Internet Theft Protection

Protecting Your Personal Information

The best defense is a good offense.

To keep your online banking information secure, think like a target and use protective tools. We’re here to help with both.

Here are six plays to run in a successful offense:

  1. Use quality malware protection. Download IBM Trusteer, the gold standard for applications that provide security for online banking users. Peoples Bank believes in Trusteer so much that we bought it to ensure our customers had the best protection available. If you don’t have Trusteer downloaded and operating on your computer (and any other computer that does banking transactions with Peoples Bank), you are at risk. Get more information and download Trusteer.
  2. Make sure your software programs, such as those provided by Microsoft, Intel (formerly McAfee), Symantec and other companies, are up-to-date to keep your computer clean from known software and routines that would breach your security practices.
  3. You need a good computer. Resist the urge to save money by purchasing from an unknown source. The risk of malware isn’t worth it.
  4. You need a good password, a well-managed computer or mobile device, and a secure internet connection at home. The best password scheme is to have a different password for each website that is not the same as the password that protects your computer or mobile device.
  5. Take online banking security seriously, and follow all of these precautions.
  6. Budget to protect your security. When it comes to making a decision on hardware or software, cutting corners on quality to save money will only put your finances and identity at risk.

Banking Online Safely

Guard against emails and websites that try to steal your information or your money.

  • Carefully inspect the website address of any site asking for financial information or password.
  • Emails from the bank will only direct you to pages on the PeoplesBankNC.com website.

What about links in email?

As a rule of thumb, NEVER open emails or click links in an email from people you don’t know. Also, even if you do know the sender, it makes sense to hover your mouse over the link (or button or banner) and verify that the link goes to a trusted site.

Peoples Bank email with a link to the Peoples Bank website.

Correct email link

Bogus email with a link to a spammers website.

Incorrect email link

Some email links are safe to use—but always verify

We often send emails to customers with links to sites we have reason to believe are safe. Below are some examples:

Our own website, for example:

  • PeoplesBankNC.com/homeloan

(Note the link has our official web address in the link. Official websites for our bank are: PeoplesBankNC.com and bancodelagente.com)

If you have question about third party links in our email or on our website, please don’t hesitate to contact us directly:

Call: 877-802-1212
Email: onlineservices@peoplesbanknc.com
Customer Service Hours
8:00am – 6:00pm, Monday through Friday

Be skeptical of email from people you don’t know (and some you do!)

Many consumers (and businesses) lose money because they were victimized by scammers using email to create an urgent or compelling reason to respond to the email. Never divulge personal or financial information or click on a link that allows criminals to steal information from or take control of your personal computer.

However, there is an important exception to links in emails you receive from Peoples Bank.

We may send emails that contain links to our website or to our trusted business partners. Those are links that we consider safe. Still, it makes sense to hover your mouse over the link (or button or banner) and verify that the link goes to a trusted site.

What about attachments?

Don’t open any attachments from a source you do not absolutely trust. There may be exceptions, for example, your attorney may send you documents in an attachment. But, if you are not absolutely sure about the sender, or if you get an email you didn’t expect, do not open any attachment until you verify that is legitimate – by contacting the sender.

Navigating the internet safely

Scammers have two primary means of getting what they want, and both of them can be successfully dealt with by simple precautions. One way is to appear to be somebody they are not, like Amazon, or your bank. The other way is to hack into the computers of legitimate web properties and grab a database of passwords or other sensitive information (that might include yours).

How many times have you thought you typed “amazon.com” but found yourself at “anazon.com” instead? Some clever exploit such a typo, so make sure that you are where you intend to be before entering your personal information. Imposters are also rampant in social media. Some software tools will help by blocking such imposter sites, pop-ups and suspicious links.

To reduce risk, do not use the same password for every website. Your passwords for financial websites should never be the same as the password to another site.  See our blog posts about striking the appropriate balance between online safety and online convenience for tips and techniques that will help.

Get more information about online banking security threats.


Protecting Computers and Mobile Devices

Your online security depends much upon the security of your computer, mobile device or tablet. Follow three simple steps to protect them.

1. Keep your software up-to-date to ward off online threats

Most computer operating systems and program applications have settings for that allow for automatic updates, including those that relate to user security. It is suggested that users allow those updates to automatically be installed on their computer, thereby providing ongoing protection against current and known threats. You can usually go online, to official websites, and find out if you have the most current version of operating systems and applications.

2. Keep your computer safe from prying eyes.

No firewall and anti-virus software can defend against theft of, or physical access to, your computer or mobile device. Take precautions by requiring a password to log on to the connected device, and require that password to get past the screen saver.

3. Guard your computer cache

Your computer cache is a specialized form of computer memory. Cache is designed to speed up the computer by prioritizing its contents for quick access.

Users are cautioned to be careful about permitting their web browser to cache information (login IDs, passwords, user name, etc.) which contains banking or other critical and private information. To monitor and control your browser cache try these steps: (1) go the Help page of your browser, (2) search for “clear cache,” and follow the directions.


Protect Your Online Business Banking

Businesses should assign a high-priority to their online security and ensure appropriate resources to support that priority. Here are some tips:

Priorities

Think strategically to determine the relative importance of information maintained by the company and the means of accessing that information.

  • Windows-based office computers should be running the most recent Professional (not “Home”) version of Windows
  • Screen savers should be enabled after a few minutes of inactivity and require the domain user name and password.
  • Laptops should have a Trusted Platform Module (TPM) installed so that the information on the hard drive can be protected via a good encryption scheme.
  • Strong passwords should be required by domain policy.
  • Every day each computer should verify that it is up-to-date with current operating system patches, software updates and malware protection.

Develop your people to protect your business

The people in your company are about the biggest risk to information security you’ve got. Regularly and often train your people in security best-practices.

Business-grade tools

Consumer-grade software tools are generally insufficient for businesses. Your business must be able to manage technology components, preferably from more than one location. Business technology assets that must be managed centrally, not just individually, would include:

  • Employee access and control (user accounts)
  • Your internet domain name
  • Your website (not the same as your domain name)
  • Computers (software installation, updates and patches)
  • Software
  • Mobile devices
  • The file server
  • The internal network traffic (firewalls, routers, switches, et al)
  • Wireless access points
  • The phone system (especially if it’s a VOIP system)
  • Surveillance cameras (especially if they are wireless)
  • Doors

If your company has a dozen computers or more, protect sensitive information with well-formed, centralized management. In most cases, employees should not be allowed to install software on their computer, and the company should know when computers on its network are running out-of-date virus software – and be able to fix that problem quickly.

 

Small businesses can manage their systems on an individual, ad hoc basis. If your company has more than 10 employees, it should take a good, hard look at the people and the technology that stand in front of (not behind) its information. Perhaps it is time to hire an outside expert.


How Peoples Bank protects customer online banking security

Peoples Bank has extensive resources devoted solely to online security.

It starts with rigorous technology requirements, for itself and its partners. Extensive reviews and audits are regularly conducted. High standards and ethical behavior are demanded and received by employees and the employees of partners and vendors. The bank’s systems are protected by multiple physical and digital access control. The bank’s databases are protected by multi-factor authentication and off-set data connections. In addition, thousands of different types of transactions are constantly monitored for unusual or excessive activity. All of this requires substantial investment and resources, of a magnitude that is simply out of the reach of smaller institutions.

Nobody can protect against each and every threat. But Peoples Bank is doing all it can with known technology resources and insight to protect its information, your information.

User authentication

We go to great efforts to make sure that the person attempting to log in to an account on The Real Peoples Bank has been approved and is qualified to do so.

  • A customer can’t just get to their account online without first telling us the account should have such access.
  • At the time of account setup, the customer’s verified email account is used to make sure that only the person with access to that email account can begin the process of online account access.
  • The user id is never the email address.
  • The password is never emailed. A temporary password is emailed and intended to be used immediately. It is sent to the email address already set up on the account and does not include the additional piece of information needed to login, the user id.
  • The password to our online system has a rigorous requirement of length and character combination.

Please talk to your knowledgeable and trained Peoples Bank employee if you have questions about online account access.