For your convenience you can now access your account directly from the homepage.
You want the safest, most reliable process for accessing your financial information. eStatementssm (electronic statements) allow you to view and reconcile your accounts more quickly. You’re in total control — you say where; you say when. Intercepting or rerouting your mail is a common fraud tactic. eStatementssm eliminate the worry of lost or stolen statements.
To sign up to receive your account statements electronically instead of the traditional paper statement, simply login to online banking and follow the steps. We highly recommend all our customers take advantage of this free service. eStatementssm will simplify your life, help the environment — and provide an extra level of security.
Your protection continues with MasterCard SecureCode®
We have enhanced security to your debit card by participating in the MasterCard SecureCode® program. This free online security service guards you against unauthorized use of your MasterCard when shopping online at participating merchants. It is just like entering your PIN at an ATM.
Click here to register.
Most participating merchants display the MasterCard SecureCode® logo on their site. If the merchant is not a SecureCode® participant, you will simply use your card as you have been doing.
Click here for more MasterCard SecureCode® frequently asked questions.
Added protection for your ATM/debit card
If a questionable transaction is detected on your card, you will be contacted by the bank, or a fraud specialist (third party vendor) calling on our behalf, to verify the transaction in question. For example: while you’re at the neighborhood grocery buying a few staples, you simultaneously make a purchase in Europe. Not only is this unlikely — it’s impossible.
If the transaction is valid, no action is taken. If you confirm the transaction as fraudulent, we immediately eliminate the card’s access to your account, making it impossible for the card to be used for further unauthorized transactions. By identifying our customers’ general spending patterns, and watching for transactions that appear out of the ordinary, we reduce your risk of fraud.
Important: All information is kept strictly confidential. You will always be contacted by phone. That is why it is critical we have your current telephone numbers on file. If we are unable to make timely contact with you, your ability to use your debit card will be impeded. We don’t want you experiencing such an inconvenience! For your security, no one at First American Bank, including fraud specialists working on our behalf, will ever send a text message to your cell phone, or email you regarding potentially fraudulent transactions.
To update your contact information, or if you have questions about this system, please contact your personal or business banker.
First American Bank delivers the highest level of security for our personal online customers by adding an additional layer of security to our log in process called Online Banking Security. Every time you log in to personal online, First American Bank identifies you, and lets you identify First American Bank using a private image and phrase. Click here for more information.
First American Bank’s website utilizes 128-bit encryption to secure your confidential account information. When data is sent, it is scrambled so it cannot be understood by unauthorized people. The data is then unscrambled when it is received by First American Bank personnel.
First American Bank promises to respect your privacy, keep your information secure and use your information responsibly. If you have a concern about our privacy practices, please contact your personal or business banker. To view the full statement, click here.
Identity thieves prey on the uninformed and unsuspecting. Knowledge is protection. First American Bank is dedicated to raising awareness of identity theft and fraud. Our website is updated regularly to keep you advised of prevalent scams. Click here to visit the Federal Trade Commission.
First American bank is dedicated to helping you reduce your risk of being victimized. Identity theft is the fastest-growing white-collar crime and can rob you of your money…your credit…and your good name. Are you doing everything you can to protect your identity? Test yourself with our ID Theft Quiz.
As you make travel plans, take into consideration these tips for protecting your identity while traveling.
Before You Leave
During Your Travel
Click here for a handy tool to take with you on your travels, just in case!
"Corporate account takeover" is when cyber-thieves gain control of a business' bank account by stealing the business' valid online banking credentials. Although there are several methods being employed to steal credentials, the most prevalent involves malware that infects a business' computer workstations and laptops.
A business can become infected with malware via infected documents attached to an e-mail or a link contained within an e-mail that connects to an infected web site. In addition, malware can be downloaded to users' workstations and laptops by visiting legitimate websites - especially social networking sites - and clicking on the documents, videos or photos posted there. This malware can also spread across a business' internal network.
The malware installs key logging software on the computer, which allows the perpetrator to capture a user's credentials as they are entered at the financial institution's web site. Sophisticated versions of this malware can even capture token-generated passwords, alter the display of the financial institution's web site to the user, and/or display a fake web page indicating that the financial institution's web site is down. In this last case, the perpetrator can access the business' account online without the possibility that the real user will log in to the web site.
Once installed, the malware provides the information that enables the cyber-thieves to impersonate the business in online banking sessions. To the financial institution, the credentials look just like thelegitimate user. The perpetrator has access to and can review the account details of the business, including account activity and patterns, and ACH and wire transfer origination parameters (such as file size and frequency limits, and Standard Entry Class (SEC) Codes).
The cyber-thieves use the sessions to initiate funds transfers, by ACH or wire transfer, to the bank accounts of associates within the U.S. These accounts may be newly opened by accomplices or unwitting "money mules" for the express purpose of receiving and laundering these funds. The accomplices or mules withdraw the entire balances shortly after receiving the money, and then send the funds overseas via over-the-counter wire transfer or other common money transfer services.
The cyber-thieves appear to be targeting small- to medium-sized businesses, as well as smaller government agencies and nonprofits, for several reasons:
This is for information purposes and is not intended to provide legal advice. The guidance included is not an exhaustive list of actions and security threats change constantly.
Sources: NACHA and the Financial Services-Information Sharing and Analysis Center