Relax. Your transactions truly are safe. Five Points Bank works with the leading technology partners to provide the most secure environment possible for worry-free internet banking. You can be assured of the following security measures:
Data is encrypted as it travels to and from your PC. Encryption is accomplished through "Secure Sockets Layer," the de facto standard for data encryption on the Internet. This means your sensitive financial information cannot be deciphered by unauthorized individuals.
Extended Validation SSL – Online IdentityAssurance
Extended Validation SSL Certificates were created in direct response to the rise in Internet fraud. Before customers share their confidential data online, they want proof of identification from a trusted source. Extended Validation SSL Certificates give high security web browsers information to clearly identify a website’s identity. For example, in Microsoft® Internet Explorer 7 the URL address bar will turn green on a website secured with an SSL Certificate that meets the Extended Validation Standard. A display next to the green bar will toggle between the organization name listed in the certificate and the Certificate Authority (VeriSign, for example). Firefox and Opera have announced their intention to support Extended Validation SSL in upcoming releases. Older browsers will display Extended Validation SSL Certificates with the same security symbols as existing SSL Certificates. For complete details, see VeriSign's EV SSL FAQ.
User IDs and passwords are stored on our bank's computer, isolated from the Internet, where they can never be accessed or downloaded by anyone on the Internet. In addition, because user passwords can vary from six to eight characters, the chance of randomly guessing a password is less than one in 1,000,000,000,000. (That's 1,000 billion!)
Our computer system does not connect directly to the Internet. It is isolated from the network via a "firewall" – a software and hardware product that defines, controls and limits the access that "outside" computers have to the bank's computer. This firewall subscribes to the standards set by the NCSA (National Computer Security Association). In other words, use of the firewall allows only authenticated bank customers or administrators to send or receive transactions through it.
We provide continuous monitoring and auditing of all transactions originating from or outbound to the Internet. We operate with all the rules and regulations of banking and bank security as set forth by the Federal Deposit Insurance Corporation and Federal Reserve. We are committed to working with our communications providers to produce the safest operating environment possible for our customers and will take advantage of evolving security enhancements.
financial safety credit & debit card safety
atm safety fraud alert
NOTIFY US OF INACCURATE INFORMATION WE REPORT TO CONSUMER REPORTING AGENCIES. Please notify us if we report any inaccurate information about your account(s) to a consumer reporting agency. Your written notice describing the specific inaccuracy(ies) should be sent to us at the following address: Five Points Bank 2015 N. Broadwell Ave, P.O. Box 1507, Grand Island, NE 68802-1507.
A Cybersecurity Guide for Consumers
Computer-related crimes affecting businesses and consumers are frequently in the news. While federally insured financial institutions are required to have vigorous information security programs to safeguard financial data, customers also need to know how to steer clear of fraudsters.
This guide, developed by the Federal Deposit Insurance Corporation, provides cybersecurity information for financial institutions' customers on how to protect and maintain their own computer systems.
Protect your computer - Install software that protects against malware, or malicious software, which can access a computer system without your consent to steal passwords or account numbers Also, use a firewall program to prevent unauthorized access to your computer. While protection options vary, make sure the settings allow for automatic updates.
Use the strongest method available to log into financial accounts - Use the strongest authentication offered, especially for high-risk transactions. Use passwords that are difficult to guess and keep them secret. Create "strong" user IDs and passwords for your computers, mobile devices, and online accounts by using combinations of upper- and lower-case letters, numbers, and symbols that are hard to guess and then change them regularly. Although using the same password or PIN for several accounts can be tempting, doing so means a criminal who obtains one password or PIN can log in to other accounts.
Understand Internet safety features - You can have greater confidence that a website is authentic and that it encrypts (scrambles) your information during transmission if the web address starts with "https://." Also, ensure that you are logged out of financial accounts when you complete your transactions or walk away from the computer. To learn more about additional safety steps, review your web browser's user instructions.
Be suspicious of unsolicited e-mails asking you to click on a link, download an attachment, or provide account information - It's easy for cyber criminals to copy the logo of a reputable company or organization into a phishing email. When responding to a simple request, you may be installing malware. Your safest strategy is to ignore unsolicited requests, no matter how legitimate or enticing they appear.
Be careful where and how you connect to the internet - Only access the Internet for banking or for other activities that involve personal information using your own laptop or mobile device through a known, trusted, and secure connection. A public computer, such as at a hotel business center or public library, and free Wi-Fi networks are not necessarily secure. It can be relatively easy for cyber criminals to intercept the Internet traffic in these locations.
Be careful when using social networking sites - Cyber criminals use social networking sites to gather details about individuals, such as their place or date of birth, a pet's name, their mother's maiden name, and other information that can help them figure out passwords - or how to reset them. Don't share your "page" or access to your information with anyone you don't know and trust. Cyber criminals may pretend to be your "friend" to convince you to send money or divulge personal information.
Take precautions with your mobile device(s) - Consider opting for automatic updates for your device's operating system and "apps" (applications) when they become available to help reduce your vulnerability to software problems. Never leave your mobile device unattended and use a password or other security feature to restrict access in case your device is lost or stolen. Make sure you enable the "time-out" or "auto-lock" feature that secures your mobile device when it is left unused for a certain period of time. Research any app before downloading it. Consult your financial institution's website to confirm where to download its official mobile application.
A Cybersecurity Guide for Business
Computer-related crimes affecting businesses and consumers are frequently in the news. While federally insured financial institutions are required to have vigorous information security programs to safeguard financial data, business customers also need to know how to steer clear of fraudsters.
This guide, developed by the Federal Deposit Insurance Corporation, provides cybersecurity information for financial institutions' business customers on how to protect and maintain their own computer systems.
Protect computers and networks - Install security and antivirus software that protects against malware, or malicious software, which can access a computer system without the owner’s consent for a variety of uses, including theft of information. Also, use a firewall program to prevent unauthorized access. Protection options vary, so find one that is right for the size and complexity of your business. Update the software, as appropriate, to keep it current. For example, set antivirus software to run a scan after each update. If you use a wireless (Wi-Fl) network, make sure it is secure and encrypted. Protect access to the router by using strong passwords.
Require strong authentication - Ensure that employees and other users connecting to your network use strong user IDs and passwords for computers. mobile devices, and online accounts by using combinations of upper- and lowercase letters, numbers, and symbols that are hard to guess and changed regularly. consider implementing multi-factor authentication that requires additional information beyond a password to gain access. Check with vendors that handle sensitive data to see if they offer multi-factor authentication to access systems or accounts.
Control access to data and computers and create user accounts for each employee - Take measures to limit access or use of business computers to authorized individuals. Lock up laptops when not in use as they can be easily stolen or lost. Require each employee to have a separate user account and prohibit employees from sharing accounts. Only give employees access to the specific data systems they need to do their jobs, and don’t let them install software without permission, Also, make sure that only employees who need administrative privileges, such as IT staff and key personnel, have them and regularly review their ongoing need for access.
Teach employees the basics - Establish security practices and policies for employees, such as appropriate Internet usage guidelines, and set expectations and consequences for policy violations. Establish a top-down corporate culture that stresses the importance of strong cybersecurity, especially when it comes to handling and protecting customer information and other vital data. Ensure that all employees know how to identify and report potential security incidents.
Train employees to be careful where and how they connect to the Internet - Employees and third parties should only connect to your network using a trusted and secure connection. Public computers, such as at an Internet café, hotel business centers, or a public library, may not be secure. Also, your employees shouldn’t connect to your business network if they are unsure about the wireless connection they are using. As is the case with many free Wi-Fi networks at public ‘hotspots, it can be relatively easy for cyber criminals to intercept the Internet traffic in these locations.
Patch software in a timely manner - Software vendors regularly provide patches or updates to their products to correct security flaws and improve functionality. A good practice is to download and install these software updates as soon as they are available. It may be most efficient to configure software to install such updates automatically.
Make backup copies of important systems and data - Regularly backup the data from computers used by your business. Remember to apply the same security measures, such as encryption, to your backup data that you would apply to the original. In addition to automated backups, regularly backup sensitive business data to a storage device at a secondary location that is secure.
Pay close attention to your bank accounts and watch for unauthorized withdrawals - Put in additional controls, such as confirmation calls before financial transfers are authorized with the financial institution. In recent years, there has been an increase in unauthorized electronic transfers made from bank accounts held by businesses. A common scam is an account takeover where cyber criminals use malicious software, such as keystroke loggers, to obtain the IDs and passwords for online bank accounts and then make withdrawals. Another scam called Business Email compromise, targets businesses by forging payment requests for legitimate vendors and directing the funds to the cyber criminals account. Businesses are generally not covered by federal consumer protections against unauthorized electronic funds transfers. Therefore, your financial institution may not be responsible for reimbursing losses associated with theft if negligence on the part of your business, such as unsecured computers or falling for common scams, were factors in the loss.
Don’t forget about mobile devices - Mobile devices can be a source of security challenges, especially if they hold confidential information or can access your business’s network. If your employees connect their devices to the business’s network, require them to password protect their devices, encrypt their data, and install security apps to prevent criminals from accessing the device while it is connected to public networks. Be sure to develop and enforce reporting procedures for lost or stolen equipment.
Watch out for fraudulent transactions and bills - Scams can range from payments with a worthless check or a fake credit or debit card to fraudulent returns of merchandise. Be sure you have insurance to protect against risks. Additionally, ensure that you report any irregularities immediately.
branch locations contact us