At Baltic State Bank, the security of your personal information and your account are of utmost importance. Below you will find important information about how we may contact you, how we protect your information, and steps you can take to help protect yourself from fraud or unauthorized access to your account.
At Baltic State Bank We Will Not:
Baltic State Bank will never ask for your password, one-time password via text, your CVV, or your PIN via call, text or email.
Fraudsters sounds very convincing. Ask questions to verify the legitimacy of the call, and if unsure, hang up and call the bank directly.
We may contact you about potential fraudulent activity. We have partnered with Fiserv’s Fraud Detection center to monitor your debit card transactions for potentially fraudulent activity. This can occur when the card is being used outside of your normal geographic area, when you have several large abnormal purchases in quick succession, or a transaction occurs that matches a known pattern of fraudulent activity.
If this occurs, you will receive a phone call from Fiserv’s Fraud Detection Center to verify the legitimacy of these suspected transactions. If you do not respond to these call your card may be restricted until we can reach you. This call will ask you to verify the recent transaction and respond “Yes” or “No” as to whether the transaction is valid. You can also call our offices directly to verify these transactions.
If you anticipate being out of the normal geographic area (such as for travel, vacation, etc.) we recommend setting a travel exclusion via online banking or by calling our office. This will help prevent unnecessary fraud alerts on your card.
How We Protect You
We have a number of tools in place to help prevent fraud and fraudulent activity:
Our website utilizes 128-bit Secure Socket Layer (SSL) encryption to secure data sent between your browser and our websites.
We utilize behavioral analytics and verify your device, location, log in credentials, and normal sign-in times and behaviors to detect unauthorized login activity. Activity that does not fit normal behaviors or present a higher risk for monetary loss may result in additional “out-of-wallet” security questions that you must answer to verify your identity.
Business customers and ACH Originators are required to use an additional hard token for Multi-factor authentication in order to access sensitive funds transfer areas of our online system.
Information Security Programs and Practices
To prevent unauthorized access and intrusion, we have implemented multiple layers of security across all our platforms including firewalls, intrusion detection and prevention, 24x7 incident monitoring, and multi-factor authentication for our employees and systems. These layers are rigorously tested and audited on a regular basis to ensure they are working properly to protect your information.
When contacting the bank, always use the numbers directly from our website. You should never contact the bank utilizing numbers or email addresses that come up in a basic online search, or that you receive via email, social media, or instant messenger.
Carefully examine emails and text messages that purport to be from the bank. Pay close attention to the “from” address and be suspect of messages that contain grammar, spacing, or other errors.
Be sure to check the destination of a link provided to you before clicking it by hovering over it and ensuring it points to a safe and secure destination. Secure websites begin with https://
Keep track of your account by regularly checking your transaction history and bank statements. Fraudsters sometimes use small “test” amounts to verify an account exists.
Keep your personal information private. You should refrain from posting, sharing or disclosing personal information via social media and IM.
Protect Your Business
Commercial customers should consider performing a risk assessment of their IT environment and evaluate their controls periodically to ensure that their information is protected. More information on performing a risk assessment is available at: Resources for Business | CISA
What To Do if You’re A Victim
Contact us immediately and let us know. In addition, we are providing the following resources:
For more information, visit the Federal Trade Commission (FTC) Identity Theft Center.
FDIC: A Bank Customers Guide to Cyber Security - FDIC: FDIC Consumer News Winter 2016 — Special Edition
Cyber Security & Infrastructure Security Agency - CYBERSECURITY | CISA