DATA CARD COMPROMISES
FNBRF continues to monitor new debit card fraud alerts. Due to the severity of information often obtained in the compromises, we are concerned that card information will be used fraudulently in the future. If your card has been compromised we are proactively ordering new cards to ensure your personal information remains safe. You will receive a letter in the mail regarding the specific breach your card was involved in and a new card following approximately one week after. PLEASE activate your NEW card AS SOON AS POSSIBLE. Feel free to call us at 715.426.3111 with any questions.
Example of compromised card letter: Click here to view the letter.
Jimmy Johns, June 16, 2014 - August 7, 2014
Home Depot, April 2014 - September 2014
STOP. THINK. CONNECT.
October is National Cyber Security Awareness Month
The Stop. Think. Connect. Campaign is a national public awareness effort to guide the nation to a higher level of Internet safety by challenging the public to be more vigilant about practicing safer online habits. By providing tips throughout the month on how we can protect ourselves and families we will be educated and know how to keep our personal information safe from constant cyber threats.
PROTECT YOUR IDENTITY BY PRACTICING SAFE HABITS ONLINE.
STOP other people from accessing your information by using strong passwords.
THINK before you download apps you aren’t familiar with.
CONNECT with friends safely online by checking your privacy settings regularly.
BEWARE OF PHISHING
Phishing involves criminals sending individuals a seemingly legitimate e-mail request for account information, often under the guise of asking the customer to verify or reconfirm confidential personal information such as account numbers, social security numbers, passwords, and other sensitive information. PLEASE be VERY cautious to NEVER include private numbers in your emails. Remember - if it sounds too good to be true, it probably is!
Don’t Get “CAUGHT”
· Turn off the option to automatically download attachments.
· Save and scan any attachments before opening them.
· Before providing any kind of information, call & verify with the source that they are indeed the ones who sent the email.