Security & Technology Solutions
Phishing and Spoofing
The most common types of Online Fraud are Phishing and Spoofing. These usually come in the form of fraudulent e-mails that appear to originate from legitimate sources. These e-mails ask customers to verify personal information (phishing) or link to counterfeit (or spoofed) Websites that appear real.
Watch for e-mails that:
Progressive Bank will NEVER ask for sensitive information, such as account numbers, Access IDs or passwords, via e-mail.
Other Common Fraud Methods
Criminals may also use other contact methods to obtain your private information. These include text messages (also known as short message phishing or "smishing") and through phone calls (also known as voice phishing or "vishing"). You might receive a text message, phone call, or voice mail warning that your account may be suspended, frozen, or compromised unless you visit a particular website or call a designated phone number where you will then be asked for personal information. These scare tactics are designed to convince you to provide your information or face negative consequences.
Again, Progressive Bank will NEVER ask for sensitive information, such as account numbers, Access IDs or passwords, via e-mail.
View the FDIC Bank Customer Guides to Cybersecurity 2016. This guide features articles on protecting login information, avoiding identity theft online, and the roles that banks and the government play in protecting our customers.
One of the biggest barriers to consumers adopting Mobile Financial Services is fear of security threats. Most consumers are afraid that their mobile device may be “hijacked”; some fear their sensitive information may be intercepted as it travels across a wireless network; and still others worry about the consequences if their mobile phone is lost or stolen. With most mobile devices lacking the personal firewall, anti-virus software and other protections common today on personal computers, these devices can be vulnerable to a variety of security threats, including:
Best Practices for Mobile Banking Fraud Prevention
Corporate Account Takeover (CATO)
Corporate Account Takeover occurs when a criminal obtains electronic access to your corporate bank account and conducts unauthorized transactions. The criminal obtains electronic access by stealing the confidential security credentials of your employees who are authorized to conduct electronic transactions (wire transfers, Automated Clearing House-ACH, and others) on your corporate bank account. Losses from this form of cyber-crime range from the tens of thousands to the millions, with the majority of these thefts not fully recovered. CATO thefts have affected both large and small banks. See more detailed information about Corporate Account Takeover and how it could affect your business. You can find additional information about staying secure online and protecting your business from Corporate Account Takeover by selecting the link below:
Enhanced Online Security
The Online Banking System brings together a combination of industry-approved security technologies to protect data for the bank for our customers. It features password controlled system entry, a VeriSign-issued Digital ID for the bank's server, Secure Sockets Layer (SSL) protocol for data encryption, and a router loaded with a firewall to regulate the inflow and outflow of server traffic. Using these technologies, your Online Banking transactions are secure.
How to Protect Yourself
What is Identity Theft?
Identity theft occurs when someone acquires your personal information and uses it without your knowledge to commit fraud or theft. It is a serious crime and cases are growing. An all-too-common example is when an identity thief uses your personal information to open a credit card account in your name.
No matter how cautious you are, there is no way to completely prevent identity theft from occurring. But there are ways you can help minimize your risk. This section contains valuable information explaining how you can protect yourself by managing your personal information wisely; the warning signs of identity theft; and what to do if you do become a victim.
For these tips and more, see Identity Theft: It Can Happen to Anyone.
In the wake of the most recent widespread data breach, the Federal Trade Commission has created a brief video for consumers instructing you about the proper steps to take if you believe that your information has been breached. Follow the links below to access the video or to access additional information at IdentityTheft.gov.
Check Your Credit Report
Order a copy of your credit report from each of the three major credit-reporting agencies every year. Make sure it is accurate and includes only those activities you have authorized. Under the Fair and Accurate Credit Transactions Act (FACT Act) consumers can request and obtain a free credit report once every 12 months from each of the three nationwide consumer credit reporting companies.
By checking your report on a regular basis you can catch mistakes and fraud before they wreak havoc on your personal finances. Don't underestimate the importance of this step.
If you become a victim, contact:
Progressive Bank is committed to safeguarding our customers' financial information. Maintaining our customers' trust and confidence is a top priority.
Keeping customer information secure is a top priority for all of us at Progressive Bank. Confidentiality is an important commitment we make to our customers. This policy will explain how we handle the personal information about you that we collect and may disclose. This notice applies to former customers as well as current customers. View the Privacy Notice.
In this notice, we refer to "our affiliates". When we do, we mean our company which is part of the Progressive Bancorp, Inc. family. These affiliates include Progressive Bank and Progressive Financial Advisors, Inc., L.L.C. On the other hand, when we refer to "non-affiliated third parties", we mean companies that are not part of the Progressive Bank family.
Confidentiality and Security Practices
Progressive protects the nonpublic personal information we collect about you by maintaining physical, electronic, and procedural safeguards that comply with federal standards. We train the people who work for us on how to properly handle your personal information. We restrict access to nonpublic personal information about you to persons who need to know that information to provide products and services to you.