Welcome!

News Feed Item

Top Five Mobile Banking Security Tips From Tech CU

First Major Mobile Banking Threats Hit the U.S.; What Consumers Need Know

SAN JOSE, CA -- (Marketwired) -- 08/27/14 -- A record number of consumers today are banking on their mobile devices for everything from balance inquiries to mobile deposits. According to research group AlixPartners, mobile banking is now used by 28 percent of banking Americans, with 60 percent of smartphone/tablet users saying mobile banking capabilities are "important" or "extremely important" in their decision to switch banks. With this convenience, however, comes the potential for fraud and security breaches.

This summer, the first major mobile security threats hit the U.S. -- malware called Svpeng and HijackRAT -- signaling financial institutions to step up security. Technology, however, is less of a risk factor in mobile security than consumer behavior, according Kevin Alsup, vice president of information and administration at San Francisco Bay Area credit union Tech CU.

"We use multiple forms of identity authentication, log-in procedures and encrypted communications, and perform extensive native app and WAP security testing to prevent criminals from accessing confidential information," he explained. "The bigger threat is someone who is unmindful while online, but a few simple steps can help prevent fraudulent activity, especially for things like hacking and phishing."

Here are five things Tech CU recommends everyone do to protect against fraud while banking on their mobile device:

1. Protect Your Device

  • Password protect your mobile device with a strong PIN that's not easily associated with you, lock your device when not in use, and always keep it in a safe location.
  • Do not hack or modify your device. This may leave it susceptible to infection from a virus.
  • Whenever possible, install mobile security software on your device. Only use software from reputable providers, such as McAfee Mobile Security.
  • If you change your mobile number or lose your phone, immediately contact your financial institution to change your mobile banking profile.
  • Perform regular, automatic backups of your mobile device data, which allows for quicker data recovery when needed.

2. Verify Apps and Keep Systems Up-to-Date

  • Only download mobile apps from trusted sources. Before downloading any mobile banking app, verify that it's from your financial institution.
  • Ensure all apps and your operating system are up-to-date and know what security features, operating system components, or access controls you are granting.
  • If you think you've downloaded a fraudulent mobile app, contact your financial institution immediately.

3. Be Smart About What Information You Share and Where You Share It

  • Protect your information on public, unsecured WiFi networks. Best practice: don't conduct transactions where you need to reveal personal or private information on an open network.
  • Never disclose personal information about your accounts via a text message (i.e. account numbers or passwords) or any information that can be used to steal your identity, such as your social security or driver's license number.
  • Frequently delete text messages from your financial institution.

4. Monitor Frequently

  • Monitor your accounts regularly, and turn on alerts to stay abreast of any suspicious activity.
  • Watch for notifications from your financial institution about the dangers of malware, scams or questionable free apps.

5. Report Immediately

  • If you see fraudulent activity on your account, contact your financial institution immediately.
  • Review and consider placing a fraud alert on your credit reports. Close or change any accounts that you know, or believe, have been tampered with or opened fraudulently.

Visit www.techcu.com or contact Tawnya Lancaster for more information.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
What sort of WebRTC based applications can we expect to see over the next year and beyond? One way to predict development trends is to see what sorts of applications startups are building. In his session at @ThingsExpo, Arin Sime, founder of WebRTC.ventures, will discuss the current and likely future trends in WebRTC application development based on real requests for custom applications from real customers, as well as other public sources of information,
Virtualization over the past years has become a key strategy for IT to acquire multi-tenancy, increase utilization, develop elasticity and improve security. And virtual machines (VMs) are quickly becoming a main vehicle for developing and deploying applications. The introduction of containers seems to be bringing another and perhaps overlapped solution for achieving the same above-mentioned benefits. Are a container and a virtual machine fundamentally the same or different? And how? Is one techn...
SYS-CON Events announced today that Infranics will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Since 2000, Infranics has developed SysMaster Suite, which is required for the stable and efficient management of ICT infrastructure. The ICT management solution developed and provided by Infranics continues to add intelligence to the ICT infrastructure through the IMC (Infra Management Cycle) based on mathemat...
SYS-CON Events announced today that Interoute, owner-operator of one of Europe's largest networks and a global cloud services platform, has been named “Bronze Sponsor” of SYS-CON's 20th Cloud Expo, which will take place on June 6-8, 2017 at the Javits Center in New York, New York. Interoute is the owner-operator of one of Europe's largest networks and a global cloud services platform which encompasses 12 data centers, 14 virtual data centers and 31 colocation centers, with connections to 195 add...
SYS-CON Events announced today that Cloudistics, an on-premises cloud computing company, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Cloudistics delivers a complete public cloud experience with composable on-premises infrastructures to medium and large enterprises. Its software-defined technology natively converges network, storage, compute, virtualization, and management into a ...
What if you could build a web application that could support true web-scale traffic without having to ever provision or manage a single server? Sounds magical, and it is! In his session at 20th Cloud Expo, Chris Munns, Senior Developer Advocate for Serverless Applications at Amazon Web Services, will show how to build a serverless website that scales automatically using services like AWS Lambda, Amazon API Gateway, and Amazon S3. We will review several frameworks that can help you build serverle...
Now that the world has connected “things,” we need to build these devices as truly intelligent in order to create instantaneous and precise results. This means you have to do as much of the processing at the point of entry as you can: at the edge. The killer use cases for IoT are becoming manifest through AI engines on edge devices. An autonomous car has this dual edge/cloud analytics model, producing precise, real-time results. In his session at @ThingsExpo, John Crupi, Vice President and Eng...
In the enterprise today, connected IoT devices are everywhere – both inside and outside corporate environments. The need to identify, manage, control and secure a quickly growing web of connections and outside devices is making the already challenging task of security even more important, and onerous. In his session at @ThingsExpo, Rich Boyer, CISO and Chief Architect for Security at NTT i3, will discuss new ways of thinking and the approaches needed to address the emerging challenges of securit...
The taxi industry never saw Uber coming. Startups are a threat to incumbents like never before, and a major enabler for startups is that they are instantly “cloud ready.” If innovation moves at the pace of IT, then your company is in trouble. Why? Because your data center will not keep up with frenetic pace AWS, Microsoft and Google are rolling out new capabilities In his session at 20th Cloud Expo, Don Browning, VP of Cloud Architecture at Turner, will posit that disruption is inevitable for c...
SYS-CON Events announced today that Loom Systems will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Founded in 2015, Loom Systems delivers an advanced AI solution to predict and prevent problems in the digital business. Loom stands alone in the industry as an AI analysis platform requiring no prior math knowledge from operators, leveraging the existing staff to succeed in the digital era. With offices in S...
There are 66 million network cameras capturing terabytes of data. How did factories in Japan improve physical security at the facilities and improve employee productivity? Edge Computing reduces possible kilobytes of data collected per second to only a few kilobytes of data transmitted to the public cloud every day. Data is aggregated and analyzed close to sensors so only intelligent results need to be transmitted to the cloud. Non-essential data is recycled to optimize storage.
In his General Session at 16th Cloud Expo, David Shacochis, host of The Hybrid IT Files podcast and Vice President at CenturyLink, investigated three key trends of the “gigabit economy" though the story of a Fortune 500 communications company in transformation. Narrating how multi-modal hybrid IT, service automation, and agile delivery all intersect, he will cover the role of storytelling and empathy in achieving strategic alignment between the enterprise and its information technology.
"I think that everyone recognizes that for IoT to really realize its full potential and value that it is about creating ecosystems and marketplaces and that no single vendor is able to support what is required," explained Esmeralda Swartz, VP, Marketing Enterprise and Cloud at Ericsson, in this SYS-CON.tv interview at @ThingsExpo, held June 7-9, 2016, at the Javits Center in New York City, NY.
As businesses adopt functionalities in cloud computing, it’s imperative that IT operations consistently ensure cloud systems work correctly – all of the time, and to their best capabilities. In his session at @BigDataExpo, Bernd Harzog, CEO and founder of OpsDataStore, will present an industry answer to the common question, “Are you running IT operations as efficiently and as cost effectively as you need to?” He will expound on the industry issues he frequently came up against as an analyst, and...
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem" ...