The security of your accounts and customer information is something we take seriously no matter how you choose to bank with us—in person, by telephone or through the Internet.
The Bank uses a variety of technologies, such as encryption and firewalls, to help prevent unauthorized access to your personal and financial information.
Our team of technical security specialists work toward ensuring that all financial transactions, data transmissions, and communications are completed in a secure online environment.
To safeguard all financial and personal information, the Bank:
- Requires both a User ID and a password
- Uses encrypted pages for password sign-on
- Maintains high standards for employee training, instilling in each Bank professional a respect for client confidentiality
- Uses systems of record that protect all financial and personal information and that utilize leading security features
Protecting Yourself Online
The Bank has strong security procedures, but you need to protect the security of your computer. Here are the basics of protecting your computer:
Install a firewall
A firewall helps protect your computer from hackers accessing information on your computer and blocks the use of offensive Websites and Emails. Many computer operating systems already have firewalls installed; you just have to turn them on.
Install anti-virus software
New viruses are created everyday. Anti-virus software protects you and the people you communicate with via e-mail by detecting infected files and eliminating the spread of the virus.
Install anti-spyware software
Anti-spyware protects you from a number of unwanted marketing solicitations such as pop-ups and e-mails that can deceptively install Internet tracking devices on your computer.
Keep your software updated
Regularly update your operating system, browser, anti-virus and anti-spyware software. Be sure to scan your computer with your anti-virus and anti-spyware software regularly.
Internet and E-mail Tips
Delete e-mails from unknown senders
Do not open e-mails from a sender you do not know. If a virus is attached to the e-mail, it can be released simply by opening it and will infect your program files. In some cases, it replicates by automatically mailing to your entire e-mail address book.
Do not provide your personal information in an e-mail
Even when communicating with family and friends, avoid sending personal information via e-mail. The Sender Address (“From” field) is easy to forge, so you may in fact not be communicating with people you know. In addition, the unsecured nature of e-mail makes it possible for others to see this information.
Learn to spot fraudulent e-mails
Be aware that counterfeit e-mails often contain logos, hyperlinks and phone numbers that appear to be authentic. Other common identifiers of fraudulent e-mails are misspellings, poor grammar or random characters in the subject line. E-mail scams will try to trick you by:
- Creating a false sense of urgency such as the closing of an account
- Offering prizes and other rewards
- Pretending to confirm recent transactions or verify account information
If an unexpected e-mail requests you to enter a user ID or password, provides a Website link that requests personal information or attempts to rush you into responding, it is more than likely a fraudulent e-mail. You should never respond to these requests.
Golden State Bank does not solicit information (SSN, account numbers, credit card numbers, passwords, etc) by means of e-mail. If you receive an e-mail requesting confidential information from someone claiming to represent Golden State Bank, do not respond to the e-mail. Please contact the Bank to report any solicitation of this kind that you receive.
Protect your passwords
Try to pick passwords that are easy for you to remember but not easy for others to guess. Avoid using Social Security Numbers, birthdays, telephone numbers or other personal information as your usernames or passwords. Do not write them down or share them with anyone. Longer passwords and passwords that combine letters, numbers and special characters are more secure. As an added layer of protection, it is a good practice to change your passwords on a regular basis.
Disconnect from the Internet when idle
Turn off your Internet connection when you're not using it. Attackers cannot access your computer when it isn't connected. High-speed connections are especially at risk.
Carefully review all End User Licensing Agreements
If the licensing agreement is difficult to understand, avoid downloading that software. It may contain spyware.