connection, which allows you to stop uninvited access to your computer.
- Use a secure browser.
- Do not store personal information on your laptop.
- Use “strong” passwords that contain a combination of letters (upper and lower case), numbers and symbols (the longer the stronger).
- Before you dispose of a computer or disk, delete all stored personal information. Use a “wipe” utility program to overwrite the entire hard drive. Deleting files using the keyboard or mouse commands or reformatting your hard drive may not be enough.