Your privacy is important to Skylar City Credit. We have developed a Privacy Policy that explains how we securely collect, use, disclose, transfer, and store your information.
The Skylar City Credit Privacy Policy was updated on December 18, 2017.
Your privacy is important to Skylar City Credit. We have developed a Privacy Policy that explains how we securely collect, use, disclose, transfer, and store your information.
The Skylar City Credit Privacy Policy was updated on December 18, 2017.
Skylar City Credit is committed to protecting your accounts from cyberattacks and identity theft. The products and services we offer come with tools and resources to help keep you and your accounts safe. However, in some cases that may not be enough. We rely on you to take all necessary steps to ensure your accounts are protected on your end, as well. Check out the security information below for tips on how to stay safe online.
Skylar City Credit is committed to protecting the privacy of our clients’ personal information. Please read our Privacy Policy for details regarding how we collect, share, and protect your personal information.
We are aware of the recent notifications from law enforcement regarding the threat of a cyberattack potentially targeting ATM devices nationwide. Skylar City Credit follows the FBI’s recommendations to protect against these potential threats. In addition, we continuously assess our security protocols and work closely with our service partners to defend against such attacks in an everchanging technology landscape.
Customers are never responsible for any losses incurred due to unauthorized ATM activity that they report to their financial institution in a timely manner. As a best practice, we encourage all customers to review account activity regularly through Skylar City Credit online banking.
Please notify the bank immediately if you identify any unfamiliar activity. You can also sign up for mobile alerts through Skylar City Credit Online Banking. If you would like more information on setting up alerts, please contact us.
Set up strong password
Monitor your bank account transactions
Use a designated mobile device or computer for online banking and shopping
Effectively use anti-virus and security software
Be cautious when connecting to the Internet
The FBI calls it Business Email Compromise and defines BEC as “a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. The scam is carried out by compromising legitimate business email accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds.” If your business conducts any transaction via wire, you and your company could be at risk.
From January 2015 to June 2016, the FBI reported a 1,300% rise in identified exposed losses. Most of the losses were reported in the Skylar City Credit States and fraudulently -transferred funds typically ended up in China and Hong Kong. Unless fraudulent activity is discovered and reported within 24 hours, the chances of recovery are low. Only 4% of funds are ever retrieved.
Per research found by The Verizon 2016 Data Breach Investigations Report, employees and human error are the weakest link in any “IT system.” We recommend educating and training employees on all forms of cyberattacks, as well as asking them to use caution when sharing personal information on social media sites. We recommend educating all employees; however, human resources professionals, IT managers, C-level and senior executives and anyone with finance approval are more likely to be on the receiving end of attacks.
Those involved in large wire transfers are especially susceptible. Many companies have very lax policies when it comes to initiating a transfer. For some, the process is as simple as the CEO picking up the phone and requesting the movement of funds. Cybercriminals fish for information by sending emails to targets to glean information. Once successful, they pose as a familiar person and initiate the transfer. If multi-level safeguards are not in place, you may fall victim.
Human resources professionals are also top targets. Typically, they have access to the employee database, which includes sensitive information such as social security numbers and personal information. In addition, they receive resumes from potential applicants. Criminals may include spyware inside a resume or its delivery source, compromising the system.
Phishing
Spear Phishing
Executive Whaling
Social Engineering