Protect your personal information and finances.

Fraud Alerts

Did you know that we’ll notify you with a text or email if we suspect fraudulent transactions connected to your account? This will enable you to take action quickly to prevent further loss or damage

How do customers enroll?

We have already included you in these enhanced services as part of our fraud protection services.

Is there a charge for the fraud alerts?

U.S. consumers who have service through AT&T, Verizon, Sprint and T-Mobile will not be charged message or data rates for our fraud alerts. We absorb that cost for you!

What triggers these alerts?

Alerts are triggered by any activity identified as potential fraud.

How can I stop text messages if I don’t want to receive them any longer?

All you need to do is respond back to the text alert with the word STOP.

If I receive an alert, does that automatically block my account from further purchases?

The majority of suspected fraud accounts will be blocked, just as they are today. However, some lower risk items may not be declined.

Can I establish preferences through my mobile banking app?

Fraud alerts are not configured through our mobile banking app but rather through our fraud systems. The standard order of engagement is:

  • Email/Text
  • Voice Call

Alerts generated overnight result in an email only until calling and texting hours are available. Texts will be sent from 7am – 10pm CST. Calls will be sent from 8am – 9pm CST. Emails will be sent 24 hours. Texts and voice calls pending from the night before will be triggered the following morning at the times noted.

If I respond back that the transaction(s) are valid, will you automatically unblock my account?

Yes, though please keep in mind that it could take 5-10 minutes for a block to be removed in some situations.

Will I be sent a link or asked personal account details?

No, you will not be sent a link or asked for account details. You will only receive a text with a needed reply of YES or NO.

Email Safety

Fraudsters often attempt to gather information or infiltrate computers with dangerous files via email. Always be cautious when opening emails that are unfamiliar and watch out for these red flags.

Sender Red Flags

  • The sender’s email address isn’t someone you ordinarily communicate with.
  • The email is from someone outside your organization and it’s not related to your job responsibilities.
  • The email was sent from someone inside the organization or from a customer, vendor or partner and is very unusual or out of character.
  • The sender’s email address has a suspicious domain (like
  • The email is unexpected or unusual with an embedded hyperlink or an attachment from someone you haven’t communicated with recently.
  • You were cc’d on an email sent to one or more people, but you don’t personally know the other people it was sent to.
  • You received an email that was also sent to an unusual mix of people. For instance, it might be sent to a random group of people at your organization whose last names start with the same letter, or a whole list of unrelated addresses.
  • An email that you normally would get during regular business hours was sent at an unusual time like 3:00 am.

Subject & Content Red Flags

  • The email has a subject line that is irrelevant or does not match the message content.
  • The email message is a reply to something you never sent or requested.
  • The sender included an email attachment that was not expected or that makes no sense in relation to the email message.
  • You see an attachment with a possibly dangerous file type.
  • The sender is asking you to click on a link or open an attachment to avoid a negative consequence or to gain something of value.
  • The email is out of the ordinary, or has bad grammar or spelling errors.
  • When hovering your mouse over a hyperlink that’s displayed in the email message, the link-to address is for a different website.
  • The email only has long hyperlinks with no further information, and the rest of the email is completely blank.
  • The email has a hyperlink that is a misspelling of a known website. For instance, — the “m” is really two characters — “r” and “n.”

Security Tips for Parents

Parenting is hard enough before even considering the challenges of online security. What follows are five tips to help you meet those challenges. Obviously, every household has different needs, so view these as a generic starting point and make adjustments as necessary! 

Establish a Culture of Trust

Create a safe space where honesty won’t be punished and where kids feel
comfortable sharing their experiences. If they witness cyberbullying or
inappropriate behavior online, or accidentally share something they shouldn’t
have, we want to make sure they’ll speak up before it’s too late. Establishing a
culture of trust is the best way to gain and maintain a healthy digital presence in
your household, and it needs to start at a young age.

Explain the Risk of Social Media and Online Behavior

Just like in real life, children should be taught that their online actions come with
consequences. Posting harmful content on social media could prevent them
from getting jobs or scholarships. Sharing too many personal details could
lead to identity theft. Being a troll or a cyberbully might cause great emotional
distress for someone else. It’s imperative that our young digital citizens
understand how powerful the internet is, and that misusing that power will
carry repercussions.

Utilize Parental Control Solutions

While it’s important to respect the privacy of our children, it’s also important
to do what’s best for their safety. Parental control software allows you to
monitor internet activity, set time limits, manage contacts and messaging
apps, and a bevy of other options that can be customized to fit your
household’s needs. Additionally, consider installing antivirus software on
every device that allows it.

Set Up Separate User Accounts

Creating different user accounts allows you to control who gets
access to what on shared devices. This is particularly important on
any computers that are used by adults and young people because it
prevents children from accessing games, files, or accounts that are
reserved for mature individuals. This separation also allows you to
provide access to certain accounts on a case-by-case basis (such
as when multiple age groups share one device).

Demonstrate the Value of Screens Off

Between work, schoolwork, entertainment, and all of the other
built-in reasons to use smart devices, we are accustomed to
spending most of the day staring at screens. Unfortunately,
excessive screen time presents health risks and can deteriorate
relationships. Improve the health of your household by dedicating
blocks of time where screens are not allowed for any reason. And
this goes for parents too, who must lead by example and highlight
the importance of screen-free family time.

© 2020 Knowbe4 Inc. All rights reserved. l 

Taking Security Personally

We believe that the key to a better world (in terms of security) is education and building a culture that prioritizes awareness 24/7. With that in mind, let’s review a few fundamentals of security awareness, and how you can take them personally. 

These are just some of the security measures you should take at home. 


  • Never use the same one twice.
  • Don’t write them down.
  • Never share them.
  • Substitute traditional passwords with passphrases 


  • Still the most common way cybercriminals infiltrate.
  • Stay alert for attacks.
  • Look for red flags in emails such as bad spelling and grammer, unrealistic promises, urgent or threatening language, and unexpected links or attachments. Stop, look and think before you click that link, open that attachment or share sensitive information.
  • Remain skeptical of any request for personal information or money.

Software Updates

  • Keeping your devices and software up to date is one of the easiest ways to prevent malware infections. 
  • Many software updates patch vulnerabilities that cybercriminals use to their advantage. 
  • Stay current by enabling automatic updates wherever possible. 

Social Media

  • Double check your privacy settings and only “friend” people you know.
  • Be careful what you share publicly, the more you share with the public the bigger the target you become.
  • Be careful sharing your location details when you are away from home, such as current vacation pictures and “check-ins”.
  • Be mindful of your employers, never share your organization’s internal processes — follow your organization’s social media policy. 
  • Watch for fake profiles, never assume the security settings on social media sites will keep you safe from a fake profile attack. 
  • False Information – hackers will attempt to manipulate your thoughts and actions.  Anything that tugs at your emotions is a reg flag. 

Physical Security

  • Shred sensitive documents when no longer needed. 
  • Keep an eye on your belongings when in public areas. 
  • Ensure no one can see your screen or hear your phone calls.
  • Always lock your devices when not in use. 

ATM Safety Tips

ATMs are a great resource for your banking needs! Our ATMs offer 24/7 access to your cash needs, you can make deposits or transfers at your convenience. With all technology, you always want to use safe habits to protect your financial well-being and that includes the use of your ATM Debit Card and ATM machines.

Here’s our ATM Safety Tips for use of any banks ATM machines:

Protecting your ATM debit card

  • Always protect your ATM card and keep it in a safe place, just like you would cash, credit cards or checks.
  • Do not leave your ATM card lying around the house or on your desk at work. No one should have access to the card but you. If you’ve recently lost or had your debit card stolen, please contact our team so that we can help remedy the situation as quickly as possible. To report a lost or stolen ATM/Debit Card, please call (800) 500-1044. 
  • If lost, you can easily turn your ATM/Debit Card on / off with the free Debit Card Controls.
  • Keep your personal Identification Number (PIN) a secret. Never write it down anywhere, especially on your card. 
  • Never give any information about your ATM/Debit Cart or PIN over the telephone. For Example:  If you receive a call, supposedly from the bank wanting to verify your PIN, do not give that information. 

Using an ATM

  • Be aware of your surroundings, particularly at night. If you observe or sense suspicious persons or circumstances, do not use the machine at that time.
  • Have your ATM/debit card ready and in your hand as you approach the ATM. Don’t wait to get to the ATM and then take your card out of your wallet or purse.
  • Visually inspect the ATM for possible skimming devices. Potential indicators can include sticky residue or evidence of an adhesive used by criminals to affix the device, scratches, damaged or crooked pieces, loose or extra attachments on the card slot or noticeable resistance when pressing the keypad. 
  • Be careful that no one can see you enter your PIN at the ATM. Use your other hand or body to shield the ATM keyboard as you enter your PIN into the ATM. 
  • To keep your account information confidential, always take your receipts or transaction records with you. 
  • Do not count or visually display any money you received from the ATM. Immediately put your money into your pocket or purse  and count it later.
  • If you are using a drive-up ATM, be sure passenger windows are rolled up and all doors are locked. If you leave your car and walk to the ATM, lock your car. 

Special precautions for using an ATM at night

  • Park close to the ATM in a well-lighted area.
  • Take another person with you, if at all possible.
  • If the lights at the ATM are not working, do not use it. 
  • If shrubbery has overgrown or a tree blocks the view, select another ATM and notify your bank.