Cybersecurity Awareness

First National Bank has joined the cyber security cause to help keep you safe online. Knowledge is the best attack deterrent, so check out our cyber security tips.

Examine Your Credit Report Regularly

Make sure to verify your credit reports at least annually to ensure that all accounts that exist, in your name, are valid. Check all three major agencies:

  • Equifax (1-800-525-6285)
  • Experian (1-888-397-3742)
  • TransUnions (1-800-680-7289)

*Other websites may offer free reports, but many of them require you purchase monitoring services; they also do not have the ability to fix incorrect information.

You can also request that a phone call be placed before any credit can be obtained by contacting the major credit agencies listed above. This can seriously deter cyber criminals from obtaining your identity, but it will also mean that you will have to validate all credit inquiries and may not have access to your line of credit right away.

Shred/Secure all personal information

Most criminals can get all the information they need just by going through your trash! Make sure that you shred all personal identifying information before you place it into your trash bins. Keep important documents like statements, tax paperwork, and credit reports filed away in a locked storage container.

Watch your mail

Anyone can easily access your personal information from the mail. Monitor your mail by sending outgoing letters through the post office or an official mail box instead of your home mail box. Consider purchasing a locked mail box. You can also choose not to receive some pre-approved credit offers by calling 1-888-5OPT-OUT.

Watch Out for Fraudulent E-mails

The emails and texts you receive may look official but they could be fake. Never click on a link or respond to an email or text with personal information — credit card numbers Social Security numbers or other banking details instead contact the company directly or visit online by typing the company web address into your Internet browser.

Choose Passwords Carefully

Create passwords that are easy to remember, but difficult for others to guess, and change them every few months. The best passwords are a minimum of eight characters, contain a mix of letters, numbers, spaces, and symbols, and use words that are not common. Never use the same password for banking as you do for other sites, such as social media or email.

Update Your Security Questions

Security questions can be used as a method of multi-factor authentication (MFA), in addition to your username and password. They can also be used to verify your identity if you have forgotten your password. Updating the answers to your security questions on a regular basis is a good practice, though seldom required.

Honest answers to many security questions are based on publicly discoverable facts. Questions such as your mother’s maiden name and where you went on your honeymoon may be known to others or easily found on social media. Ask yourself how hard it would be for someone to locate this information about you. If you choose these types of questions, consider providing a fictitious answer or typing your answer in a complete sentence.

A strong security answer is something about you that is not well-known or discoverable. Security phrases are even better than simple answers. Create your security answer with the same level of complexity that you would use for a secure password.

Be Careful About What You Share Online

Personal information shared on social networking sites like Facebook, Twitter, and LinkedIn can be used by criminals to commit fraud. Never post key information such as where you bank, how you invest your money, physical addresses, emails, cell phone numbers, account numbers, or passwords.

Guard Your Mobile Device

Your cell phone contains valuable personal information. Secure it with a password, and be sure to wipe it clean before trading it in for a new model. Be careful of scanning QR codes, as they may direct you to a fraudulent site.

Protect your device with a strong password or thumbprint and keep it locked when not in use. Keep your mobile security software, web browser, operating system, and apps up-to-date. Enable automatic updates, if possible.

Download apps only from the official app store for your device, such as the Apple Store or Google Play.
Install a security application or enable your smartphone’s capability to remotely locate or wipe your device in the event that it is lost or stolen.

Disable Bluetooth when not in use

Do not open attachments or click on links in emails or text messages if you are unsure of the source. If in doubt, verify with the sender before opening or clicking. Exercise caution, even if it appears to be legitimate.

Look for “https://” when banking, shopping, or transmitting sensitive personal information online. “Http://” is not secure.

You can add your mobile phone to the “Do Not Call” list at

Avoid Banking from Public Wi-Fi Hotspots

The Wi-Fi available at many public locations may not be secure. Be cautious about the sites you visit and the information you release.

Keep Security Software up to Date

PCs, laptops, smartphones, tablets, and other web-enabled devices need the most current protection from viruses, malware, and other online threats. Maintaining the latest security software, web browser, and operating system is your best defense.

Social Media

Never use the same password for banking as you do for social media or email. Be careful what you share online. Information shared on social networking sites like this one can be used by criminals to commit fraud or other crimes. Never post information about where and how you bank or when you are away on vacation.
How to know if you are being Phished or Pharmed, both attacks are attempts to get your user names and passwords, but they are not the same.

How to Spot Phishing

  • Getting asked for personal information via email.
  • Receiving an email that offers something too good to be true.
  • Do you see misspelled words or words in ALL CAPS?
  • Or it just doesn’t look like normal company correspondence.
  • Does the email contain an attachment?

How Pharming Works

In a pharming scam, traffic intended for one website is redirected to a fraudulent online address. You can unknowingly become part of a pharming fraud in one of two ways:

  • You can be “pharmed” by visiting unfamiliar websites where hackers alter the host files on your computer while you’re visiting.
  • You can also be pharmed if a server connected to your computer is compromised and allows your personal online account information to be hacked.

Recovering from Identity Theft

If you have already been a victim, there are several steps to take to help get your credit back on track. Begin the following process as soon as you find that your identity has been used fraudulently:

  • Immediately cancel all open credit accounts and bank accounts; inform the institutions that your identity has been compromised and that you need to establish new account numbers for all accounts as soon as possible.
  • Contact the three Major credit agencies (listed above) immediately to obtain a copy of your reports. Review them for all unlawful uses of your credit and report them. Request a fraud alert be established on your reports until the situation is resolved.
  • Request copies of all fruadulently acquired credit accounts for a police file. Many times people know the person who unlawfully used their identity and are able to identify them by their signature.
  • Document all correspondence and action taken during your investigation. It it is not resolved to your satisfaction, fill out a complaint on the Federal Trade Commission's website