skip to main content
X

Leaving Website Disclosure

This link will redirect you to a site that may have certain associated risks, including not being insured by federal deposit insurance.

To remain at our site, click BACK. To leave our site for the link you selected, click OK.

Thank you for visiting Central Pacific Bank's website.

Banner

Mobile Banking

Provides convenient and secure access to your accounts while on the go. Choose from SMS text banking, mobile website browser banking, or downloadable apps for iPhone® and Android.

Mobile Banking
Enroll Now
Supported Devices iPhone® and Android™ Use your mobile device's browser Use your phones SMS text
CPB Mobile Banking is free to all CPB Online Banking customers. times times times
View Available Account Balances times times times
View Recent Transaction History times times times
Transfer Funds Between Eligible CPB Accounts times times times
Pay Bills to Existing Payees times times  
Locate CPB ATM's and Branches times times  
Change Mobile PINs times times  
Contact the Bank's Customer Service Center times times  
Make a Mobile Deposit times    

download iconDownload Available

Image

Mobile Check Deposit Service

Now you can deposit your check at any time by using our Mobile Check Deposit Service through our mobile banking application. It's fast and easy and best of all it can be done at your convenience.

Learn More

Mobile Payments

Use you Central Pacific Bank Debit MasterCard at merchants who accept contactless payments through a mobile device.

You can make contactless transactions, typically for low-value amounts, at merchant terminals that display the contactless symbol: The Contactless Symbol. And, because you won’t be physically handing over your card, your card number and identity is kept secure and your transactions private.

Popular apps that help make contactless transactions possible include Apple Pay, Google Pay and Samsung Pay.

To learn how to get started with mobile payments, visit Apple Pay®, Google Pay™, Samsung Pay and MasterPass™.

Apple Pay® Frequently Asked Questions.

It’s simple to get started

It’s simple to get started

Mobile purchasing offers an easy way to pay without pulling your Central Pacific Bank debit or credit card options make it simple to add your card to your device and get started.

Convenience at check out

Convenience at check out

Free yourself from the hassle of searching for the correct card at check out—simply pull out your phone. Paying inside of popular apps is convenient too. Use mobile purchasing to pay quickly.

A secure way to pay

A secure way to pay

All of the payment technologies use a form of encryption to create virtual card numbers—your card’s information isn’t shared with a merchant.

Image

Web

Your desktop web browser in your phone:
Use CPB’s mobile optimized website to check your balances, transfer funds and pay bills.

CPB’s Mobile Banking website allows you on the go access to your accounts:

  • CPB Mobile Banking is free to all CPB Online Banking customers. Standard data/text fees may apply.
  • View account balances on all accounts
  • View recent transactions
  • Transfer funds between eligible CPB accounts
  • Pay bills to existing payees1
  • Search for CPB branches and ATM locations by zip code
  • Contact our Customer Service Center
Image

SMS Text Banking

Check Accounts, View Transactions, Transfer Funds

CPB’s SMS text banking is a fast and convenient way to bank on your phone. Use your device’s SMS texting to:

  • Check your available account information
  • View recent account transaction history
  • Transfer between eligible CPB accounts
Learn More

Important Information:

  1. Enrollment in CPB Online Banking is required to access CPB Mobile Banking.
    Online enrollment in Bill Pay is required to access the Bill Pay features in CPB Mobile Banking.

An internet-enabled device is required to access CPB mobile banking app and web browser. Standard data/text fees apply. Contact your wireless carrier for details. iPhone is a registered trademark of Apple Inc., App store is a service mark of Apple Inc. Android is a registered trademark of Google, Inc.

FAQ

General Questions

  • What is CPB Mobile Banking?

    Customers are able to access Central Pacific Bank Mobile Services via the following channels:

    • Mobile SMS Text Banking
    • Mobile Web Browser (aka WAP or XHTML) – works on any mobile device that has an internet connection, regardless of whether it’s a smartphone or not.
    • Native smartphone applications for iPhone® and Android™

    The table below describes the mobile user functions available through the various mobile channels:

    Supported Devices iPhone® and Android™ Use your mobile device's browser Use your phones SMS text
    CPB Mobile Banking is free to all CPB Online Banking customers. times times times
    View Available Account Balances times times times
    View Recent Transaction History times times times
    Transfer Funds Between Eligible CPB Accounts times times times
    Pay Bills to Existing Payees times times  
    Locate CPB ATM's and Branches times times  
    Change Mobile PINs times times  
    Contact the Bank's Customer Service Center times times  
  • How much does it cost to use CPB Mobile Banking?

    There is currently no charge for CPB Mobile Banking. There may, however, be charges from your mobile carrier associated with text messaging and data usage/internet access on your phone as standard data usage fees apply. Please contact your mobile carrier for details.

  • Do I have to be enrolled in CPB Online Banking to use CPB Mobile Banking?

    Yes. CPB Mobile Banking customers must first sign up for CPB’s Online Banking services. Go here to enroll.

  • Do I need a text message or data plan?

    A text message plan is required in order for you to send and receive information via text banking. For access via mobile web and via the mobile application, you will need an internet connection either through a wireless connection or via a data plan. Please check with your wireless carrier for more information on data plans.

  • Is CPB Mobile Banking Secure?

    Yes. The CPB Mobile Banking service utilizes industry standard security protocols and the same security infrastructure as CPB Online Banking including:

    • Highest level HTTPS encryption with 128-bit AES key encryption certificates for all traffic between the mobile device and the Internet and Mobile Banking Servers.
    • Connection via secured-socket layer (SSL).
    • No data or application pages are stored on the mobile device with each page being retrieved on-demand.
    • Authentication session-based using a Mobile Login; Mobile PIN and the same security used for Online Banking to authenticate the user for the duration of their browsing session.
    • Mobile Password 3-strike Lockout. Customers can unlock themselves by changing their Password within Online Banking or calling us.
    • Application time out when your phone is not in use.

    Each SMS text message request authenticates separately by checking that the mobile number of the device used to send the request corresponds to the device number registered for the user initiating the transaction.

    Account values used by text commands are the account nickname used within CPB Online Banking or a masked account number; they do not contain any unmasked account numbers.

    In the event your phone is lost or stolen, your CPB Mobile Banking access can be suspended immediately by logging in to CPB Online Banking and un-enrolling in CPB Mobile Banking by clicking “Other Services” then “Mobile Banking” then “Unenroll” or by calling our Customer Service Center at 1-800-342-8422 or 808-544-0500 (Oahu).

  • Can I use the same mobile number for different Online Banking Accounts?

    Yes, a specific mobile number can be utilized more than once. Note, however, that whichever Online Banking login ID that first registers for CPB Mobile Banking will be the only login ID capable of utilizing SMS Text Banking.

  • Can I sign-on to my CPB Mobile Banking account from a different phone number than I registered for?

    For the web browser and native applications, you can login from any mobile device as long as you have your mobile username, PIN and can answer the challenge questions.

    To use SMS Text Banking, however, that is unique to your mobile number that you enrolled in for your accounts.

  • What if I do not remember my User ID or Password?

    Call our Customer Service Center at 808-544-0500 or Toll Free at 1-800-342-8422 and a representative will assist you.

  • When enrolling my device, what do I use for a mobile number if I am using a tablet or MP3 device, such as an iPod Touch?

    You can choose to put a “dummy” number (such as a land line number or cell phone number of your choice). Utilizing these devices, however, restricts you from utilizing SMS Text Banking services.

  • Do you have a Blackberry® App?

    There is not a Blackberry® App that’s available in the Blackberry World® App Store. 

Mobile App

  • What is the CPB Mobile Banking App?

    Central Pacific Bank has applications available for iOS™ devices (iPhone® and iPod’s®) in the Apple App StoreSM. An Android™ application is available at the Google Play™ Store. Search for “Central Pacific Bank” and download the free native app for your device.

  • What software versions are compatible for the CPB Mobile Banking App?
    • iPhone devices must have iOS version 5.1.1 or higher.
    • Android devices need to have Android version 2.2 or higher.
  • How do I update my CPB Mobile Banking App?

    Both the Apple App StoreSM and Google Play™ Store will have notifications of when updates are available for applications you have downloaded to your phone.

  • How do I download the app for my specific mobile device?

    Apple®: iPhone® app is available on the Apple App StoreSM

    Android™: Available at the Google Play™ Store

    Both the Apple App StoreSM and Google Play™ Store are default applications available on your smartphone and accessible online as well.

  • How can I delete the iPhone® application and remove it from my phone?

    Go to your home screen, and find the CPB Mobile Banking App. Press and hold down on the app icon until the apps are jiggling. Then, tap the red “x” on the top left of the app. You will be asked if you want to Delete the app and all of its data. Select “Delete” and the app will be removed from your device. Press the home button to return the apps to normal.

Mobile Deposit Service

SMS Text Banking

  • What number should I text to?

    All text messages should be sent to CPB’s “short code” six digit number: 469228.

  • What do I need in order to enroll in SMS Text Banking?

    When you enroll and provide us your phone number you should receive a text message asking you to text back “YES” to complete enrollment and activation. Once the “YES” reply is received you will receive a confirmation text.

  • I received a text message to reply back “Yes” but I forgot to reply. What do I do now?

    Until a “YES” command is sent, you are not validated for SMS Text Banking and will not be able to utilize the service. Text “YES” and you should get a confirmation text message confirming you are setup.

  • Is any personal information exchanged?

    No. Each SMS Text Banking message request authenticates separately by checking that the mobile number of the device used to send the request corresponds to the device number registered for the user initiating the transaction.

    Account values used by text commands are the account nickname used within CPB Online Banking or a masked account number; they do not contain any unmasked account numbers.

  • What are the SMS Text Banking commands?

    For a list of SMS Text Banking commands, see the chart below. For detailed instructions on SMS Text Banking, please click here to download a pdf document describing SMS Text Banking Usage and Commands. Note SMS Text Banking commands are not case sensitive. Savings accounts are subject to transaction limitations. To get a list of the text commands from your phone, text “HELP ALL”.

    Command Information
    BALANCE, BAL, B Request available balances for all linked accounts.
    DETAILS Request details for a specified account.
    (DETAILS <account>)
    example: DETAILS My Checking
    TRANSACTIONS, STATEMENT, HISTORY, RECENT, TRAN Request a statement for the specified account.
    (TRANS <account>)
    example: TRANS My Checking
    TRANSFER, XFER, X Transfer money from the default account to a specified account
    (XFER <amount> TO <identifier>)
    example: XFER 100.00 TO Savings
    Example #2
    (XFER <amount> FROM <account identifier a> TO <account identifier b>)
    example: XFER 100.00 FROM Savings TO Checking
    HELP Request Help
    HELP ALL Request List of all available actions
    BAL, DETAILS, HISTORY, TRANSFER, HELP, STOP
    STOP, END, QUIT Disable mobile channels
  • Can I search for specific transactions?

    This is currently not available in CPB Mobile Banking. You can search for transactions in CPB Online Banking; however, from the Account Details Screen.

  • How long does it take to receive the text response?

    This can vary depending on many factors – signal strength, carrier, etc. Typically it’s a few seconds if not less.

  • If I have multiple accounts, how will I receive information?

    Accounts will show up in the same order as they are listed in CPB Online Banking.

  • I get a “Suspicious Text Message” alert from my phone’s antivirus software application when I get a text from CPB’s short code number 469228. What should I do?

    Certain antivirus software applications mark texts as “suspicious” when they contain what are deemed as suspect phrases (such as “credit” or “rates”) and include a phone number. The software detection engines vary depending on the provider. Most antivirus software applications have a feature that allows you to add numbers (such as CPB’s 469228 short code) to a “safe sender list”. Please review your applications user guide, website or help menu for instructions on how to add CPB as a safe sender.

CPB Mobile Banking Bill Pay

  • Is there a way that I can add a Payee from my phone via CPB Mobile Banking?

    Not at this time. You must add Payees through CPB Online Banking on a desktop or tablet computer.

  • Can I set a future dated payment from my mobile device?

    Yes. You can set the Delivery Date of Payments. This will be the date you want the payee to receive payment.

  • Can l enroll for Bill Pay via CPB Mobile Banking?

    Enrollment for Bill Pay can be done through your CPB Online Banking account via a desktop or tablet computer. There is currently no mobile enrollment option for Bill Pay.

  • Is there the ability to deactivate a Payee?

    Currently, the Bill Pay service does not allow a user to create, edit or delete a payee from a mobile device. You can deactivate a Payee and manage your Bill Pay service by logging in to your CPB Online Banking Account and clicking the “Bill Pay” tab. Once in the Bill pay Service, select “Manage My Bills” from the menu, select the Biller Name / Payee you’d like to deactivate in the drop down menu. Then select “Delete this biller”. Confirm this is the correct Biller Name you’d like to delete and select “OK”.

  • Can I cancel a Bill Payment from my phone?

    Currently, the Bill Pay service does not allow a user to edit, cancel or delete a payment from a mobile device. You can deactivate a Payee and manage your Bill Pay service by logging in to your CPB Online Banking Account and clicking the “Bill Pay” tab. Once in the Bill pay Service, select “Manage My Bills” from the menu, select the Biller Name / Payee you’d like to deactivate in the drop down menu. Then select “Delete this biller”. Confirm this is the correct Biller Name you’d like to delete and select “OK”.

Safety Precautions for Internet Banking or Shopping

  • Protect Your "Cyber Home"

    For Banking by Computer or Mobile Device

    Take extra precautions for logging into bank and other financial accounts. These measures include using "strong" user IDs and passwords by choosing combinations of upper- and lower-case letters, numbers, and symbols that are hard for a hacker to guess. Don't use your birthdate, address or other words or numbers that can be easy for con artists to find out or guess.  Don't use the same password for different accounts because a criminal who obtains one password can then log in to your other accounts. Keep your user IDs and passwords secret, and change them regularly. Make sure to log out of financial accounts when you complete your transactions or walk away from the computer.

    Consider using a separate computer solely for online banking or shopping. A growing number of people are purchasing basic PCs and using them only for banking online and not Web browsing, emailing, social networking, playing games or other activities that are more susceptible to malicious software — known generally as "malware" — that can access computers and steal information. As an alternative, you can use an old PC for this limited purpose, but uninstall any software no longer needed and scan the entire PC to check for malicious software before proceeding.

    Take precautions if you provide financial account information to third parties online. For example, some people use online "account aggregation" services that, from one website, can provide a convenient way to pay bills, monitor balances in deposits and investment accounts, and even keep track of your frequent flyer miles. While these websites may be beneficial, they can also present potential issues related to the security of the account information you have shared with them. If you want to use their services, thoroughly research the company behind the website, including making sure that you're dealing with a legitimate entity and not a fraudulent site. Also ask what protections the website offers if it experiences a data breach or loss of data.

    Periodically check your bank accounts for signs of fraud. If you bank online, check your deposit accounts and lines of credit at regular intervals to spot and report errors or fraudulent transactions, just as you would review a paper statement. Online banking makes it easier and faster to monitor your accounts. This is important, because the sooner you can detect a problem with a transaction, the easier it should be to fix.

    Federal laws generally limit your liability for unauthorized use of your debit, credit and prepaid cards, especially if you report the problem to your financial institution within specified time periods, which vary depending on the circumstances. A good rule of thumb is to check your accounts online once or twice a week. Also, many banks make it easier for customers to keep track of their accounts by offering email or text message alerts when balances fall below a certain level or when there is a transaction over a certain amount.

    Basic Security Tips

    Keep your software up to date. Software manufacturers continually update their products to fix vulnerabilities or security weaknesses when they find them. "All of your software should be checked and updated as generally recommended by the manufacturer or when flaws are found," explained Kathryn Weatherby, a fraud examination specialist for the FDIC. "This advice goes for everything from your operating system to your word processing software, Internet browsers, spreadsheet software, and even your digital photography applications. A vulnerability in one piece of software, no matter how insignificant it may seem, can be exploited by a hacker and used as a pathway into your whole computer."

    Some software manufacturers may issue "patches" that you need to install to update a program. Others may simply provide you with a completely new version of the software. "Before installing any update you receive, make sure it is legitimate, especially if it is emailed to you," said Benardo. "Check the software manufacturer's website or contact the company directly to verify the update's validity. Criminals have been known to imitate software vendors providing a security update when, in fact, they are distributing malware. Once you confirm that an update is legitimate, install it as soon as possible to correct whatever security flaw might exist."

    Install anti-virus software that prevents, detects and removes malicious programs. Crooks and computer hackers are always developing new malware that can access computers and steal information, such as account passwords or credit or debit card numbers. These programs also may be able to destroy data from the infected computer's hard drive.

    Malware can enter your computer in a variety of ways, perhaps as an attachment to an email, a downloaded file from an infected website, or from a contaminated thumb drive or disk. Fight back by installing anti-virus software that periodically runs in the background of your computer to search for and remove malware. Also be sure to set the software to update automatically so that it can protect you from the latest malware. See Beware of Malware: Think Before You Click! for more information.

    Use a firewall program to prevent unauthorized access to your PC. A firewall is a combination of hardware and software that establishes a barrier between your personal computer and an external network, such as the Internet, and then monitors and controls incoming and outgoing network traffic. In simple terms, a firewall acts as a gatekeeper that helps screen out hackers, malware and other intruders who try to access your computer from the Internet.

    Only use security products from reputable companies. Some anti-virus software and firewalls can be purchased, while others are available free. Either way, it's a good idea to check out these products by reading reviews from computer and consumer publications. Look for products that have high ratings for detecting problems and for providing tech support if your computer becomes infected. Other ways to select the right protection products for your computer are to consult with the manufacturer of your computer or operating system, or to ask someone you know who is a computer expert.

    Take advantage of Internet safety features. When you are banking online, shopping on the Internet or filling out an application that requests sensitive personal information such as credit card, debit card and bank account numbers, make sure you are doing business with reputable companies. You also can have greater confidence in a website that encrypts (scrambles) the information as it travels to and from your computer. Look for a padlock symbol on the page and a Web address that starts with "https://." The "s" stands for "secure."

    Also, current versions of most popular Internet browsers and search engines often will indicate if you are visiting a suspicious website or a page that cannot be verified as trusted. It's best not to continue on to pages with these kinds of warnings. Review your Internet browser's user instructions and explore the "tools" and "help" tabs to learn more about the security settings and alerts offered.

    Be careful where and how you connect to the Internet. A public computer, such as at an Internet café or a hotel business center, may not have up-to-date security software and could be infected with malware. Similarly, if you are using a portable computer (such as a laptop or mobile device) for online banking or shopping, avoid connecting it to a wireless (Wi-Fi) network at a public "hotspot" such as a coffee shop, hotel or airport. Wi-Fi in public areas can be used by criminals to intercept your device's signals and as a collection point for personal information.

    The bottom line, especially for sensitive matters such as online banking and activities that involve personal information, is to consider only accessing the Internet using your own computer with a secure, trusted connection, and to only connect laptops and mobile devices to trusted networks.

  • Going Mobile: How to be Safer When Using a Smartphone or Tablet

    Everywhere you look, people are using smartphones and tablets as portable, hand-held computers. "Unfortunately, cybercriminals are also interested in using or accessing these devices to steal information or commit other crimes," said Michael Benardo, manager of the FDIC's Cyber Fraud and Financial Crimes Section. "That makes it essential for users of mobile devices to take measures to secure them, just as they would a desktop computer."

    Here are some basic steps you can take to secure your mobile devices.

    Avoid apps that may contain malware. Buy or download from well-known app stores, such as those established by your phone manufacturer or cellular service provider. Consult your financial institution's website to confirm where to download its official app for mobile banking.

    Keep your device's operating system and apps updated. Consider opting for automatic updates because doing so will ensure that you have the latest fixes for any security weaknesses the manufacturer discovers. "Cybercriminals try to take advantage of known flaws, so keeping your software up to date will help reduce your vulnerability to foul play," said Robert Brown, a senior ombudsman specialist at the FDIC.

    Consider using mobile security software and apps to protect your device. For example, anti-malware software for smartphones and tablets can be purchased from a reputable vendor.

    Use a password or other security feature to restrict access in case your device is lost or stolen. Activate the "time out" or "auto lock" feature that secures your mobile device when it is left unused for a certain number of minutes. Set that security feature to start after a relatively brief period of inactivity. Doing so reduces the likelihood that a thief will be able to use your phone or tablet.

    Back up data on your smartphone or tablet. This is good to do in case your device is lost, stolen or just stops working one day. Data can easily be backed up to a computer or to a back-up service, which may be offered by your mobile carrier.

    Have the ability to remotely remove data from your device if it is lost or stolen. A "remote wipe" protects data from prying eyes. If the device has been backed up, the information can be restored on a replacement device or the original (if you get it back). A number of reputable apps can enable remote wiping.

  • Beware of Malware: Think Before You Click!

    Malicious software — or “malware” for short — is a broad class of software built with malicious intent. “You may have heard of malware being referred to as a ‘computer bug’ or ‘virus’ because most malware is designed to spread like a contagious illness, infecting other computers it comes into contact with,” said Michael Benardo, manager of the FDIC’s Cyber Fraud and Financial Crimes Section. “And if you don’t protect your computer, it could become infected by malware that steals your personal financial information, spies on you by capturing your keystrokes, or even destroys data.”

    Law enforcement agencies and security experts have seen an increase in a certain kind of malware known as “ransomware,” which restricts someone’s access to a computer or a smartphone — literally holding the device hostage — until a ransom is paid. While businesses have been targeted more than consumers to date, many home computer users have been victims of ransomware. For more information, see an alert issued by the U.S. Department of Homeland Security.

    The most common way malware spreads is when someone clicks on an email attachment — anything from a document to a photo, video or audio file. Criminals also might try to get you to download malware by including a link in the wording of an email or in a social media post that directs you somewhere else, often to an infected file or Web page on the Internet. The link might be part of a story that sounds very provocative, such as one with a headline that says, “How to Get Rich” or “You Have to See This!”

    Malware also can spread across a network of linked computers, be downloaded from an infected website, or be passed around on a contaminated portable storage device, such as a thumb drive or flash drive.

    Here are reminders plus additional tips on how to generally keep malware off your computer.

    Don’t immediately open email attachments or click on links in unsolicited or suspicious-looking emails. Think before you click! Cybercriminals are good at creating fake emails that look legitimate but can install malware. Either ignore unsolicited requests to open attachments or files or independently verify that the supposed source did send the email to you (by using a published email address or telephone number). “Even if the attachment is from someone you know, consider if you really need to open the attachment, especially if the email looks suspicious,” added Benardo.

    Install good anti-virus software that periodically runs to search for and remove malware. Make sure to set the software to update automatically and scan for the latest malware.

    Be diligent about using spam (junk mail) filters provided by your email provider. These services help block mass emails that might contain malware from reaching your email inbox.

    Don’t visit untrusted websites and don’t believe everything you read. Criminals might create fake websites and pop-ups with enticing messages intended to draw you in and download malware. “Anyone can publish information online, so before accepting a statement as fact or taking action, verify that the source is reliable,” warned Amber Holmes, a financial crimes information specialist with the FDIC. “And please, don’t click on a link to learn more. If something sounds too good to be true, then most likely it’s fraudulent or harmful.”

    Be careful if anyone — even a well-intentioned friend or family member — gives you a disk or thumb drive to insert in your computer. It could have hidden malware on it. “Don’t access a disk or thumb drive without first scanning it with your security software,” said Holmes. “If you are still unsure, don’t take a chance.”

  • Cybersecurity for Small Businesses: Ways to Stay Protected

    In today's world, it's important for small business owners to be vigilant in protecting their computer systems and data. Among the reasons: Federal consumer protections generally do not cover businesses for losses they incur from unauthorized electronic fund transfers. That means, for example, your bank may not be responsible for reimbursing losses associated with an electronic theft from your bank account — for instance, if there was negligence on the part of your business, such as unsecured computers or falling for common scams.

    Here are tips to help small business owners and their employees protect themselves and their companies from losses and other harm. Several of these tips mirror basic precautions we have suggested elsewhere in this issue for consumers.

    Protect computers and Wi-Fi networks. Equip your computers with up-to-date anti-virus software and firewalls to block unwanted access. Arrange for key security software to automatically update, if possible. And if you have a Wi-Fi network for your workplace, make sure it is secure, including having the router protected by a password that is set by you (not the default password). The user manual for your device can give you instructions, which are also generally available online.

    Patch software in a timely manner. Software vendors regularly provide "patches" or updates to their products to correct security flaws and improve functionality. A good practice is to download and install these software updates as soon as they are available. It may be most efficient to configure software to install such updates automatically.

    Set cybersecurity procedures and training for employees. Consider reducing risks through steps such as pre-employment background checks and clearly outlined policies for personal use of computers. Limit employee access to the data systems that they need for their jobs, and require permission to install any software.

    And, train employees about cybersecurity issues, such as suspicious or unsolicited emails asking them to click on a link, open an attachment or provide account information. By complying with what appears to be a simple request, your employees may be installing malware on your network.

    Require strong authentication. Ensure that employees and other users connecting to your network use strong user IDs and passwords for computers, mobile devices and online accounts by using combinations of upper- and lower-case letters, numbers and symbols that are hard to guess and changed regularly. Consider requiring more information beyond a password to gain access to your business's network, and additional safety measures, such as requiring confirmation calls with your financial institution before certain electronic transfers are authorized.

    Secure the business's tablets and smartphones. Mobile devices can be a source of security challenges, especially if they hold confidential information or can access your company's network. In the case of the latter, require employees to password-protect their devices, encrypt their data and install security apps to prevent criminals from accessing the device while it is connected to public networks. Also develop and enforce reporting procedures for lost or stolen equipment.

    Back up important business systems and data. Do so at least once a week. For your backup data, remember to use the same security measures (such as encryption) that you would apply to the original data. In addition, in case your main computer becomes infected, regularly back up sensitive business data to additional, disconnected storage devices.

    Use best practices for handling card payments online. Seek advice from your bank or a payment processor to select the most trusted and validated tools and anti-fraud services. This may include using just one computer or tablet for payment processing.

    Be vigilant for early signs something is wrong. "Monitor bank account balances regularly to look for suspicious or unauthorized activity," suggested Luke W. Reynolds, chief of the FDIC's Outreach and Program Development Section.

Security Features

  • Your personal information is protected by industry standard 128-bit encryption technology that is the same level of security protection (SSL) as Online Banking.
  • Multi-Factor authentication with your secure online banking credentials and unique mobile pin code provides added security.
Top