UMB has no higher priority than protecting the security and privacy of your financial information. We maintain physical, electronic, and procedural safeguards that comply with federal standards to protect your personal information. Fraud and identity theft are growing every day, and UMB wants to help you protect yourself against crimes targeting UMB consumers and businesses. The following information is provided to help you protect yourself from becoming a victim. If you believe you are already a victim of Identity Theft, please refer to Identity Theft for more information.
REPORT SUSPICIOUS ACTIVITY
If you notice suspicious activity on your account(s) or experience security-related events such as a suspicious call, email, letter, or other similar contact, please call United Mississippi Bank at 601.492.2100 or 877.709.7070 for assistance.
Protect yourself by controlling your risks. Please be mindful of the following helpful tips when using any online/mobile services.
Password Security Tips
- Do not share your User IDs, Passwords and PINs with anyone. Safeguard your User ID, Password and PIN information—never leave the information in an unsecured location.
- Create a unique User ID and Password for each. Do not use the same identifying information on multiple websites.
- Create strong User IDs and Passwords. In other words, use upper case letter(s), lower case letter(s), number(s), and special character(s) (!@#$%^&*).
- Refrain from using sensitive information in your passwords, such as your birth date, social security or TIN number, first and/or last name or phone number. Do not use your username as your password.
- Many websites force password changes (i.e. every 180 days). If a website does not do so, take the initiative and change your password on a regular basis.
- Do not enable auto-fill or save User IDs or Passwords for sites.
Website Security Tips
- Secure websites have a web address that includes an "s" (https rather than http). If you do not see an "s" there, the site is not secure. Do not log in or conduct business on the site.
- Log Off from a website; do not just close the page or "X" out.
- If a website displays a security monitor, verify it has the current date. If it does not, do not use the site. It may be spoofed or hijacked.
- Monitor your account activity. View account activity online on a regular basis and review periodic account statements (monthly and/or quarterly) and reconcile them to your personal records.
- When completing financial transactions, verify encryption and other security methods are in place to protect your account and personal information.
- Watch for copycat websites that deliberately use a name or web address very similar to, but not the same as, that of the real financial institution or business.
- Use social media sites wisely, and don’t reveal too much information.
Computer / Network Security Tips
- Use quality security monitoring software on your PC that includes anti-virus, anti-malware and firewall functions.
- Use your PCs security features such as individual Log-In accounts.
- Keep your PCs operating system security up-to-date by applying patches and updates as soon as they become available.
- Password-protect your computer network (physical or wireless).
Mobile Device Security Tips
Be aware that a mobile device has the same potential cyber threats (i.e.: keylogging, malware, etc.) as a computer/network, so all of the security measures referenced herein should also be applied to your mobile device.
- Use quality security monitoring apps on your mobile device that include anti-virus, anti-malware, and VPN/firewall functions.
- Research any application (app) before you download it. Fraudulent apps are often designed with names that look like real apps. It is best if you access an app using a link from the provider’s website.
- Use your mobile device's security features.
- Password protect your mobile device and lock it while not in use.
- Avoid storing sensitive information, like passwords and social security numbers, in your mobile device.
- Use an auto-lock or time-out feature so your device will lock when it is left unused for a certain period of time.
- Keep your mobile's operating system and applications, including the browser, updated with the latest security patches and upgrades.
- Take precautions in case your device is lost or stolen.
- Be aware of your surroundings when typing sensitive information and avoid leaving your device unattended in public places.
- Consult your wireless provider to see if they provide a service to remotely erase your device or turn off access to your device if it is lost or stolen.
- Beware of Phishing & Smishing Scams- if someone sends you a text message, SMS message, or email asking you for your personal information, it is a trick. Be wary. Legitimate companies or organizations will never ask you for personal information by text, SMS message, or email.
- Exercise basic precautions when using your mobile device such as: Do not click on links you receive on your mobile device unless you know the person/sender. (Even if a text message/email containing a link is from a friend, verify it before clicking on the link.)
- Do NOT access any financial services from a ‘jail broken” or “rooted” device.
Dangers of Jailbreaking (iOS), or Rooting (Android) your Mobile Device
- Jailbreaking makes your iOS device an easier target for malware. It completely removes the walls built into both iOS and the App Store allowing users to install apps from sources other than Apple. Most documented malware for iOS has affected only jailbroken devices.
- Once a device is jailbroken, there's no longer any antivirus software available for the Apple iOS, and the few products that already exist on the device will be limited in their abilities. Therefore, if you jailbreak your device, you're on your own. There's no program that can protect you from infection.
- Jailbroken apps are not always supported in new versions of the iOS
- Buggy/unauthorized apps can crash the device or even render it unusable.
- Rooting an Android device may sound similar to Jailbreaking; however, there is very little difference. Since Android Operating Systems are based on Linux, a rooted device allows the user complete/unrestricted access to the Operating Systems. Users can even replace the Operating System if desired.
- Unrestricted access to Android allows users to remove or by-pass security measures added by the manufacture or carrier.
- Rooting an Android device can also result in a “bricked” device, meaning there is no recovery and the device is no longer usable.
Email Security Tips
- Beware of Phishing Scams— if someone sends you an email asking you for your personal information, it’s a trick. Be wary. Legitimate companies or organizations will never ask you for personal information by email.
- Do not open unsolicited attachments or links within emails. Be cautious about opening attachments or downloading files, regardless of who sent them.
- Use a fast performance multi-antivirus scanner to scan incoming email attachments for email-borne threats.
- Avoid the use of public Wi-Fi. When using public Wi-Fi, your computer/device is more vulnerable to possible hackers.
ATM/Debit Card Safety Tips
- Protect your ATM/Debit Card and PIN. If lost, report as soon as possible.
- Choose a PIN different from your address, telephone number or birth date.
- Always be aware of people and your surroundings.
- When typing your PIN, always block your typing from view with your other hand.
- Securely store your card and cash.
- Be alert for possible card skimmers attached on card readers. Always observe the card reader and if it appears to have something attached or appears damaged—don’t use it.
Consumer Protection – Reg E
Federal Regulation E establishes the basic rights, liabilities, and responsibilities of consumers who use electronic funds transfer (EFT) services of financial institutions that offer these services. Consumer transactions which are initiated electronically are covered by these rules. For further information regarding protections provided under Reg E, please visit the Consumer Financial Protection Bureau (CFPB) website at https://www.consumerfinance.gov/eregulations/1005
Protection for Business Accounts
Business and Commercial (non-consumer) customers using electronic funds transfer (EFT) services are not protected under Regulation E. Therefore, special consideration should be made by business customers to ensure adequate internal security controls are in place that limit risk to the risk level that the business customer is willing to accept.
Commercial and business customers are encouraged to perform periodic assessments of the security and risk controls which are in place. The risk assessment should be used to determine the level of risk associated with any online/mobile activities performed and the controls which should be used to mitigate those identified risks. Some security recommendations include:
- Limit employee access to only the functions needed
- Restrict administrative rights
- Establish logins for each employee (do not allow sharing of credentials)
- Promptly remove/change access rights if an employee leaves or changes roles within the company
Credit Report Monitoring
The Fair Credit Reporting Act (FCRA) requires each of the nationwide credit reporting companies — Equifax, Experian, and TransUnion — to provide you with a free copy of your credit report, at your request, once every 12 months. The FCRA promotes the accuracy and privacy of information in the files of the nation’s credit reporting companies. The Federal Trade Commission (FTC), the nation’s consumer protection agency, enforces the FCRA with respect to credit reporting companies. A credit report includes information on where you live, how you pay your bills, and whether you’ve been sued or have filed for bankruptcy. For more details about your rights under FCRA and how to request your free credit report, please visit the Federal Trade Commission’s site at https://www.ftc.gov for more information.