Information Security Center

The Internet offers a convenient way to conduct financial transactions. We are committed to maintaining strict standards of security to help protect our customers’ confidential personal and business financial information. Our online security is designed to provide for a secure exchange of information with our customers. We utilize multiple security protocols such as firewalls, data encryption and customer authentication techniques.

If you have any concerns about the privacy and security of your accounts, you can contact us 24 hours a day, 7 days a week.

Our cyber security technology helps protect your personal and financial information. Below are some of the safeguards we have in place to protect against online security breaches.

  • User ID and Password - Online account access is limited to those possessing the user ID and password associated with your account(s).
  • Encryption - Encryption technology protects data in transit between your computer and our systems. The closed lock icon indicates a communication session is encrypted.
  • Firewalls - Firewalls protect against unauthorized access to our systems.
  • Virus Protection - Anti-virus protection technology detects and prevents recognized viruses from entering our computer network.
  • Patching - Regular and consistent patching limits our systems’ vulnerabilities to cyber-attacks.
  • Timeout - Our online system is designed to log you out automatically after several minutes of inactivity.

While we provide for the protection and confidentiality of your online information on our systems, we need your help to ensure your information is protected on your systems. Learn what steps you need to take to protect your information and accounts online by reading more in our Information Security Center.


Jeffrey C. Weeks
Sr. Vice President & Chief Information Security Officer

  • Card Safety

    Simple tips that can give you peace of mind while using your card offline and online.

    Learn More

  • Email & Online Fraud

    Use your email safely with our email safety and phishing tips.

    Learn More

  • Securing Your Mobile Device

    Suggestions to protect the information collected, stored and transmitted using your device.

    Learn More

  • Identity Protection

    Protect your accounts and personal information with a variety of tools and resources.

    Learn More

  • Credit Bureaus

    By reviewing your credit report frequently, you help to protect yourself from identity theft.

    Learn More

  • Privacy Policy

    Explains the categories and ways we collect information.

    Learn More

  • Online Practices

    Information to help you bank online with confidence.

    Learn More

  • Individual Customer Online Safeguards

    Tips for protecting your identity and online transactions.

    Learn More

  • Business Customer Online Safeguards

    Tips for protecting your online business financial transactions.

    Learn More


Recommendations for Corporate Account Takeover Victims

  1. Immediately cease all activity from computer systems that may be compromised.
  2. Immediately contact us so that the following actions may be taken:
    • Disable online access to accounts.
    • Change online banking passwords.
    • Open new account(s) as appropriate.
  3. Ensure that no one has requested an address change, title change, PIN change or ordered new cards, checks or other account documents be sent to another address.
  4. Engage a forensic investigator to determine the source of the breach and to return your system to a secure state for operations.
  5. Maintain a written chronology of what happened, what was lost and the steps taken to report the incident to the various agencies, banks and firms impacted. Be sure to record the date, time, contact telephone number, person spoken to, and any relevant report or reference number and instructions.
  6. File a police report and provide the facts and circumstances surrounding the loss. Obtain a police report number with the date, time, department, location and officer’s name taking the report or involved in the subsequent investigation. Having a police report on file will often facilitate dealing with insurance companies, banks, and other establishments. The police report may initiate a law enforcement investigation into the loss with the goal of identifying, arresting and prosecuting the offender(s) and possibly recovering losses.