Back
Next

1 / 11
Protecting Online Accounts for Consumers

Course Overview

You play an important role in the safety of your online bank account. Using technology and following security best practices are crucial to protecting yourself against ever-growing online security threats. Although there is no absolute assurance of security, using technology and secure processes can greatly reduce your risk of becoming a victim.

By the end of this course, you will recognize security best practices to help protect your information and accounts.

2 / 11
***l root***r ***l gui***r ***l interface***r ***l stage/***r ***l top src='' border=''/***r ***l left src='' border=''/***r ***l right src='' border=''/***r ***l bubble path='../images/swf'/***r ***l /interface***r ***l context***r ***l text***r ***l p***r Technology alone is not enough to keep your information secure. Even though your bank has implemented a variety of measures to keep your online account secure, they need your help. Review the following conversation between an online bank account holder and online security expert to learn more.***l /p***r ***l br/***r ***l p***r ***l b***r Instructions***l /b***r ***l /p***r ***l br/***r ***l p***r ***l i***r Click Begin to view a conversation about your role in online banking security. The forward arrow allows you to move through the dialogue.***l /i***r ***l /p***r ***l br/***r ***l /text***r ***l font face='arial' size='11' color='0x000000' bold='false' underline='false' italic='false' bgcolor='0xffffff'/***r ***l /context***r ***l instructions***r ***l text***r ***l /text***r ***l font face='arial' size='11' color='0x000000' bold='false' underline='false' italic='false' bgcolor='0xffffff'/***r ***l /instructions***r ***l feedback***r ***l text***r ***l p***r ***l li***r Banks have implemented a variety of security measures to help protect your account information, but they can't do it alone.***l /li***r ***l li***r Consumers play an important role in the security of their online bank accounts.***l /li***r ***l li***r Click Next to learn security best practices that will help keep your valuable accounts secure. ***l /li***r ***l /p***r ***l br/***r ***l /text***r ***l font face='arial' size='11' color='0x000000' bold='false' underline='false' italic='false' bgcolor='0xffffff'/***r ***l /feedback***r ***l person name='Julie' img='../assets/ashley_customer.png'***r ***l font face='arial' size='11' color='0x000000' bold='false' underline='false' italic='false' bgcolor='0xffffff'/***r ***l /person***r ***l person name='Jim' img='../assets/avatardon.png'***r ***l font face='arial' size='11' color='0x000000' bold='false' underline='false' italic='false' bgcolor='0xffffff'/***r ***l /person***r ***l /gui***r ***l speech***r ***l dialogue person='Julie'***r ***l text***r ***l p***r I've been hearing a lot in the news about banks being targeted by hackers. What is my bank doing to protect my account from an attack like that?***l /p***r ***l br/***r ***l /text***r ***l feedback***r ***l /feedback***r ***l audio***r ***l /audio***r ***l /dialogue***r ***l dialogue person='Jim'***r ***l text***r ***l p***r There are a number of security measures banks take to protect account information, but they can only be effective with your help and cooperation.***l /p***r ***l br/***r ***l /text***r ***l feedback***r ***l /feedback***r ***l audio***r ***l /audio***r ***l /dialogue***r ***l dialogue person='Julie'***r ***l text***r ***l p***r What do you mean?***l /p***r ***l br/***r ***l /text***r ***l feedback***r ***l /feedback***r ***l audio***r ***l /audio***r ***l /dialogue***r ***l dialogue person='Jim'***r ***l text***r ***l p***r Many bank account hijacking attempts are a result of hackers compromising security on devices outside the bank's control. ***l /p***r ***l br/***r ***l /text***r ***l feedback***r ***l /feedback***r ***l audio***r ***l /audio***r ***l /dialogue***r ***l dialogue person='Jim'***r ***l text***r ***l p***r If the bank's customers aren't using security practices, such as a strong password, firewalls, anti-virus and up-to-date software, even the most advanced security measures on your bank's part won't protect your account.***l /p***r ***l br/***r ***l /text***r ***l feedback***r ***l /feedback***r ***l audio***r ***l /audio***r ***l /dialogue***r ***l dialogue person='Jim'***r ***l text***r ***l p***r It is the customer's responsibility to provide sufficient security for their networks and devices that have access to Internet banking services.***l /p***r ***l br/***r ***l /text***r ***l feedback***r ***l /feedback***r ***l audio***r ***l /audio***r ***l /dialogue***r ***l dialogue person='Julie'***r ***l text***r ***l p***r I guess I hadn't thought about my role in online security. So what kind of measures should I be using on a daily basis?***l /p***r ***l br/***r ***l /text***r ***l feedback***r ***l /feedback***r ***l audio***r ***l /audio***r ***l /dialogue***r ***l dialogue person='Jim'***r ***l text***r ***l p***r Some common sense and easily implemented precautions can help you safeguard your personal information from identify theft and account fraud.***l /p***r ***l br/***r ***l /text***r ***l feedback***r ***l /feedback***r ***l audio***r ***l /audio***r ***l /dialogue***r ***l /speech***r ***l titleBox***r ***l instrTitle***r Conversation: Your Role in Online Account Security***l /instrTitle***r ***l feedTitle***r Points to Remember***l /feedTitle***r ***l /titleBox***r ***l /root***r ***l activityAudio***r ***l instructionAudio***r ***l /instructionAudio***r ***l feedbackAudio***r ***l /feedbackAudio***r ***l /activityAudio***r ***l altTags***r ***l closeAlt***r ***l /closeAlt***r ***l instructAlt***r ***l /instructAlt***r ***l submitAlt***r ***l /submitAlt***r ***l playPauseAlt***r ***l /playPauseAlt***r ***l muteUnmuteAlt***r ***l /muteUnmuteAlt***r ***l replayAlt***r ***l /replayAlt***r ***l stepPrevAlt***r ***l /stepPrevAlt***r ***l stepNextAlt***r ***l /stepNextAlt***r ***l restartAlt***r ***l /restartAlt***r ***l feedbackCloseBtnAlt***r ***l /feedbackCloseBtnAlt***r ***l /altTags***r ***l instructionBtnText***r Instructions***l /instructionBtnText***r ***l beginBtnText***r Begin***l /beginBtnText***r ***l feedbackCloseBtnText***r Replay***l /feedbackCloseBtnText***r 
3 / 11
***l p***r There are four basic security measures you can take to help protect your computer and the information on it. ***l /p***r ***l br/***r ***l p***r ***l b***r Instructions***l /b***r ***l /p***r ***l br/***r ***l p***r ***l i***r Click the forward arrow to step through computer security measures.***l /i***r ***l /p***r ***l br/***r ***l p***r ***l b***r Install a Firewall***l /b***r ***l /p***r ***l br/***r ***l p***r A firewall manages what traffic is allowed to enter and exit your computer. It is also used to block your system details from a hacker's view.***l /p***r ***l br/***r ../assets/brickwall.png***l p***r ***l b***r Install Anti-Virus Software***l /b***r ***l /p***r ***l br/***r ***l p***r Anti-virus software helps prevent malware and viruses from installing on your computer. After installing anti-virus software, be sure to keep it up to date.***l /p***r ***l br/***r ../assets/shield_green.png***l p***r ***l b***r Run Security Patches and Updates***l /b***r ***l /p***r ***l br/***r ***l p***r Security patches are fixes published by software developers to help protect against vulnerabilities. Security holes can lead hackers to your computer where they can install malware and steal sensitive information. Anytime a new patch or update is available you should install it right away.***l /p***r ***l br/***r ../assets/portablecomputer.png***l p***r ***l b***r Use Encryption ***l /b***r ***l /p***r ***l br/***r ***l p***r Encryption encodes information making it unreadable to anyone except the person or persons with the key to decrypt it. Encrypt any confidential information stored on laptops, hard drives, USB thumb drives, information traveling over VPN or email communication.***l /p***r ***l br/***r ../assets/encryption.pngIntroduction  Instructions***l p***r Applying these four basic security measures goes a long way towards protecting both your computer and the information on it. ***l /p***r ***l br/***r Point to RememberReturn to Step
4 / 11
***l imageTermWidget***r ***l widgetTitle***r ***l /widgetTitle***r ***l activityInstructions***r ***l p***r ***l b***r Instructions***l /b***r ***l /p***r ***l br/***r ***l p***r ***l i***r Click each image to learn how to tell whether a website is trustworthy.***l /i***r ***l /p***r ***l br/***r ***l /activityInstructions***r ***l pageContent***r ***l p***r Learning about a website and the company behind it before purchasing goods, downloading programs or providing sensitive information is a best practice that will help to keep your sensitive information safe. ***l /p***r ***l br/***r ***l /pageContent***r ***l imageItem***r ***l itemImage***r ../assets/globe_term.png***l /itemImage***r ***l itemText***r ***l /itemText***r ***l contentArea***r ***l text***r ***l p***r Sensitive information should only be shared with websites that have a secure connection. A secure connection is encrypted so that it is unreadable to Web users who do not have the decryption key. One way to tell if a site is encrypted is to look at the address bar at the top of your browser, which begins with ***l i***r http://***l /i***r . If there is an ***l i***r s***l /i***r  after the ***l i***r http***l /i***r  (i.e. ***l b***r ***l i***r ***l e***r https://***l /e***r ***l /i***r ***l /b***r ), then you are on a secure connection. Websites will often change from an ***l i***r http://***l /i***r  to an ***l i***r https://***l /i***r  after you enter your user name and password.***l /p***r ***l br/***r ***l p***r ***l i***r Verify use of secure session (***l b***r ***l i***r ***l e***r https***l /e***r ***l /i***r ***l /b***r ) in the browser for all online banking.***l /i***r ***l /p***r ***l br/***r ***l /text***r ***l image***r ***l /image***r ***l audio***r ***l /audio***r ***l /contentArea***r ***l /imageItem***r ***l imageItem***r ***l itemImage***r ../assets/lockgrey_term.png***l /itemImage***r ***l itemText***r ***l /itemText***r ***l contentArea***r ***l text***r ***l p***r Another way to tell whether a website is secure is to look for a lock icon displayed in the window of the browser.  The lock must be displayed in the browser and ***l b***r not***l /b***r  on the webpage display area. Often, the lock will appear in the browser address bar.***l /p***r ***l br/***r ***l p***r ***l i***r You can click or double click a website's lock icon to view its security details.***l /i***r ***l /p***r ***l br/***r ***l /text***r ***l image***r ***l /image***r ***l audio***r ***l /audio***r ***l /contentArea***r ***l /imageItem***r ***l imageItem***r ***l itemImage***r ../assets/seal_png.png***l /itemImage***r ***l itemText***r ***l /itemText***r ***l contentArea***r ***l text***r ***l p***r Many websites will display a site seal issued by their security vendor(s).  The seal provides visitors to the site additional assurance that the website is secure.  Most seals allow visitors to click the seal to display additional information on the website's security.***l /p***r ***l br/***r ***l p***r ***l i***r Site seals should not be trusted to confirm security on their own.  Always check for ***l i***r https://***l /i***r  and the lock icon.***l /i***r ***l /p***r ***l br/***r ***l /text***r ***l image***r ***l /image***r ***l audio***r ***l /audio***r ***l /contentArea***r ***l /imageItem***r ***l imageItem***r ***l itemImage***r ../assets/checked_shield_green_term.png***l /itemImage***r ***l itemText***r ***l /itemText***r ***l contentArea***r ***l text***r ***l p***r Some websites have taken extra steps to validate their security and assure their visitors that their website is trustworthy.  Extended Validation (EV) Certificates enable secure connections, establish business identities and assist in preventing fraud through a rigorous set of checks and validations.***l /p***r ***l br/***r ***l p***r ***l i***r Sites with EV Certificates will shade the Internet address bar green to let visitors know the website has been validated.***l /i***r ***l /p***r ***l br/***r ***l /text***r ***l image***r ***l /image***r ***l audio***r ***l /audio***r ***l /contentArea***r ***l /imageItem***r ***l instructionsBoxTitle***r Introduction***l /instructionsBoxTitle***r ***l briefInstructions***r ***l /briefInstructions***r ***l instructionsBtnText***r Instructions***l /instructionsBtnText***r ***l /imageTermWidget***r ***l activityAudio***r ***l instructionAudio***r ***l /instructionAudio***r ***l contentAudio***r ***l /contentAudio***r ***l /activityAudio***r ***l altTags***r ***l closeAlt***r ***l /closeAlt***r ***l instructAlt***r ***l /instructAlt***r ***l submitAlt***r ***l /submitAlt***r ***l playPauseAlt***r ***l /playPauseAlt***r ***l muteUnmuteAlt***r ***l /muteUnmuteAlt***r ***l replayAlt***r ***l /replayAlt***r ***l stepPrevAlt***r ***l /stepPrevAlt***r ***l stepNextAlt***r ***l /stepNextAlt***r ***l restartAlt***r ***l /restartAlt***r ***l /altTags***r 
5 / 11
***l p***r The Internet is an incredibly useful tool, but it can also expose your system to a variety of security threats. Let's take a look at a few of the most common mistakes users make when browsing the Internet. ***l /p***r ***l br/***r ***l p***r ***l b***r Instructions***l /b***r ***l /p***r ***l br/***r ***l p***r ***l i***r Click the forward arrow to learn about common mistakes users make when browsing the Internet.***l /i***r ***l /p***r ***l br/***r ***l p***r ***l b***r Clicking on links to unfamiliar websites***l /b***r ***l /p***r ***l br/***r ***l p***r These websites could be set up by hackers to install malware on your system or steal sensitive information.***l /p***r ***l br/***r ../assets/cancle.png***l p***r ***l b***r Sharing sensitive information with unknown or non-secure websites.***l /b***r ***l /p***r ***l br/***r ***l p***r The information you enter on a non-secure form is sent over the Internet in a format that is easily read by other users. ***l /p***r ***l br/***r ../assets/creditcard.png***l p***r ***l b***r Downloading software from unknown or untrustworthy sources.***l /b***r ***l /p***r ***l br/***r ***l p***r These files are often infected with viruses, worms, Trojans and other harmful software that attackers can use to compromise your computer.***l /p***r ***l br/***r ../assets/computer_map.png***l p***r ***l b***r Sharing too much information on blogs, websites, social networking sites, etc.***l /b***r ***l /p***r ***l br/***r ***l p***r Social engineers can take information learned about you on the Web to begin a ploy to get more information from you.***l /p***r ***l br/***r ../assets/quote2.png***l p***r ***l b***r Using weak passwords for online accounts. ***l /b***r ***l /p***r ***l br/***r ***l p***r Weak passwords can be easily cracked by hackers. Additionally, if you use the same password on multiple accounts and one account is cracked, the hacker can then access any other accounts using the same password.***l /p***r ***l br/***r ../assets/lock_open.pngIntroduction Instructions***l p***r Being aware of some of the risks of common online activities and using secure practices while browsing the Web can help to protect your system and information.***l /p***r ***l br/***r Point to RememberResume Activity
6 / 11
***l p***r Check your knowledge on wireless network security. Which of these statements at left are true about wireless network security?***l /p***r ***l br/***r ***l p***r ***l b***r Instructions***l /b***r ***l /p***r ***l br/***r ***l p***r ***l i***r Select all the true statements, then click Submit.***l /i***r ***l /p***r ***l br/***r sample***l p***r Wireless networks can be very insecure.***l /p***r ***l br/***r true***l p***r Wireless networks transmit data in a way that can be easily intercepted and viewed by others.***l /p***r ***l br/***r true***l p***r Wireless networks can be easily used by outsiders, including malicious users, if not set up properly.  ***l /p***r ***l br/***r true***l p***r ***l b***r All the answers are correct!***l /b***r  A, B and C are all security risks created by the use of a wireless network.***l /p***r ***l br/***r ***l p***r ***l i***r Avoid conducting online banking activities from free Wi-Fi hot spots like airports, hotels and Internet cafes. These Wi-Fi networks are insecure and are frequently a target for stealing login credentials.***l /i***r ***l i***r  If you use wireless in your home, make sure that it is set up securely with proper encryption and passwords***l /i***r .***l /p***r ***l br/***r ***l p***r ***l b***r All the answers are correct.***l /b***r   A, B and C are ***l i***r all***l /i***r  security risks created by the use of a wireless network.***l /p***r ***l br/***r ***l p***r ***l i***r Avoid conducting online banking activities from free Wi-Fi hot spots like airports, hotels and Internet cafes. These Wi-Fi networks are insecure and are frequently a target for stealing login credentials.***l /i***r ***l i***r  If you use wireless in your home, make sure that it is set up securely with proper encryption and passwords***l /i***r .***l /p***r ***l br/***r Take a GuessView QuestionAnswerSubmitView Answer
7 / 11
***l p***r Passwords play a critical role in securing information. A ***l b***r ***l i***r ***l e***r strong password***l /e***r ***l /i***r ***l /b***r  is a password that will be difficult if not impossible to guess. Let's look at some tips on how to create a strong password. ***l /p***r ***l br/***r ***l p***r ***l b***r Instructions***l /b***r ***l /p***r ***l br/***r ***l p***r ***l i***r Complete the puzzle by dragging and dropping the pieces to learn best practices for effective passwords.***l /i***r ***l /p***r ***l br/***r ***l p***r Make your password at least nine characters long.***l /p***r ***l br/***r ***l p***r Use at least one alphabetic (letter) and one numeric (number) character. Use at least one (! # $ or ^) special character. Use at least one upper case and one lower case character.***l /p***r ***l br/***r ***l p***r Always change the password provided by a vendor or other system provider.***l /p***r ***l br/***r ***l p***r Do not use a word that is found in the dictionary by itself. Do not use your name or user name in your password.***l /p***r ***l br/***r ***l p***r Do not re-use passwords. ***l /p***r ***l br/***r ***l p***r Keep passwords secret. Never share login IDs or passwords. Never write them down or store them on your computer.***l /p***r ***l br/***r ***l p***r Do not end the password with a set of numbers, such as Smith1234. Numbers should be used randomly throughout.***l /p***r ***l br/***r ***l p***r Change passwords frequently, at least every 3-6 months.***l /p***r ***l br/***r ***l p***r Consider password phrases to make remembering easier for your users.  For example: 'Jack and Jill went up the hill to fetch a pail of water' could be: J&Jwuth2fapow. ***l /p***r ***l br/***r IntroductionPassword TipPassword TipsInstructionsSummary
8 / 11
***l p***r If your password is too simple, hackers can easily crack your password using automated tools that force their way into your system by guessing your password over and over again.***l /p***r ***l br/***r ***l p***r ***l b***r Instructions***l /b***r ***l /p***r ***l br/***r ***l p***r ***l i***r Click to select whether you think the statement is true or false.***l /i***r ***l /p***r ***l br/***r sample***l p***r True***l /p***r ***l br/***r ***l p***r ***l b***r Correct***l /b***r . Hackers have many tools at their disposal to try to guess passwords, including an automated attack, sometimes called a brute force attack.  Brute force attacks use dictionaries and patterns to electronically guess your password.***l /p***r ***l br/***r ***l p***r Always use strong passwords. Even if you have a strong password, it should be changed frequently to protect against brute force attempts to steal it.***l /p***r ***l br/***r true***l p***r False***l /p***r ***l br/***r ***l p***r ***l b***r Incorrect.***l /b***r  Hackers have many tools at their disposal to try to guess passwords, including an automated attack, sometimes called a brute force attack.  Brute force attacks use dictionaries and patterns to electronically guess your password. ***l /p***r ***l br/***r ***l p***r Always use strong passwords. Even if you have a strong password, it should be changed frequently to protect against brute force attempts to steal it.***l /p***r ***l br/***r True or False?View QuestionAnswerView Answer
9 / 11

There are some basic security measures you can take to protect your online bank account. Following these tips can reduce your risk of becoming a victim.

Instructions

Roll over each topic to learn more.

***l optionWidget***r ***l options***r ***l option***r ***l optionTitle***r Report Suspicious Activity ***l /optionTitle***r ***l content***r ***l p***r Make sure to check your online accounts regularly, so you can let your bank know immediately if you encounter anything that does not seem right. Also, see if your bank can send email confirmations of online transactions to provide you with early warning of any fraudulent activity.***l /p***r ***l br/***r ***l /content***r ***l audio***r ***l /audio***r ***l /option***r ***l option***r ***l optionTitle***r Avoid Social Engineering Ploys***l /optionTitle***r ***l content***r ***l p***r Don't get phished or vished. Remember, your bank will never email or call you asking for personal account information. If you receive an email or even a telephone call from your bank asking for personal information, contact your bank to make sure the email or call was legitimate before giving out your information.***l /p***r ***l br/***r ***l /content***r ***l audio***r ***l /audio***r ***l /option***r ***l option***r ***l optionTitle***r Accout Log Out***l /optionTitle***r ***l content***r ***l p***r Always be sure to log off of your online bank account when you are finished.***l /p***r ***l br/***r ***l /content***r ***l audio***r ***l /audio***r ***l /option***r ***l /options***r ***l /optionWidget***r ***l altTags***r ***l closeAlt***r ***l /closeAlt***r ***l instructAlt***r ***l /instructAlt***r ***l submitAlt***r ***l /submitAlt***r ***l playPauseAlt***r ***l /playPauseAlt***r ***l muteUnmuteAlt***r ***l /muteUnmuteAlt***r ***l replayAlt***r ***l /replayAlt***r ***l stepPrevAlt***r ***l /stepPrevAlt***r ***l stepNextAlt***r ***l /stepNextAlt***r ***l restartAlt***r ***l /restartAlt***r ***l /altTags***r 
10 / 11

In this course, you learned about the important role you play in the safety of your online bank accounts, as well as the security best practices that should be implemented to help keep systems and accounts safe. Remember these key points about your role in secure online banking:

  • The bank has a number of security measures in place to help protect account information from fraudsters, but these measures can only be effective with your help and cooperation. Using secure practices will help ensure that your information stays safe.
  • Secure practices include having a strong password, implementing strong computer security measures, and being informed about the websites you visit.
  • Protect yourself by avoiding social engineering ploys, report any suspicious activity on your account, and make sure to always log off your account when you are finished.
  • Avoid conducting online banking activities from free Wi-Fi hot spots like airports, hotels and Internet cafes. These Wi-Fi networks are insecure and are frequently a target for stealing login credentials. If you use wireless in your company or home, make sure that it is set up securely with proper encryption and passwords.

11 / 11

Congratulations! You have completed and passed the Protecting Online Accounts for Consumers course. Now you have the knowledge to protect your information and your assets when you bank online.

You may now exit this browser window or tab to return to your bank's website.