***The National Bank of Georgia will never contact you via email asking for passwords, debit card
information, or other sensitive information***
Don’t respond to or open attachments or click on links in unsolicited e-mails. If a
message appears to be from your financial institution and requests account information,
do not use any of the links provided. Contact the financial institution using the
information provided upon account opening to determine if any action is needed.
Financial institutions do not send customers e-mails asking for passwords, credit card
numbers, or other sensitive information. Similarly, if you receive an email from an
apparent legitimate source (such as the IRS, Better Business Bureau, Federal courts, UPS,
etc.) contact the sender directly through other means to verify the authenticity. Be very
wary of unsolicited or undesired email messages (also known as “spam”) and the links
contained in them.
Be wary of pop-up messages claiming your machine is infected and offering software to
scan and fix the problem, as it could actually be malicious software that allows the
fraudster to remotely access and control your computer.
Do not leave computers with administrative privileges and/or computers with monetary
functions unattended. Log/turn off and lock up computers when not in use.
Use/install and maintain spam filters.
Do not use public Internet access points (e.g., Internet cafes, public Wi-Fi hotspots
(airports), etc.) to access accounts or personal information.
Reviewing accounts regularly enhances the ability to quickly detect unauthorized activity
and allows the business and the financial institution to take action to prevent or minimize
Install and maintain real-time anti-virus and anti-spyware desktop firewall and malware
detection and removal software. Use these tools regularly to scan your computer. Allow
for automatic updates and scheduled scans.
Install routers and firewalls to prevent unauthorized access to your computer or network.
Install security updates to operating systems and all applications, as they become
available. These updates may appear as weekly, monthly, or even daily for zero-day
Block pop-ups.
Keep operating systems, browsers, and all other software and hardware up-to-date.
Make regular backup copies of system files and work files.
Encrypt sensitive folders with the operating system’s native encryption capabilities.
Preferably, use a whole disk encryption solution.
Note any changes in the performance of your computer such as:
 A dramatic loss of speed.
 Changes in the way things appear.
 Computer locks up so the user is unable to perform any functions.
 Unexpected rebooting or restarting of your computer.
 An unexpected request for a one time password (or token) in the middle of an
online session.
 Unusual pop-up messages.
 New or unexpected toolbars and/or icons.
 Inability to shut down or restart.
Be on the alert for rogue emails
 If someone says they received an email from you that you did not send, you
probably have malware on your computer.
 You can also check your email “outbox” to look for email that you did not send.
If you detect suspicious activity, immediately cease all online activity and remove any
computer systems that may be compromised from the network.
 Disconnect the Ethernet cable and/or any other network connections (including
wireless connections) to isolate the system from the network and prevent any
unauthorized access.
Immediately contact your financial institution so that the following actions may be
 Disable online access to accounts.
 Change online banking passwords.
 Open new account(s) as appropriate.
 Request that the financial institution’s agent review all recent transactions and
electronic authorizations on the account. If suspicious active transactions are
identified, cancel them immediately.
Ensure that no one has added any new payees, requested an address or phone
number change, created any new user accounts, changed access to any existing
user accounts, changed existing wire/ACH template profiles, changed PIN
numbers or ordered new cards, checks or other account documents be sent to
another address.
For additional information and tips on how to protect your information online, please visit
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF