Stay Safe Online 

With a little knowledge, a dash of effort, and a few minutes of time, you can keep your sensitive data and computer systems locked down tight. Cybersecurity does not have to be intimidating! It does not require a large investment of time or money! In fact, you can secure your digital life with trusted free tools, and now many cybersecurity best practices can be automated.

 Click here to read more

Potential AT&T Data Leak from 2021 affecting 71 million people

AT&T says a massive trove of data impacting 71 million people did not originate from its systems after a hacker leaked it on a cybercrime forum and claimed it was stolen in a 2021 breach of the company.

While BleepingComputer has not been able to confirm the legitimacy of all the data in the database, we have confirmed some of the entries are accurate, including those whose data is not publicly accessible for scraping.

This data includes names, addresses, mobile phone numbers, encrypted date of birth, encrypted social security numbers, and other internal information.

However, the threat actors have decrypted the birth dates and social security numbers and added them to another file in the leak, making those also accessible.

Click here to read more Click here to read more on SIM Swapping 

2024 AARP Seal


Working to Prevent Financial Exploitation

First Bank is thrilled to announce that we are one of the banks that AARP has recognized with the BankSafe Trained Seal for the steps we have taken to help stop financial exploitation. Click here to learn more.


Stop. Call. Verify.

Business email compromise (BEC)—also known as email account compromise (EAC)—is one of the most financially damaging online crimes. It exploits the fact that so many of us rely on email to conduct business—both personal and professional. Criminals send an email message that appears to come from a known source making a legitimate request, like in these examples:

  • A vendor your company regularly deals with sends an invoice with an updated mailing address.
  • A company CEO asks her assistant to purchase dozens of gift cards to send out to employees.

Here are a few ways to protect yourself:

  • Verify payment and purchase requests in person or by calling a verified phone number.
  • Do not call a phone number included within an email without verifying if it's legitimate.
  • Be especially wary if the requestor is pressing you to act quickly.
  • Carefully examine the email address, URL, and spelling used in any correspondence.
  • Be careful with what information you share online or on social media.

How to report:

  • Contact your financial institution immediately and request that they contact the financial institution where
    the transfer was sent.
  • Next, contact your local FBI field office to report the crime and file a complaint with the Internet Crime
    Complaint Center (IC3).

Click here to read the full article

Article Archives 




Find UsLocation & Hours Call Usat our locations Email Uswith secure messages Friend Uson Facebook
Find Us Location & Hours Call Us at our locations Email Us with secure messages Friend Us on Facebook

This site uses cookies to store information about your computer/device. Cookies help us enhance site navigation, analyze site usage, and assist in our marketing efforts. By continuing to use this site, you consent to the placement of these cookies. We encourage you to read our Privacy Policy to learn more about how we share customer information.

Next Section

Back to Top