{beginAccordion H2}

General Security

Protect yourself against identity theft and fraud and use caution when providing personal information online, in email, and text messages. 

Fraudsters are looking for the following types of information:

  • Account Numbers
  • Passwords
  • Personal Identification Number (PIN)
  • Social Security Number (SSN)
  • Credit Card Number
  • Debit Card Number
  • CSV or CVV Number (3-digit code on the bank of your credit or debit cards located on the signature line).

If something does not feel right, it most likely is not.  Be careful of intercepted mail.  Always retrieve your mail promptly.  Enroll in Informed Delivery® by USPS® to digitally preview your mail and manage your packages that are scheduled to arrive.  Enroll in electronic bill delivery and pay to send bills and other documents secure. 

Obtain your free credit report annually at https://www.annualcreditreport.com. Review it for accounts you did not open or inquiries you did not authorize or recognize. Credit cards, personal loans, auto loans will appear on your credit as a new account.  Phone plans, water, gas, or electric will appear as an inquiry on your credit.  Alert the reporting agencies of any suspicious activity or significant changes to your credit score.

Register for an Alert Service with First Southern Bank.  We offer various email and text alerts associated with activities on your account. 

Keep all your information up-to-date with First Southern Bank.  This includes your current phone numbers, mailing address, and email addresses. 

Always remember, First Southern Bank will never ask you for personal information via text, phone, or email.

Computer Security

Always keep your browser up-to-date with the latest security updates and patches.  Set your browser preferences to block pop-ups, which can contain inappropriate content or have malicious intentions.  Keep your computer operating system, software, and plug-ins up-to-date to ensure the highest level of protection.  Install, run, and update antivirus, anti-spyware, firewalls, and other protective software.  Before downloading an update to your computer, first go to the company’s website to confirm the update it legitimate.  Avoid downloading programs from unknown sources.  When you regularly maintain your operating system, web browser, and software programs, you decrease the risk of an attack of your computer.  Always turn your computer off completely when not in use instead of allowing it to go into sleep mode.

Online Security

We are committed to keeping your personal financial data safe and secure. Log in credentials go through verification during online banking login by entering your username and password.  One additional layer of security will include answering the security questions set up during enrollment by the online banking user.  The log in process is designed to keep your personal account information protected from fraud and identity theft.  If you believe your login credentials have been lost or stolen, contact your local branch or a Personal Banker at (618) 997-4341.

For your security, online banking passwords expire every 12 months and you will be prompted to change your password at time of password expiration.  Do not use your social security number as part of your username and/or password.  Protect your passwords and security answers, do not write them down or share them with anyone.  Do not save your password in your browser. 

Use secure websites for transactions and shopping. Shop with merchants you know and trust.  Look for “secure transaction” symbols:  for example, a lock symbol in the lower right hand corner or your web browser or window, or https://... In the address bar of the website.  The s in “https” indicates, “Secured” and means the web page uses encryption.  

Be wary of public Wi-Fi, it is NOT secure. Do not use public Wi-Fi to log into online banking, mobile banking, or to make any purchases. Save the purchases and banking for when you are on a secure network.

Online Banking Security

We are committed to keeping your personal financial data safe and secure. Log in verification is performed during online banking log in by entering your username/access ID and password. One additional layer of security will include answering the security questions that were previously set up during enrollment by the online banking user. This entire log in process is designed to keep your personal account information protected from fraud and identity theft.

Please note: For your security, online banking passwords expire every 12 months and you will be prompted to change your password at time of password expiration. If you have any questions, please contact a personal banker at 618-997-4341 or 618-549-3621 for further assistance.

PLEASE DO NOT EMAIL YOUR SOCIAL SECURITY NUMBER OR ANY ACCOUNT INFORMATION WHEN EMAILING US.

PLEASE LOGIN TO YOUR ONLINE BANKING ACCOUNT AT LEAST ONCE EVERY SIXTY DAYS TO KEEP YOUR ONLINE BANKING ACCOUNT ACTIVE AND AVAILABLE TO YOU 24/7.

How do I enroll?

It's very easy to use and there is no software to install. Visit our Forms Library and apply online by using the Personal Online Baking Enrollment form. After you have been enrolled in Online Banking and login on our website simply follow the instructions and learn about the new login procedures for Online Banking.

New Password Policy

  • The minimum length of the password must be at least 9 characters and not more than 17 characters.
  • The password should be a combination of characters that include at least 1 upper case, 1 lower case, 1 number, and 1 symbol. 
  • The password should not include keywords, predictable terms, and number series (For example -Your Name, Default, or 12345).

Please Note: These enhancements are not applicable on your existing password. However, the system will enforce the password requirements when updating your existing password

Please see an example of the new password policy below

New Password Policy

Email Security

Be wary of suspicious emails.  Always think before you click.  Pay attention to the emails you receive and never open attachments, click on links, or respond to emails from suspicious or unknown senders.  Pay attention to email addresses.  Check for improper formatting, noticeable typos, grammatical errors, and fake email signatures.  If you receive emails that you believe is an attempt to obtain your personal data, do not respond or provide any information.  Remember that businesses are obligated to protect your personal information so they will NEVER ask for this information by email. 

Consider creating two to three email accounts.  A primary email account used for the important things in life.  A secondary email used to register on websites, businesses, or things that are not important.  If you are already receiving a ton of spam on your primary email account in addition to your secondary email account, create a third email account and only give it out for the important things in life.   

Mobile Banking Security

Always use the keypad lock or phone lock function on your mobile device when it is not in use.  These functions password protect your device to make it more difficult from someone else to view your information.  Also, be sure to store your device in a secure location. 

Frequently delete text messages from your financial institutions, especially before lending, discarding, or selling your mobile device.  Never disclose via text message, phone call, or email your personal or financial information, including account numbers, password, Social Security number, or birthdate.  First Southern Bank will never send a text message to your mobile device asking you for this type of information.

Social Media Security

Avoid sharing your name, address, telephone number, and other personal information when using the Internet and on social sites. Make sure your profile is professional as for many social media sites; this is public information, regardless of your privacy settings. Check your privacy setting on social media sites to secure your account and limit access to your personal information.  

Card Security

Manage and protect your cards.  As digital transactions become more common, it is important to reduce your risk of becoming the victim of scams or unauthorized activity on your cards.

A soon as you receive your card, sign the back and keep it in a safe place.  Do not store card numbers, Personal Identification Number (PIN), or passwords where others may find it.  When available, use contactless payment options.  For electronic payments, always use trusted applications like First Southern Bank’s Digital pay or Apple Pay®, Samsung Pay®, Google Pay™, Fitbit Pay™, or Garmin Pay™.

Keep an eye on your card when doing a transaction.  Giving your card to someone is like giving them your wallet so keep your card in sight at all times.  Be sure to check your receipt and get your card back after each purchase.

Download the Brella app to set alerts for immediate notification for purchases more than a certain dollar amount, Internet, phone transactions, and transactions outside of the U.S.  This also provides instant transaction control to block or unblock your card.

Check your activity through your online or mobile banking regularly and review your statement monthly to assure the amounts charged are what you authorized.  Report a lost or stolen card immediately. Contact your local branch or any Personal Banker at (618) 997-4341 during business hours.  After hours, contact our lost or stolen hotline at (800) 383-8000.

Travel Tips

When preparing for travel you will want to contact First Southern Bank with your travel dates and destinations. You can report your travel plans through the Brella app, through your online banking, or by stopping by your local branch or by contacting a Personal Banker at (618) 997-4341.

Avoid free Wi-Fi, as it is often unsecure and can expose your devices and personal information to hackers. 

If your mobile device, computer, or tablet automatically connects to wireless networks or Bluetooth devices, disable those features and connect manually only when you want to.  Always keep track of your devices and do not leave them unattended or in public places.

Common Scam and Crime Types

Elderly Fraud – occurs when elderly Americans fall victim to some type of financial fraud or confidence scheme, including romance, lottery, or sweepstakes.

Example: Grandparent receives a call from someone posing as the grandchild. The call is typically late at night, with a frantic sounding voice telling the grandparent they are in trouble.  They typically use an accident, arrest, or robbery and may up the drama and urgency by claiming to be in the hospital or stuck in a foreign country.  They will through in some family particulars or use activity from the actual grandchild’s social media activity. They give enough detail to make it seem possible and then may turn the phone over to another scammer who poses as a police officer, doctor, or lawyer to back the story.  The grandchild will plea for them to wire them money immediately and request that they do not tell mom or dad.

Identity Theft – occurs when someone assumes your identity to preform fraud or other criminal activity.

Example:  The theft uses your information to apply for credit, file taxes, or get medical services.  You may be unaware of this until you received debt collections falls for accounts you did not open, or denials for loan application.

Malware – the use of viruses, spyware, and Trojans that are designed to infiltrate or damage a computer system, steal personal information, and commit fraud.

Examples: Downloads from file sharing and social networking sites can be a major source of malware.  Opened or installed attachments or software from unknown senders or sources.  Pop-up ads asking for personal or financial information.

Money Mules – the use of someone who transfers or moves illegally acquired money on behalf of someone else.  Some money mules are willing participants and know they are supporting criminal enterprises, while some are unaware that they are helping criminals profit.

Example: Opening new bank account to receive money from someone you do not know.  Transferring or wiring funds out of your personal bank account to people that you do not know.

Phishing and Spoofing – which are both common examples of schemes designed to trick you into providing personal information to the scammer.

Example:  A criminal might send you an email that looks as if it is coming from First Southern Bank, encouraging you to go to a website or call a phone number and provide account numbers, passwords, etc.  They often go to great lengths to make the fake website look authentic. 

Skimming – occurs with devices illegally installed on ATMs, Point-of-Sale (POS) terminals, fuel pumps, or card reading devices to capture data or record cardholders’ PIN.

Example:  A fraudster will attach a piece of equipment known as a skimming device over the card reader.  While you make a valid transaction, the debit or credit card pass through a second card reader (the skimming device) illegally capturing your card and PIN.

Smishing – occurs when a criminal sends a text message that attempts to trick you into replying with financial or personal information or clicking on links that well infiltrate your mobile device with viruses.

Example:  Hello, your FedEx package with tracking number, GB-2468-GH10 is waiting for you to set delivery preference:  c7dv.info/FGdGtk12vilM  

Vishing – occurs over Voiceover Internet Protocol (VoIP).  The scammer leaves an automated recording, informing the consumer that their account has experienced unusual activity and instructs them to call a phone number that turns out to be fake.

Example:  You receive a phone call from an individual claiming to work for a specific retailer.  They inform you that your order did not processed because your card was declined.  They then inform you not to worry, that they are happy to correct the issue.  The caller claims they need your credit card number, expiration date, and code on the back to process the transaction.  The victim is immediately relieved with such an easy solution and provide the information to the caller. 

Fraud-Related and Other Links

{endAccordion H2}