Home > Knowlege Center

SECURE INTERNET BEHAVIOUR FRAUD INFORMATION FOR CLIENTS


Using the Internet safely - What precautions can you take?

Having information at your fingertips is a valuable tool. Understanding the risks of using that tool and how to use it safely are just as valuable to know. With information stored on local servers, the advent of “clouds,” sharing information through social networks, ultimate mobility provided by Wi-Fi hotspots, and countless other accessibility options, using the internet safely is something that should be taken seriously. Many establishments offer wireless hotspots for customers to access the Internet. Since the network is not trusted and security is often weak, these hotspots are susceptible to attacks. When used, limit your activities to web browsing. Avoid accessing online banking or other services that require you to login or enter personal information. Do not forward e-mail or documents from home computers to work computers via e-mail or removable media. Generally, work computers are configured more securely. Have work content sent to your work e-mail address. Use work provided remote access to get to work e-mail and documents from home. If work does not provide remote access or a laptop, a password-protected, encrypted USB storage drive can be used to carry and work on documents at home. Information which has traditionally been stored on a local computer is steadily moving to the Internet cloud. Information in the cloud is difficult to remove and governed by the privacy policies and security of the hosting sites. Businesses or individuals who post information to these web-based services should ask themselves “Who will have access to the information I am posting?” and “What controls do I have over how this information is stored and displayed?” before proceeding.

Social network sites are very convenient and efficient means for sharing personal information with family and friends. This convenience also brings some level of risk; therefore, social network users should be aware and understand what personal data is shared and who has access to this data. Think twice about posting information such as address, phone number, place of employment, date of birth, and family relationships. If available, limit access to posted personal data to “friends only.” Be wary of receiving content from people you do not directly know or in conjunction with third party games. E-mail accounts are common attack targets. To reduce risk, consider using different user names for home and work email addresses. Unique user names make it more difficult for someone targeting your work account to also target you via your personal accounts. Do not set out-of-office message on personal e-mail accounts or send replies to Internet e-mail addresses for business e-mail accounts. Only send out-of-office messages to other employees. Unsolicited e-mail containing attachments of web links should be considered suspicious. If the identity of the sender can’t be verified or the message does not make sense, delete the message. Be very wary of an e-mail requesting personal information or offering a get-rich quick scheme. It is very easy to send messages with a fake From: address. Do not assume a message is legitimate solely based on the From: address.

Using the Internet safely - What precautions can you take?
Ensure that passwords (and PINs or pass-phrases) are properly protected since they provide access to large amounts of personal and financial information, and even access to conduct financial transactions. Passwords should be strong, unique for each account, and difficult to guess. A strong password should be at least 10 characters long and contain multiple characters types (lowercase, uppercase, numbers, and special characters).
Disable the feature that allows programs to remember passwords and automatically enter them when required.
Additionally, many online sites make use of self-service password recovery or challenge questions. The answers to these questions should be something that no one else would know or find from Internet searches. Consider creating your own question, if possible, or providing a false answer to a fact-based question, assuming the response is unique and memorable. Never share your passwords with anyone. You are responsible for the actions of your account. Each user must have their own account. Do not use automatic login features that save passwords.
Do not use public or other unsecured computers for online banking. Always logoff your online banking application when you are done, especially if you are using someone else’s computer.

_______________________________________________________________

Maintaining a Secure Business Computer - What precautions can you take?
Your computer is part of a vast electronic information highway where data moves through complex networks, making our daily communications happen quickly and easily. With that convenience comes the need to protect that valuable and private information along the way. Although your business’ information security needs may require very specific solutions, much of what we do every day on our laptops or desktops is protected by following some relatively simple steps. Use a modern operating system - The most current operating systems (OS) provide substantial security enhancements over earlier versions. Set the OS to check for and install updates automatically. Also keep your other peripheral devices, such as tablet computers and smart phones up-to-date as well. - Make sure you renew your subscription. There are many good products available that are inexpensive or free for non-business use, and some internet service providers also offer service and can provide set-up support. Install a comprehensive security suite that supports anti-virus, anti-spyware, anti-phishing, safe browsing, and firewall capabilities. Remember to enable any automated updated service within the suite.
Limit use of the administrator account. The initial account that is typically created when configuring a computer for the first time is the local administrator account. This account should be used only to install updates or software, and re-configure the computer as needed. Browsing the web or reading e-mail should not be done using this account. A non-privileged “user” account should be created and used for these other day-to-day activities. Migrate to the most recent application versions, and maintain updates as needed.

If using third party web browsers, install script disabling software to prevent execution of scripts. Allow trusted sites to execute scripts as necessary. Use file or full disk encryption to protect laptops and other mobile devices. These computers are easily lost and stolen, and encryption is the only reliable protective security measure once a criminal has your computer. Use a security cable to lock the laptop to furniture when in public. A laptop can be stolen in moments, especially at a school or library.

Maintaining a Secure Business Network - What precautions can you take?
Use a separate personally-owned router with firewall capabilities to connect to the Internet Service Provider (ISP) provided router/cable modem. This gives you the control of routing and wireless capabilities and will block outsiders from accessing your network. A wireless network should be protected using Wi-Fi Protected Access 2 (WPA2) instead of Wired Equivalent Privacy (WEP). WEP encryption can be broken by an attacker. Implement strong passwords on network devices. Choose a long, complex password (at least 15 characters) for your administrative login to your router and your WPA2 encryption key. Write them down in your device manual, as they will be needed to make future changes to the device.

___________________________________________________

IDENTITY THEFT/ACCOUNT TAKEOVER FRAUD INFORMATION FOR WEALTH MANAGEMENT CLIENTS
Identity Theft/Account Takeover - How does this happen? This type of crime occurs when a thief obtains personal and banking information and intends to act as you to remove funds from your account, obtain credit and live a lavish lifestyle using your name. This can happen when information is obtained through theft of purses, wallets, home invasions, business theft or obtained through trickery. A loan application, opening a credit card, opening of a new checking account to the purchasing of a home have all been exploited by thieves using other people’s personal information. Identity theft can be difficult to recover from depending on the circumstance. In some cases, the identity thieves use personal information for a short period of time or a one-time occurrence. Other times, the personal information can be used over and over again making the experience for the victim difficult. The key to minimising your risk regarding identity theft is to protect your personal information. Joint American Trust Bank has monitoring systems and employees that are trained to notice transactions and banking activity that may be deemed suspicious.

Listed below are examples of the methods and types of persons that perpetrate this type of fraud.

Methods of Theft Stolen purse or wallet Information stolen from dumpsters Unsolicited phone calls or web sites used to trick the victim into giving personal and banking information Theft of mail Internal theft from businesses holding personal information Who are Thieves? Anyone with malicious intent Professional Identity thieves Family members or anyone who may have access to your home or critical information Protecting Yourself Secure your critical personal information Be aware of when and why you give out your personal information Secure your checks, passwords and all information and review account activity on-line.

Whatever information we need from you, you would be getting from this email: info@jointatb.com. Always confirm the url please.

Protecting Yourself (Continued) Shred important documents Enroll in a mobile transaction alert program Mail your bills using a post office box rather than curb side mailbox Contact your us for any discrepancies on your account Immediately report lost or stolen purses, wallets or checks to the bank Consider a credit monitoring program

__________________________________________________________________

Other Scams - What are these? In today’s society there are many different scams that are out there and everyone is at risk. No matter how the scam is offered or portrayed, they all result in the same way. The victim loses. Lottery, inheritance, work from home, secret shopper and other scams are still current in today’s environment. Unfortunately people do prey upon another’s good fortune or misfortune in order to maintain a lifestyle that they can’t afford. Most scam artists play the “man in the middle” and assist you with draining your own account. Some scam artists portray themselves government officials, law enforcement and even relatives. Some are threatening and some are not. Whether threatening or not, call a family member, contact us or local law enforcement for help. Listed below are examples of the methods and types of persons that perpetrate this type of fraud: Methods of Theft Victim is presented an opportunity to make money or help someone Victim is presented into a large purchase or investment Victim is threatened to send funds or release personal information Who are Thieves? Anyone with malicious intent (typically persons residing overseas)

Protecting Yourself Be aware of when and why you give out your personal information Be aware of “work from home” or lottery type schemes If it sounds too good to be true, it probably is Don’t be pressured into large purchases or financial decisions, get a second opinion Don’t accept an over-payment for something you have sold Contact us for any discrepancies on your account Immediately notify local law enforcement if you feel threatened.




 

Latest News PLEASE NOTE - Joint American Trust Bank (JATB) Changing Gears

It is imperative that we notify our clients/customers, shareholders/investors that JATB is going through a phase in our polio-review. JATB is still committed to giving the same outstanding service but in a better and clearer manner. Due to this polio-review, JATB may unveil new service designs this would not in any way affect your account status as our client or your financial position as a shareholder or investor.

We apologize for any inconvenience this may cause you and we guarantee this would not affect any financial engagement on the platform. We apologize for posting this now, we only wanted to make sure we are ready for the paradigm shift. For further information, please contact the Joint American Trust Bank Client services team on info@jointatb.com (7am to 5pm PST daily).

Investment Products: Are Not FDIC Insured | Are Not Bank Guaranteed | May Lose Value
Credit subject to approval. Terms and conditions apply. Programs, rates, terms and conditions subject to change without notice.
Copyright © 2018 Joint American Trust Bank. Joint American Trust Bank is authorised by - virtue of her management team - MLOC.
JATB is not a Prime Bank so may not be rated publicly as it is privately held. Private Direct Banks are not required to release internal financial information. JATB models her security standards as stipulated by the OCC. Joint American Trust Bank and the bird logo are our trademarks. NMLS#: 1500292