Cyber Security Education Center

  • IDENTITY THEFT / FRAUD

    Report Identity Theft or Fraud

    If you think you've become a victim of identity theft or identity fraud, immediately contact Rocky Mountain Bank & Trust at 866-865-0628.

    We are available to help you:

    • Close your accounts and open new ones
    • Replace your RMB&T debit/credit cards
    • Address your concerns

     

    Next Steps

    Once you've contacted us, it's important that you take the following steps, and document whom you contacted (including the date and time and name of person that you talked to at each business):

    1. Call the major credit bureaus:

      First, ask that they place a "fraud alert" on your credit file. A fraud alert prevents creditors from changing your accounts - or opening new ones in your name - without proper verification. Then, request a free copy of your credit report. If you see any additional signs of fraud, notify the credit bureau and the creditors whose accounts are affected. After the disputed transactions are resolved, request another copy of your credit report to make sure your file has been updated.

    2. Call your other creditors - Including your phone and utility companies and let them know that you've been a victim of fraud. Close any accounts that may have been compromised. As a precaution, consider resetting all of your passwords.
    3. Inform check security companies about the fraud:
      • Chexsystems (Consumer Assistance) at (800) 428-9628
      • CheckRite at (800) 466-2748
      • TeleCheck (About TeleCheck) at (800) 710-9898
    4. File a police report if you think personal information (driver's license, address, etc.) has been compromised or stolen. Creditors may also want proof of the crime from law enforcement.
    5. Call the Federal Trade Commission (FTC) identity theft hotline at (877) 438-4338 or file your complaint online at www.ftc.gov.
    6. Be vigilant, patient, and persistent. It can take weeks, sometimes even months to resolve identity theft. Keep a close eye on all your statements, review your credit reports regularly, and immediately report any discrepancies.

     

  • How does ID Theft Happen?

    You may think it can't happen to you, but identity thieves make it their job to be creative in stealing your information. They can come up with ways to get their hands on your information that you may have never even thought was possible. You may be surprised at some of the methods they may use, including:

    Dumpster Diving. They rummage through trash looking for your information on bills or other paperwork that wasn't properly shredded.

    Skimming. They steal credit/debit card numbers by using a special data storage device when processing your card.

    Changing your address. They divert your billing statement to another location by completing a "change of address" form.

    "Old-Fashioned" stealing. They steal wallets and purses; mail, including bank and credit card statements; pre-approved credit offers; and new checks or tax information. They steal personnel records from employers, or bribe employees who have access to sensitive information.

    Phishing (pronounced as "fishing"). They send an email to you, masquerading as a company you might trust, in an attempt to illegally obtain personal information from you. The email could direct you to visit a website where you will be asked to update personal information, such as your User ID, PIN, passwords, bank account, credit card numbers, and more… which could all be used to steal your identity. The website that you were directed to, however, was bogus (called "Spoofing"). It was set up solely to steal the user's information for unauthorized activities, purchases, etc.

    Common techniques that are used by the phishing fraudsters include, but are not limited to the following:

    • Using false email addresses, logos, and graphics to mislead you into accepting the validity of the emails and web sites;
    • Fake domain names in order to appear to be representing a trustworthy company;
    • Duping you into providing personal details through one or more methods such as hyperlinks to fake websites or embedded forms in emails.

    Other Important Security Reminders:

    • Never disclose your User ID or PIN to anyone;
    • To access RMB&T online, enter the URL address manually into your web browser; never login via any website links… especially within emails.
    • Be aware of email scams requesting that you update your account information. Rocky Mountain Bank & Trust will never request your User ID and password through an email.
  • SECURITY TIPS!!

    At Rocky Mountain Bank & Trust, we are serious about protecting your personal information. We are committed to providing you with a safe and secure online environment for you banking needs.

    Your Role in Safeguarding Your Account Information

    Apart from the security measures put in place by your bank, you play an equally important role to ensure your online security and account information is not compromised.

    We highly recommend the following security practices while doing banking transactions online:

    1. Keep you User ID and password confidential at all times.
    2. Do not store your User ID and password when using Internet Explorer browsers.
    3. Do not register in any suspicious websites so as not to disclose your personal information.
    4. Use a computer/device that you trust.
    5. Ensure adequate security for wireless network and devices.
    6. Clear your browser's cache and history after each session.
    7. Protect your computer from viruses and malicious programs.
    8. Protect your critical data to prevent the loss of important files.
    9. Check your bank account and transaction history details regularly.
    10. If you suspect that your personal information may have been compromised, report it immediately.

    Keep your Password confidential at all times. Your password is like the key to your online safe.

    Important tips on how to safeguard and protect your password:

    • We encourage you to avoid using the same password for numerous accounts. Do not choose a password that can be easily guessed or words that are associated with you, like your telephone number, TIN/SS number, date of birth, or User ID. Select an uncommon and unique password to make it difficult for anyone to guess.
    • Avoid using sequential numbers or the same number more than twice (e.g. 121145).
    • Memorize your password. Do not write down your password or store it on your computer's hard-disk, your mobile phone, or other non-secure means.
    • Do not key in your password within view of someone else.
    • Verify that the URL displayed in the browser is correct before entering your User ID and password. The URL of Rocky Mountain Bank & Trust's Online "Enter User ID" page should read as follows:

      https://secure6.onlineaccess1.com/rmbtonline_40/Uux.aspx#/login

    • Use the latest recommended Internet browser such as those that support 128-bit encryption. They will give you the most updated security features available.
    • Change your password regularly by using the "Change Password" feature (minimum of 8 characters).
    • Change your password immediately if you suspect it has been exposed to others or the moment you suspect any unauthorized access.

    Log out of your online session

    Log out of your online session whenever you leave your computer, even for a short while. This immediately ends your Internet banking session and prevents further transactions from being carried out without a fresh login. You should also shut down your computer, when not in use, to prevent unauthorized access to your computer.

    Do not store your User ID/Password when using Internet browsers

    Some Web Browsers store login information that you have typed-in previously. This convenient feature is dangerous… don't be tempted by it. You can prevent your User ID/password from being stored in your browser by de-activating the function. The deactivation feature is generally listed under your web browser preferences. If you are having trouble disabling your web browser from storing your personal information, a simple Google search should guide you through the deactivation process on your particular device.

    Do not disclose your personal information to suspicious websites

    To prevent your personal information from being captured by counterfeit websites, you should not disclose your personal or financial information to little-known or suspicious websites.

    Use a computer/device that you trust

    You should not conduct your Internet banking transactions on computers/devices that cannot be trusted - public computers are susceptible to illegal activity. If you must use a device that is not your own, always clear your browser cache after each session to ensure your account information is removed.

    Ensure adequate security levels for wireless networks and devices

    Poorly configured wireless equipment may allow malicious entry into your computer through the airwaves. If you are unsure of your security levels, you are strongly advised to read your instruction manual, or consult your vendors if necessary to configure your wireless network/devices to ensure adequate security levels are established.

    Clear your browser's cache and history after each session

    Temporary files stored in your computer (called cache files) and browser history can retain information and data. Always remember to clear your browser's cache and history after each session so that your account information is removed, especially if you are using a shared computer.

    Protect your computer form viruses and malicious programs

    Apart from destroying important data on your computer, viruses/malicious programs such as a Trojan Horse may run a password sniffing program. These programs run in the background to capture your password keystrokes without your knowledge. Being constantly online may increase risk exposure of your computer.

    Protect your critical data

    Backup your critical data regularly to ensure that you can retrieve important data if you need to.

    Disable the "File and Printer Sharing" feature on your operating system

    This prevents an external party from gaining illegal control or access to your computer. You can refer to your computer vendor or instruction or manual on how to de-activate this feature.

    Check your account and transaction history details regularly

    Regularly check your transaction history details and statements to ensure that all details are updated and there has not been any unauthorized access.

    Update us when your change your contact particulars

    To make it easier for us to reach you whenever we detect unusual transactions on your account, always keep us updated with your latest contact numbers and mailing address.

    Let us know immediately if there is a problem

    If you notice any unusual/unauthorized transactions, please change your Password and notify us immediately. Where necessary, your Internet banking access can be suspended at your request to protect your interest.