Trick or Treat…or Should We Say Trick or Threat?

October is not only National Cyber Security Awareness Month, it’s also the time to celebrate Halloween, bringing to mind scary things that are merely figments of our imagination. In the digital world, however, there are many scary things that aren’t figments of our imagination — things we should in fact be worried about.

The threats in cyberspace . . . → Read More: Trick or Treat…or Should We Say Trick or Threat?

Debit Card Security: October 24, 2014

Iowa State Bank is aware of a recent security breach of a merchant database. We are taking appropriate measures to help protect our customers.

At this time, account holders do NOT need to call Iowa State Bank to learn whether they are impacted. If we discover that your card was involved in the incident, we will notify . . . → Read More: Debit Card Security: October 24, 2014

What are chip-enabled EMV® payment cards?

Plastic. The credit card world is full of plastic and always changing. The latest plastic card, the EMV payment card, will soon be introduced into the United States. The EMV card is widely accepted in European countries and is commonly referred to as a chip card. The . . . → Read More: What are chip-enabled EMV® payment cards?

Keep Financial Transactions Private

A good rule to follow when banking online or conducting financial transactions online is: Do Not Use Public Computers and Public Wireless Access for Sensitive Transactions.
Whether you’re entertaining the kids by streaming a video on a tablet, downloading new travel apps on your smartphone or even taking your tablet poolside, there are precautions you should take . . . → Read More: Keep Financial Transactions Private

Protect Portable Devices While Traveling

The summer vacation season is underway, and for many of us that means lounging on sunny beaches, reading a book under a shade tree or hitting the road for a new adventure. It can also mean identity theft and other crimes if we aren’t careful about our online activities and protecting our information.

Cybercrime does not take . . . → Read More: Protect Portable Devices While Traveling

Is Malware a Threat to Mobile Devices?

The volume of cyberthreats to mobile computing devices continues to increase as new applications (apps) and devices proliferate.

McAfee® reports that there were more than two million new mobile malware samples in 2013. Symantec™ reports that nearly 40 percent of mobile device users have experienced mobile cybercrime in the past 12 months. Some experts estimate that . . . → Read More: Is Malware a Threat to Mobile Devices?

Mobile Banking: Safety First

As mobile banking continues to exceed online users, it’s more important than ever for customers to use mobile banking safely. Convenience is the driving factor in the rise of mobile banking. It opens the doors to consumer choice and access to banking options. But, as mobile devices such as smartphones and iPads become more popular, . . . → Read More: Mobile Banking: Safety First

IRS Warns of Tax-Time Scams

It’s true: tax scams proliferate during the income tax filing season. This year’s season opens on Jan. 31. The IRS provides the following scam warnings so you can protect yourself and avoid becoming a victim of these crimes:

• Be vigilant of any unexpected communication purportedly from the IRS at the start of tax season.
• Don’t fall for phone . . . → Read More: IRS Warns of Tax-Time Scams

What Makes a Good Password?

Choosing a good password is one of the first steps in protecting yourself online. Consider the following tips when creating a good password:

• Private: it is used and known by one person only;
• Secret: it does not appear in clear text in any file or program or on a piece of paper;
• Easily remembered: so there . . . → Read More: What Makes a Good Password?

Tips for Small Business: How to Combat Fraud

Cybercriminals can target small businesses to transfer funds from accounts and steal private information, a fraud referred to as “corporate account takeover.” Criminals use spoofed emails, malicious software and online social networks to obtain login credentials to businesses’ accounts, which they then use to make illicit transactions.

“Small businesses are a growing target for account takeover,” said . . . → Read More: Tips for Small Business: How to Combat Fraud