HomeCustomer Security

Customer Security

As your financial partner, River Valley uses a variety of tools to protect your confidential information. Despite our best efforts, identity theft and fraud continue to be one of the fastest growing crimes in our country and one of the top customer concerns.

Click below to get more information on how to help protect yourself and your business from identity theft and fraud.
 

How we protect you and your information

The same industry standards we employ to keep online banking secure extend to our mobile banking application as well. We use:
  • Username and password to confirm your identity and ensure the privacy of each mobile banking session you conduct
  • Personal security question to further guard against identity theft
  • Firewalls - to protect our programs from any unauthorized or malicious intrusion
  • Encryption - to protect the transmission of data including customer account information and the integrity of all transactions
Each mobile and online banking session begins only after you establish your identity via unique ID and password. These are required every time you log in. Your session automatically ends when you exit the application, and it will automatically time out if you get sidetracked.
 

How you can protect yourself and your information

Protect your phone or tablet device just as you would your computer. Secure your mobile device by using a strong passcode and be cautious about the sites you visit and the information you release. Create a safe mobile banking password To help you choose a secure password, we’ve created a few tips to help protect your mobile banking password:
  • Include punctuation marks and/or numbers
  • Mix capital and lowercase letters
  • Include similar looking substitutions, such as the number zero for the letter “O” or $ for the letter “S”
  • Create a unique acronym
  • Include phonetic replacements such as “Luv2laugh” for “Love to laugh”
  • Include special characters such as ! @ # $ ^ &
  • Never tell your password to anyone
  • Never write down your password
  • Never send your password via email
  • Periodically change your password


What not to do:
  • Don’t reuse passwords to multiple accounts
  • Don’t use a password that is listed as an example of how to pick a good password
  • Don’t use passwords that contain personal information
  • Don’t use sequential numbers such as 1234
  • Don’t use repeating letters, numbers or characters


Update your mobile devices
Mobile devices are actually small computers with software that you need to update just like on a PC or laptop. Make sure all your mobile devices (including laptops, tablets, smartphones) have the latest security protection. Check the website of your devices manufacturer or mobile carrier for the latest software updates.

Avoid public internet connections.
Public connections aren't very secure -- most places that offer a public Wi-Fi hotspot warn users not to share sensitive information over the network. If you need to access your account information, you may want to switch to another network. If you're using a mobile device, disabling the Wi-Fi and switching to a cellular network is a good solution. You never know who might be listening in over the public network.

Take extra precautions if printing sensitive information to a public printer. Most printers have computer-type components and can, at times, store images of the previous few documents printed. Also depending on the location of the printer in proximity to your device, someone could retrieve your documents before you can get to them. If you do print or submit a print job to a public printer, ensure you retrieve all of your documents before leaving.
 

How to stay safe when shopping online

When banking and shopping on your mobile device or your computer, check to be sure the sites are secure. Look for web addresses with https: in the address. This means the site takes extra measures to help secure your information. Many sites now feature a color-coded browser. If you see a green highlighted browser, this is a safe site. However, yellow and red sites should be avoided.

How to stay safe when using our mobile app

Before you download an application (app) on your device, review the privacy policy and understand what specific data the app can access. Only download apps from reputable sources. You can download the River Valley iPhone or the River Valley iPad App from the iTunes App Store, the River Valley App for Android from Google Play or Amazon App Stores.

Criminals may develop and publish fake mobile banking applications that look like official River Valley apps but are in truth designed to steal your Online Banking credentials. Here are tips for recognizing an unofficial River Valley app:
  • The developer or author of the application is not River Valley
  • The app is being promoted on a third-party site, somewhere other than the official app store for your mobile device
  • There is a charge for downloading the app—River Valley does not currently charge for mobile app downloads
  • Your personal ID security picture won’t show or won’t be the one you chose when you set up your online ID

To help protect your accounts and information, never download or install a River Valley app if you spot any of these warning signs.

Quick Response (QR) codes can direct your mobile device to a malicious site. If you receive a QR code via email, be cautious and follow the tips below to help you identify the email as being sent is legitimate.
  • Check the sender, header and footer details carefully to help confirm it is a valid email from a sender you recognize.
  • Quick Response (QR) codes that are not from a sender you know may direct your mobile device to a malicious site so proceed with caution if you receive one via email.

How to protect your device

SMShing is phishing that happens via SMS text message. A criminal sends you a text message that tries to trick you into replying with financial or personal information or clicking on links that will sneak viruses onto your mobile device. Don’t respond to a text message that requests personal or financial information. River Valley Bank will never ask you to provide your information in this way.

Viruses, malware and other programs intended to steal your personal information or financial details are able to infect some mobile devices. If your tablet supports a traditional anti-virus product, consider installing that software. Backup the device's data and keep the copy in a safe and secure location. This will allow you to restore your data in the event you need to wipe the device clean in order to remove a harmful software threat. Mobile phones and tablet devices offer convenience, but they're also easy to lose or steal, which can put your information at risk. Here are some ways you can protect yourself now in the event your device is lost or stolen later:
  • Keep it safe. Maintaining physical control of your device is the first way to prevent abuse.
  • Use your security features. Use a passcode or PIN to help protect your device. Enable remote wipe and location features to help ensure that your personal information is protected if your device is lost or stolen.
  • Enable an automatic screen-locking mechanism to lock the device when it’s not actively being used
  • Consider using a remote wipe program that gives you the ability to send a command to your device that will delete any data
  • Keep a record of the device’s make, model and serial number in case it’s stolen

How to protect your business

Awareness is one of the best ways you can protect your business against fraud and account takeovers. The United States Secret Service, the Federal Bureau of Investigation, the Internet Crime Complaint Center (IC3), and the Financial Services Information Sharing and Analysis Center (FS-ISAC) have developed a joint awareness and educational document which can be used as a toll to help business owners mitigate the risk of account takeover. Click here to access this tool.

How to secure your smartphone

The Federal Communication Commission developed a tool to help smartphone owners protect themselves against mobile security threats. To use this tool, click here. Choose your mobile operating system and follow the 10 customized steps to secure your mobile device.