Secure Online Transactions


Safety first — always

First Security spends an enormous amount of time and effort in maintaining our fraud-detection, fraud-prevention prevention and security systems. Most of the work takes place behind the scenes, but you should know that we work day and night to ensure your information and money are kept safe within our digital vaults.

To help ensure the security of your online transactions, we want you to know that we will never email, call, or otherwise ask you for your user name, password, or other electronic banking credentials. You can help protect yourself by implementing alternative risk control processes like:

  • Making sure you choose an adequate username and password that, at a minimum, mixes in lowercase letters, uppercase letters and numbers
  • Periodically changing your password at least every 90 days
  • Safeguarding your username and password information
  • Having current antimalware and antivirus software
  • Making sure you have a firewall in place when conducting your financial transactions
  • Logging off the system when you’re done conducting business (rather than just closing the page or “Xing” out of the system
  • Monitoring your account activity on a regular basis

Federal laws establish limits on a consumer’s liability for unauthorized electronic fund transfers. They also provide specific steps to help resolve an error with your account. Note, however, that in order to take advantage of these protections, you must act in a timely manner. Make sure you notify us immediately if you believe your access information has been stolen or compromised. Also, review your account activity and periodic statement and promptly report any errors or unauthorized transactions. See the Electronic Fund Transfer disclosures that were provided at account opening for more information on these types of protections. Or ask us, and we will gladly provide you with a copy.

For Businesses

In addition, we may require owners of business accounts to perform their own risk assessments and controls evaluations. For example, make a list of the risks related to online transactions that your business faces, including:

  • Passwords that are written down and left out in the open
  • The use of old or inadequate passwords
  • The possibility of internal fraud or theft
  • Delays in terminating the rights of former employees
  • The lack of dual control or other checks and balances over individual access to online-transaction capabilities

An evaluation of controls your business uses may include:

  • Using password-protected software to store passwords​
  • Conducting employee background checks ​
  • Initiating a policy and process to terminate access for former employees
  • Segregating duties among two or more people so no one person has too much access or control
  • Conducting internal or third-party audits of controls
  • Using firewalls to protect from outside intrusion or hackers

Suspect suspicious activity?

If you become aware of suspicious account activity, you should immediately contact the authorities and contact us at 800-272-0159.

Some content requires Adobe Acrobat Reader to view.