Westbury Bank Logo Westbury Bank

Online Banking

Log In

Error, press "Log In" to continue.

Log In

Error, press "Log In" to continue.

Security - YOU Can Fight Fraud

What if a bank empowered you to protect yourself? Welcome to fighting fraud.

Your best defense against fraud is YOU – we encourage you to learn as much as you can so that you can recognize red flags and fight fraud. Here's all sorts of information on ways to protect yourself from fraudsters. 

Personally Identifiable Information

Personally identifiable information is any information that can be used to identify, locate, or contact an individual. This includes, but is not limited to – your name, Social Security number, date of birth, address, and phone number.

Pay attention to where you might use, or share, your personally identifiable information. Don’t include any identifying information in your passwords, PIN numbers, or passcodes. Unless absolutely required for a legitimate business purpose, avoid giving out your:

  • Address and zip code
  • Phone number
  • Date of birth
  • Social security number
  • Card or account numbers
  • Card expiration dates
The following links are resources to learn more about how to protect, store, and use your personally identifiable information.

Safeguarding Sensitive PII Factsheet Protecting Your Privacy

Your Devices

You've got the world at your fingertips with all your devices... and a whole world of bad guys trying to take control of them. Take steps to secure your tablet, phone, laptop, computer, or whatever device you use:

  • Set a PIN or use a biometric lock on your device to prevent unauthorized physical access to your device’s contents.
  • Set a PIN with your mobile carrier to help combat phone number hijacking.
  • Only load apps and software that you know are trustworthy.
  • Keep your software up to date.
  • If you change your phone number or email address, be sure to notify Westbury Bank.
Here is more info on how to protect your devices.

Your Data Your Privacy Device Theft SIM Swap Fraud

Spam

No, not the canned meat... We've all encountered unwanted calls, texts, emails, and junk mail. What if there was something you could do about all that spam? Welcome to what if. 

You have options to fight those dirty, rotten spammers.

Unwanted Calls Unwanted Emails, Texts, and Mail Spam Texts Robocalls

Debit Card Security

To protect your account, we monitor your debit card transactions for potentially fraudulent activity which may include a sudden change in locale (such as when a U.S. - issued card is used unexpectedly overseas), a sudden string of costly purchases, or any pattern associated with new fraud trends around the world.

To help protect you:

  • Please note that your debit card has a zero liability protection.
  • To help stop fraudulent charges, Westbury Bank utilizes sophisticated fraud-monitoring tools to oversee account transactions and detect suspicious activity.
  • You will receive an automated call or text to verify transactions if we notice any suspicious activity on your debit card. You will never be asked for information such as a card number, PIN, or 3-digit code on the back of the card. If we are unable to contact you, we may block the card to prevent further fraud until we are able to verify your transactions.

Here’s what you can do:

  • Be diligent in monitoring transaction activity on your account and contact us immediately if you identify any fraudulent transactions.
  • Use Online Banking or Mobile Banking to monitor your account for any unauthorized transactions.
  • Contact us if you plan to travel outside of the United States.
  • Keep your contact information updated.
  • Contact us if you notice any suspicious activity on your account at 1-800-679-8287.

Likes And Tags And Emails, Oh My!

The world wide web is the greatest thing since sliced bread. It's a magical place of communication, information, and diversion. Unfortunately there are also dark corners where scammers lie in wait. Those corners often include the places we frequent most online - email accounts and social media platforms.

Email Account Security

Email accounts are often targeted by scammers as a way of taking over your computer or device, installing hidden spyware, or tricking you into giving up your personal identifying information. Some hackers may try to take over your accounts altogether.

Fraudulent emails may seem to come from reputable sites but carry bad links taking you to fake login sites or attachments that install unwanted software. These bad emails will often have typos or a sense of urgency.

Stay alert to warning signs that your email accounts are at risk:

  • Emails with typos in the sender, body, or links.
  • Unsolicited emails asking you to update or verify account information.
  • You can't log into your email accounts.
  • Your sent folder has messages you didn't send or has been emptied.
  • Friends and family are getting emails you didn't send, sometimes with random links or fake pleas for help or money.

Some ways to protect your email accounts are:

  • Use strong passwords for your accounts and turn on multi-factor authentication.
  • Never give out your username and password for email accounts.
  • Install and update security software, use a firewall, and enable automatic updates on the security of your devices.
  • Regularly check your account settings:
    • Check your email signature for unfamiliar links.
    • Check for and delete any "rules" you didn't set up on your email accounts like automatic forwarding.
    • Review your email Sent, Trash, and Deleted folders regularly for emails you don't recognize.

Social Media Safety

Social media is a huge source for cybercriminals to gain your private information. You give away lots of personally identifiable information in those fun quizzes! Bad guys can hide out in social networks, requesting to be your friend and then using your personal profile information to hack your accounts.

As you troll the reels, make sure your account is secure by looking out for these warning signs:

  • Your social media accounts have posts you didn't make.
  • You can't log into your social media accounts.
  • Friends and family are getting odd messages you didn't send.

You can take actions to protect and secure your social media accounts:

  • Create strong passwords and use multi-factor authentication whenever you can.
  • Don't share things like pet names, schools you attended, links to family members, or your birthday on social media platforms.
  • Keep your usernames and passwords a secret. 
  • Look for changes since your last login to social media like new "friends" or "contacts".
Here are some tips to safely use email and social media accounts.

Social Media Security Online Privacy and Security Phishing Scams

Identity Theft

Identity Theft is the fastest growing crime. On average, it is about 3 months before a person even realizes they’ve been victimized. It can happen in many different ways: theft of a purse or wallet, "Dumpster Diving" for personal information you’ve discarded, mail theft, using online data, and even "Shoulder Surfing" when someone looks over your shoulder to steal information... rude.

You can set up alerts on your bank account to help you spot suspicious activity like invalid logins, transactions, or fraudulent online charges. Many notice a problem when their credit card bills arrive with unauthorized charges. Others learn about it when they find their credit rating has been trashed. The point is, if your identity is stolen, you need to act quickly. You need to contact one of the three major credit bureaus: Equifax, Experian, and TransUnion. Ask that a Fraud Alert be placed on your file and that no credit be granted without your permission.

Please check the additional links below for more information on Identity Theft. It could save you a lot of trouble.

Free Credit Reports Identity Theft Resources Understanding Credit and Debt SIM Swap Fraud REPORT IDENTITY THEFT

Don't stop here! Keep exploring with these links.

Our Security Business Security Common Scams Your Resources REPORT FRAUD

Only YOU can prevent forest fires... er, fraud attacks. Any further questions or comments, please contact us.

 


 

Back to Top