Check back often for tips and best practices for keeping your information secure and identifying potential fraud.
Depending what type of documents you’re dealing with, you need to store some of them for certain periods of time, others you can digitize, and others you can throw away or shred.
Keep physical copies of forever:
Keep for certain period of time:
Keep the most recent version of:
Documents to Shred (anything that has personal information like your name, address, phone number, social security number, or bank account information):
Please be advised that fraudulent postcards are being sent to people around the country from “Mortgage Protection Services”.
The cards ask people to call a 1-800 number regarding an important matter with their mortgage or loan from GBT. The phone number and account number listed are NOT GBT numbers. This is a fraudulent attempt to collect personal information. DO NOT CALL. As it states on the postcard, “Mortgage Protection Services” is not affiliated with GBT any way and no loan information has been provided to them.
If you have recently purchased or refinanced your home, expect to get multiple offers from companies selling mortgage protection insurance. Many of these offers are scams. The scammers use publicly available loan data to contact potential victims, as with the postcard above. The scammers will attempt to obtain your personal information in order to commit identity theft. Contact your local GBT Branch Office with questions or concerns.
The senders of these emails do not represent GBT.
Please Do NOT reveal your information to them.
How soon is too soon to talk to your kids or grandkids about money? If they are old enough to ask for a toy or a bike, they are old enough to start learning financial lessons that will last a lifetime.
The best financial lessons are part of everyday experience. Look for opportunities to talk about money, read books aloud and play games that center around spending money wisely. Be open and honest when you discuss your financial experiences—good or bad.
Here are some examples of teachable moments to help you get started:
At the bank
When you go to the bank, bring your children with you and show them how transactions work. Ask the manager to explain how the bank operates, how money generates interest and how an ATM works. Ask the manager for a tour—be sure to ask to see the vault.
Discuss how your pay is budgeted to pay for housing, food and clothing, and how a portion is saved for future expenses such as college tuition and retirement.
At the store
It’s easy to give clear examples of “needs” and “wants” using different items at a store. Fruits and veggies are a need; Candy, toys or expensive cereals are a want. Explain the benefits of comparison shopping, coupons and store brands. You can hold up two items and compare pricing and make a decision together on which you should choose.
Chores and allowances
Assign chores and give them a monetary value. Discuss ways to budget and divide allowances. Encourage children to set a financial goal, such as saving for a new toy, and figure out how to achieve it.
Explain the many ways that bills can be paid: over the phone, paper or by check, electronic check or online check draft. Discuss how each method of bill pay takes money out of your account. Be sure to cover late penalties, emphasizing the importance of paying bills on time.
Using credit cards
Explain that credit cards are a loan and need to be repaid. Share how a credit card statement comes in the mail with a bill. Go over the features of different types of cards, such as ATM, debit and credit cards.
While online, explain to your children how valuable their personal
information and privacy is to you, to them and to online predators. Discuss the risks and benefits of sharing certain information. Then, as a family, make a list of rules for keeping personal information safe online.
Planning a vacation
Whether you are planning an outing to a local amusement park or a once-in-a-lifetime trip, emphasize the value of saving as a family. Set a family savings goal that involves your children. Figure out the cost and discuss ways everyone can help to reach the goal.
An introduction to Cybersecurity including Myths, Top Challenges, and Simple Steps to Cybersecurity
What is a corporate account takeover?
Simply put, corporate account takeover is the business equivalent of personal identity theft. Hackers, backed by professional criminal organizations, are targeting small and medium businesses to obtain access to their web banking credentials or remove control of their computers.
These backers will then drain the deposit and credit lines of the compromised bank accounts, funneling the funds through mules that quickly redirect the monies overseas into backers accounts. A computer can be compromised very easily by visiting an infected website or by simply opening an email.
There has been a steady increase in account takeovers since 2009 resulting in billions of dollars of damage.
Security best practices
When it comes to protecting sensitive financial information from hackers, there’s no substitute for good old-fashioned knowledge.
As a business owner, you should have a level of understanding about how to secure your computers that allows you to take proactive steps and avoid, or at least minimize most threats.
Experts advise following best practices including using a dedicated computer, keeping patches and anti-virus up to date, installing a host based firewall, verifying all transactions before approving and reviewing bank transactions daily.
These best practices should be the minimum security baseline for every company’s online banking transactions.
Steps for better security
Warning signs of a system or network compromise
Examples of deceptive ways criminals contact account holders
If you believe your Gibsland Bank & Trust account has been compromised contact us immediately.
The one-time refers to the security code being good for one-time only, not that the authentication security will occur one time. It will be at least once from each device and it also depends on your computer settings. Below are some FAQ’s that may help:
Advanced Login Authentication FAQs OLB Device Profile
Q: Why did I have to go through the additional authentication process? (Why did I get stepped up?)
A: Most common reason would be this is a new device profile identified for the customer or there has not been enough consistent use of the Device to confirm the correlation.
Because the Device Profiling looks at many factors together, as well as a system cookie and a Flash Object from a prior session, there are some instances where changes to a combination of factors would trigger a risk score that requires additional authentication.
These situations are difficult to pinpoint and difficult to explain but essential to appropriate assessment of risk.
Suggested response to consumers: We recently upgraded our security system and our system controls are asking you to confirm your PC and network path before proceeding. Please follow the instructions to provide additional authentication so the system can learn this profile is safe and you can access the system from this profile in the future.
Q: Are there adjustments that can made to my PC to make it work better?
A: There are some settings in a PC that make Device Profile work more effectively. Essentially these settings will expose more of the PC Profile to the Device Review so make it easier for the system to tell the legitimate customer from a fraud attempt.
If a user continues to get stepped up over and over, we have found that sometimes users’ browsers don’t encrypt the Device ID correctly and therefore cannot be recognized as a previously used Device.
Here are some hints we have found helpful in resolving client-side issues that prevent device from properly registering and resulting in users being stepped on every login:
Additionally some browser software/plug-ins stops items from loading and can limit our ability to recognize their system.
Helpful Hints for repeated step-up (step-up is the phone text or phone voice)
If user continues to get stepped up over and over, we have found that sometimes user’s browsers don’t encrypt the Device ID correctly and therefore cannot be recognized as a previously used Device. Here are some hints we have found helpful in resolving client-side issues that prevent device from properly registering and resulting in users being c stepped on every login:
Updating Safari settings on an IPad/IPhone
Gibsland Bank & Trust customers should be aware that fraudulent emails (“Phishing,” pronounced fishing) are being sent to some U.S. residents. These unsolicited “phony” emails are sent to random email addresses hoping to trick recipients into revealing their credit card or banking account numbers, PIN numbers, and/or online banking login data.
GBT policy does not allow requests for confidential information (passwords or PIN numbers) through regular email. Contact your local GBT Branch Office with questions or concerns.
The senders of these emails do not represent GBT. Please Do NOT reveal your information to them.
The UIGEA, signed into law in 2006, prohibits any person engaged in the business of betting or wagering (as defined in the Act) from knowingly accepting payments in connection with the participation of another person in unlawful internet gambling. The Dept of Treasury and the Federal Reserve Board have issued a joint final rule, Regulation GG, to implement this Act.
As defined in Regulation GG, unlawful Internet gambling means to “place, receive or otherwise knowingly transmit a bet or wager by any means which involves the use, at least in part, of the internet where such bet or wager is unlawful under any applicable Federal or State law in the State or Tribal lands in which the bet or wager is initiated, received or otherwise made”.
As a customer of Gibsland Bank & Trust these restricted transactions are prohibited from being processed through your account or banking relationship with us. Restricted transactions are transactions in which a person accepts credit, funds, instruments or other proceeds from another person in connection with unlawful Internet gambling.
If you do engage in an Internet gambling business and open a new account with us, you must provide evidence of your legal capacity to do so.
Be cautious when accepting $20 and $10 bills. A significant number of counterfeit bills have been detected in the Northwest Louisiana region in the past months.
All of the $20 bills contain the same serial number: JJ05094677B, blue ink in the top left corner of the face of the bill, the number 150 written upside down on the left hand side, close to the middle of the bill, and are 2009 series.
Some, but not all, of the $10 bills contain the same serial number: ML54581685A and are 2013 series.
Additional characteristics of the counterfeit currency are:
Click here for a document provided by the United States Secret Service, describing the security features in the most recently issued bills.
You’ve just won a lottery or sweepstakes that you didn’t even know you had entered!
Sounds too good to be true? You’re right! Odds are it’s a scam.
Maybe it happened like this…
What should you do?
Hang up the phone! Ignore the email! Shred the letter!
Never wire or send money to anyone, anywhere, who says you’ve won a prize.
The checks associated with lottery and sweepstakes scams are fraudulent. These counterfeit checks can sometimes take several days to be discovered and returned to GBT unpaid. You are responsible for any check(s) you cash or deposit into your account. If you should cash or deposit a check that is returned for any reason, you are fully responsible for loss related to the fraudulent check. In most cases, GBT can immediately debit your account(s) or file litigation to recover the money.
Older Americans are often targeted by scammers. If you’re a caregiver for family or a friend, warn them about lottery and sweepstakes scams.
To learn more about protecting yourself and others, visit: