Commonwealth Bank & Trust values your banking experience and the security of your financial and personal information are very important to us.
We will never send you an unsecured email or text requesting confidential account information, account number(s) or any other personal information. If you receive an unsolicited email or text requesting this type of information, do not respond. Instead, contact Customer Service as soon as possible at 855.535.5654 or send a secured email by clicking here.
NOVEMBER 19, 2020 // FRAUD ALERT: A new Amazon phone scam is making waves across the country. Fraudsters pretending to be Amazon.com representatives are calling consumers to “notify” them of fraud on their account. To mitigate the fraud and bring the account back to good standing, they are asking consumers to purchase gift cards as a resolution. Amazon will NEVER cold-call customers, nor ask for remote computer access or payment over the phone. DO NOT GIVE ANY PERSONAL INFORMATION TO THE CALLER. Secondly, you should always verify any account activity on Amazon by logging into your official account and / or contacting customer support.
CLICK HERE to read more holiday season cybersecurity tips.
Please review the information below to learn more about protecting yourself against fraud, identity theft and online scams.
- How We Protect You Online
- How To Protect Your Personal Information
- Identity Theft
- FDIC Consumer Alerts – including Cybersecurity
- Security Information for Business Customers
- Security Information from KnowBe4
How We Protect You Online
We put extensive emphasis on keeping your financial and personal information safe and secure. Listed below are some of the ways that Commonwealth Bank protects your information every day.
Anti Virus Protection
Our computers and systems are protected by systems that detect and prevent viruses from entering our computer networks.
We have firewalls protecting our systems in order to block unauthorized access by individuals or networks.
By using the Contact Us link, you are able to communicate with us securely. You can also contact us securely once you have logged on to Internet Banking.
Typically information sent via email is not secure, but when you use the “Enroll Now” option with Internet Baking or complete the secure form under the Contact Us link, you can rest assured that your information is encrypted. These are the only secure links to use when sending account or confidential information to us. Please note that we have other email links on our website which are intended for informational inquires only and therefore do not have this same level of security.
Commonwealth Bank will never contact you via email to request personal information or your login ID and password. If you receive an email of this nature, please Contact Us as soon as possible.
Secure Internet Banking Enrollment Form
Information that is sent to us via the “Enroll Now” form within Internet Banking is encrypted.
Login ID and Password
You are responsible for the confidentiality of your login ID and password. Treat this information as you would your PIN for your ATM/Debit card. For your own security, Commonwealth Bank recommends that when choosing a password you avoid using easily available information such as your mothers’ maiden name, your birth date, or portions of your phone number, address, tax identification number, etc. If at any time you feel that your login ID or password have been compromised in any way, please Contact Us as soon as possible.
Direct Deposit automatically deposits paychecks and other recurring credits directly into your account. This free service eliminates checks from being in your mailbox and the chance of having your information stolen.
You can set up recurring payments between your Commonwealth Bank Checking accounts and your Commonwealth Bank Savings, Loans, Lines of Credit or other Checking accounts.
Online Bill Pay
Set up recurring or single payments for utilities, credit cards or any other payment you would usually pay by check through our online bill pay service. By doing this, you won’t have to worry about lost or late payments.
By ordering your checks through Commonwealth Bank, you are ensured to work with a company that issues high-quality checks with special features that deter counterfeiting, scanning or copying.
How To Protect Your Personal Information
Protect Your Personal Information
You have the control over the information you choose to release. Always keep anything with any personal or account information in a safe place. Only provide your personal information to trusted sources. If you are unsure of a business or entity asking for your private information, think twice before giving the information out. Reduce the amount of mail you receive with your personal and private information and always shred any documents before throwing them away.
Some additional tips to help you protect your personal information:
- Do not use public Wi-Fi hotspots to access Online Banking or Mobile Banking. When connected to unsecured public networks, be mindful of the apps you use and the data you send over these networks.
- Carry only the necessary identification with you
- Treat all of your credit cards and debit cards like cash
- Never leave outgoing mail with private information in an unsecured location
- Provide your private information only to trusted sources
- Eliminate paper that contains your personal information as much as possible
Secure Your Devices
Install anti-spyware, anti-virus and a personal firewall on your computer and ensure it’s updated regularly. By doing this your computer will be more secure against hackers and criminals trying to obtain your personal information.
Protect Your Security on Mobile Devices
- Protect your mobile device using a PIN, Password, Pattern, Fingerprint, or other authentication offered by your mobile device. Do not share or write down your passwords.
- Install mobile security software and regularly update security patches on ALL your applications.
- Avoid malware by only downloading and installing legitimate mobile apps from established sources.
- Exercise due diligence with unexpected messages or notifications. Do not click on suspicious links sent via unsolicited text message, email, or suspicious push notification.
- Download extended information about Mobile Security
Use of Public Computers
Commonwealth Bank recommends that you only use computers that you know and trust to access your account information. Publicly available computers may be outfitted with spyware or recording devices that could compromise the integrity of your login ID and password. Additionally, when you use a public computer, others may be able to watch you and get your login ID and password. In all cases, Commonwealth Bank highly recommends that you completely log out of both Internet Banking and Bill Pay and close all associated web pages when you have finished your Internet Banking session.
Some additional tips to help you protect your computer:
- Always keep up to date on the latest hacking and phishing schemes
- Use a current web browser
- Keep your computer software and operating system up-to-date
- Use a pop-up blocker
- “Don’t Be an Online Victim: How to Guard Against Internet Thieves and Electronic Scams”
- Imposter Scams – Federal Trade Commission (FTC)
Here are some helpful tips to keep you from becoming a victim of fraud.
- Monitor your accounts on a regular basis. Use our online banking and bill pay service to keep up to date on your account information. The victim discovers most identity fraud, and the earlier you detect the fraud, the lower the financial impact can be.
- Check your credit report annually. With new regulations, everyone is entitled to receive a free credit report from each of the three major credit bureaus once a year. You can do this by going to www.annualcreditreport.com. For more details about this service, you can also visit the Federal Trade Commission website, and view their brochure “Your Access to Free Credit Reports”.
- Review the Federal Trade Commission article “10 Things You Can Do to Avoid Fraud”.
There are many types of online fraud. Below are a few of the most common.
Phishing is a criminal activity using social engineering techniques. Phishers attempt to fraudulently obtain sensitive information, such as passwords and credit card details by acting as a trustworthy person or business via e-mail. Phishing is typically carried out using email, but an instant message or phone contact can been used. To learn more about these scams and how to avoid becoming a victim, read about Phishing on the Federal Trade Commission website.
Spyware is a type of program that watches what users do with their computer and then sends that information over the Internet. Spyware can collect many different types of information about a user. More benign programs can attempt to track what types of websites a user visits and send this information to a business to target advertising to you. More malicious versions can try to record what a user types to try to intercept passwords or credit card numbers. Yet other versions simply launch popup advertisements.
Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others are not designed to do any damage, but simply to replicate themselves and make their presence known by presenting text, video and audio messages. Even these benign viruses can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, many viruses are bug-ridden, and these bugs may lead to system crashes and data loss.
For additional details about how to deter, detect, and defend against Identity Theft, please view the Federal Trade Commission’s brochure “Fighting Back Against Identity Theft”.
FDIC Consumer Alerts – including Cybersecurity
- A Bank Customer’s Guide to Cybersecurity
- FDIC Consumer Protection
- Phishing Scam
- Identity Theft
- Don’t Be an Online Victim: How to Guard Against Electronic Scams
Security Information for Business Customers
- Protect your Business from CATO (Corporate Account Take Over)
- Cybersecurity for Small Businesses
- 5 Steps to Better Business Cybersecurity Guide
- Cybersecurity Resource Index
- Small Business Cybersecurity: Email Imposters
- Cybersecurity Basics
- Email Authentication
- NIST Cybersecurity Framework
- Secure Remote Access
- Start with Security: A Guide fo Business