Optimize the way you protect your personal information and finances.

Fraud Alerts

Did you know that we'll notify you with a text or email if we suspect fraudulent transactions connected to your account? This will enable you to take action quickly to prevent further loss or damage.


  1. We have already included you in these enhanced services as part of our fraud protection services.

  2. U.S. consumers who have service through AT&T, Verizon, Sprint and T-Mobile will not be charged message or data rates for our fraud alerts. We absorb that cost for you!

  3. Transactions that we have identified as potential fraud trigger the alerts.

  4. All you need to do is respond back to the text alert with the word STOP.

  5. The majority of suspected fraud accounts will be blocked, just as they are today. However, some lower risk items may not be declined.

  6. Fraud alerts are not configured through mobile app, but rather through our fraud systems. The standard order of engagement is:

      1. Email/Text
      2. Voice Call

    Alerts generated overnight result in an email only until calling and texting hours are available. Texts will be sent from 7am - 10pm CST. Calls will be sent from 8am - 9pm CST. Emails will be sent 24 hours. Texts and voice calls pending from the night before will be triggered the following morning at the times noted.

  7. Yes, though please keep in mind that it could take 5-10 minutes for a block to be removed in some situations.

  8. No, you will not be sent a link or asked for account details. You will only receive a text with a needed reply of YES or NO.

Email Safety

Fraudsters often attempt to gather information or infiltrate computers with dangerous files via email. Always be cautious when opening emails that are unfamiliar and watch out for these red flags.

  • The sender’s email address isn't someone you ordinarily communicate with.
  • The email is from someone outside your organization and it’s not related to your job responsibilities.
  • The email was sent from someone inside the organization or from a customer, vendor or partner and is very unusual or out of character.
  • The sender’s email address has a suspicious domain (like micorsoft-support.com).
  • The email is unexpected or unusual with an embedded hyperlink or an attachment from someone you haven’t communicated with recently.
  • You were cc’d on an email sent to one or more people, but you don’t personally know the other people it was sent to.
  • You received an email that was also sent to an unusual mix of people. For instance, it might be sent to a random group of people at your organization whose last names start with the same letter, or a whole list of unrelated addresses.
  • An email that you normally would get during regular business hours was sent at an unusual time like 3:00 am.
  • The email has a subject line that is irrelevant or does not match the message content.
  • The email message is a reply to something you never sent or requested.
  • The sender included an email attachment that was not expected or that makes no sense in relation to the email message.
  • You see an attachment with a possibly dangerous file type.
  • The sender is asking you to click on a link or open an attachment to avoid a negative consequence or to gain something of value.
  • The email is out of the ordinary, or has bad grammar or spelling errors.
  • When hovering your mouse over a hyperlink that’s displayed in the email message, the link-to address is for a different website.
  • The email only has long hyperlinks with no further information, and the rest of the email is completely blank.
  • The email has a hyperlink that is a misspelling of a known website. For instance, www.bankofarnerica.com — the “m” is really two characters — “r” and “n.”

Workplace Security

While it is essential to take steps to prevent phishing and avoid ransomware attacks, it is equally important to ensure you are properly managing your physical security in your place of work or business. Review these tips for optimizing the security of your work environment.

When your workplace is tidy, it is much easier to keep track of important documents or items such as keycards or badges.

Lock systems and devices with smart passwords, and ensure only authorized individuals can access sensitive information or secured areas of a building.

Be aware of your company's security policies so that you can follow and help others uphold them.

Shred or destroy documents properly so that the information cannot be stolen and misused.

Don't leave devices or information unattended in public places, and lock your vehicle when items are kept inside.

Save conversations about sensitive information for locations where details cannot easily be overheard.

Secure Data Backups

When important information is properly backed up, you can have peace of mind that the data won't be lost. Ensure you are following best practices when it comes to keeping the backups secure.

  • 3 - Have at least 3 backups of your data.
  • 2 - Store 2 backups locally.
  • 1 - Store 1 backup off-site.
  • External Hard Drives & USB Drives
  • Optical Disks
  • Servers
  • The Cloud