Online Banking

Remote Deposit

     To report a lost or stolen card:
     Hot Carding Support Center (1-866-546-8273)
     Available 24 hours a day, seven days a week.

Check Imaging

Check Imaging, provided with your monthly statement, is a free service provided by Mountian View Bank of Commerce for all of our checking accounts.

FRAUD PROTECTION

Mountain View Bank of Commerce takes great care to ensure your identity remains safe. We provide this information as a courtesy to you.

The safety and security of your financial information is of primary importance to us. This page includes important information about fraud as well as links to several resources where you can learn more about the many different types of fraud and things you can do to minimize your risk.

Fight Identity TheftOnGuard OnlineStop FraudAnti-Phishing Working Group

Consumer Protection

Identity Theft and Phishing

One way thieves can steal your identity is through "phishing." It is pronounced "fishing," and that is exactly what these thieves are doing: "fishing" for your personal financial information. What they want are account numbers, passwords, Social Security numbers, and other confidential information that they can use to loot your checking account or run up bills on your credit cards.

With the sensitive information obtained from a successful phishing scam, these thieves can take out loans or obtain credit cards and even driver's licenses in your name. They can do damage to your financial history and personal reputation that can take years to unravel. But if you understand how phishing works and how to protect yourself, you can help stop this crime.

back to top

Tips to Help Avoid Identity Theft

  • Never provide your personal information in response to an unsolicited request.
  • If you believe a contact may be legitimate, contact the financial institution yourself after you have verified the contact information.
  • Never provide your password over the phone or in response to an unsolicited Internet request.
  • Never click on the links provided in an e-mail.
  • Protect your Social Security Number (SSN), credit card and debit card numbers, PINs (personal identification numbers), passwords and other personal information.
  • Protect your incoming and outgoing mail.
  • Keep your financial trash "clean” by shredding sensitive information.
  • Keep a close watch on your bank account statements and credit card bills.
  • Review your credit record regularly.
  • Never access bank, brokerage or other financial services information at Internet cafes, public libraries, etc.Unauthorized software may be installed to trap an account number and login information, leaving you vulnerable to possible fraud.

How to Report Identity Theft

Contact a bank representative immediately.

If you have disclosed sensitive information in a phishing attack, you should also contact one of the three major credit bureaus and discuss whether you need to place a fraud alert on your file, which will help prevent thieves from opening a new account in your name. Here is the contact information for each bureau’s fraud division:

Equifax
800-525-6285
P.O. Box 740250
Atlanta, GA 30374

Experian
888-397-3742
P.O. Box 1017
Allen, TX 75013

TransUnion
800-680-7289
P.O. Box 6790
Fullerton, CA 92634

Report all suspicious contacts to the Federal Trade Commission through the Internet at www.consumer.gov/idtheft, or by calling 1-877-IDTHEFT

back to top

Tips for Preventing Mail Theft and Fraud

  • Retrieve your mail promptly after delivery.
  • Always deposit your mail in a mail slot at your local post office or hand it to your letter carrier.
  • Sign up for Online Services:
    • Online Bill Pay – eliminates the need to send your checks through the mail.
    • Online Bill Presentment – your bills are sent electronically and not through the mail.
    • eStatements – eliminates paper statements that travel through the mail.

back to top

What is Scareware?

Also called "fake antivirus" and "rogue antivirus," scareware is an attempt by cyber thieves to sell computer users useless, and potentially dangerous, antivirus software, registry cleaner or other software which allegedly repairs problems or enhances a computer’s performance.

Scareware is normally recognized by pop-up messages, which resemble Windows system messages, indicating that a large number of problems have been found on the computer. The messages prompt users to purchase software to fix the alleged computer problems and either takes users to the attacker's website or initiates a malware download if the user clicks "Cancel" or the "X" to close the window. Malware installed on computers allows thieves to view users’ passwords and other personal information.

Some of the most aggressive scareware products make critical changes to victims' computers, thus preventing them from restoring their computers to an earlier, secure status. You can protect yourself by understanding this form of cyber crime and avoiding clicking on suspicious pop-up windows.

back to top

Educational Resources for Consumers

FDIC: Learn How to Protect Yourself from Fraud.

Federal Trade Commission: Fighting Back against Identity Theft.

The Internet Crime Complaint Center (IC3) is a partnership between the Federal Bureau of Investigation (FBI), the National White Collar Crime Center (NW3C), and the Bureau of Justice Assistance (BJA) designed to serve as a vehicle to receive, develop, and refer criminal complaints regarding cyber crime.

The Financial Fraud Enforcement Task Force maintains a wide list of resources and information dedicated to helping find and report suspected cases of financial fraud.

OnGuard Online provides practical tips from the federal government and the technology industry to help you be on guard against Internet fraud, secure your computer, and protect your personal information.

FBI: Common fraud schemes and helpful information to avoid becoming a victim.

Internet Safety Alert Poster from The Internet Crime Complaint Center (IC3).

back to top

Corporate Protection

back to top

Corporate Account Takeover

Corporate account takeover is a method by which cyber-thieves gain control of a business’ bank account by stealing the business’ valid online banking credentials. Although there are several methods being employed to steal credentials, the most prevalent involves malware that infects a business’ computer workstations and laptops.

A business can become infected with malware via infected documents attached to an email or a link contained within an email that connects to an infected website. In addition, malware can be downloaded to users’ workstations and laptops when the users visit legitimate websites - especially social networking sites - and click on the documents, videos or photos posted there. This malware can also spread across a business’ internal network.

In common attacks, cyber-thieves send emails purporting to come from reputable, national organizations. This is a common tactic to gain credibility and lure unsuspecting individuals into taking some action. A recipient who clicks on the links within the email may be taken to a fake website, which prompts the recipient to unknowingly download malware to the computer.

The malware installs keylogging software on the computer, which allows the perpetrator to capture a user’s credentials as they are entered at the financial institution’s website. Sophisticated versions of this malware can even capture token-generated passwords, alter the display of the financial institution’s website to the user and/or display a fake Web page indicating that the financial institution’s website is down. In this last case, the perpetrator can access the business’ account online without the possibility that the real user will log in to the website.

The cyber-thieves use the sessions to initiate funds transfers, by ACH or wire transfer, to the bank accounts of associates within the U.S. These accounts may be newly opened by accomplices or unwitting “money mules” for the express purpose of receiving and laundering these funds. The accomplices or mules withdraw the entire balances shortly after receiving the money, and then send the funds overseas via over-the-counter wire transfer or other common money transfer services.

back to top

Why are smaller businesses and organizations targeted?

The cyber-thieves appear to be targeting small- to medium-sized businesses, as well as smaller government agencies and non-profits, for several reasons:

  • Many small businesses and organizations have the capability to initiate funds transfers via ACH or wire. This funds transfer capability is often related to a small business’ origination of payroll payments.
  • Many businesses maintain a type of organization chart online, making spear phishing (targeting a specific employee) for an employee with online banking authorities easier.
  • Small businesses often do not have the same level of resources as larger companies to defend their information technology systems.
  • Many small businesses do not utilize additional banking services, such as password-generating tokens, and do not monitor and reconcile their accounts on a frequent or daily basis.

back to top

What can you do?

Protect
  • Ask us about multi-factor authentication, for example: something the person knows (user ID, PIN, password); Something the person has (password-generating token).
  • Ask us about dual control features for initiation of payments via Online Banking, with distinct responsibility for transaction origination and authorization.
  • Ask us about establishing reasonable exposure limits that are related to transaction origination.
  • Do not respond to or open attachments or click on links in unsolicited emails.
  • If you receive an email from an apparent legitimate source requesting account information or action, contact the sender directly by other means: We will not send customers emails asking for passwords, credit card numbers or other sensitive information.
  • Contact us immediately if you encounter a message stating that the system is unavailable while trying to log in to your account.
  • Conduct Online Banking and payments activity from a dedicated computer that is not used for other online activity, such as general Web browsing and social networking and/or is not connected to an internal network.
  • Ensure that all anti-virus and security software for all computer workstations and laptops is robust and up-to-date.
  • Log/turn off and lock up computers when not in use.
  • Change the default passwords on all network devices.
  • Educate your employees on this type of fraud scheme.
Detect
  • Monitor and reconcile accounts daily; many small business clients do not reconcile their bank accounts on a daily basis, and therefore may not recognize fraudulent activity until it is too late to take action.
  • Note changes in the performance of your computer such as: loss of speed, changes in appearance, computer locking up, unexpected rebooting or restarting of your computer, unusual pop-up messages, new toolbars and icons or an inability to shutdown or restart.
  • Look out for rogue emails; if someone says they received an email from you that you did not send, you may have malware on your computer.
  • Run regular virus and malware scans of your computer’s hard drive.
Respond
  • If you detect suspicious activity, immediately cease all online activity and remove any computer systems that may be compromised from the network.
  • Immediately contact us so that the following actions may be taken: disable online access to accounts, change online banking passwords, open new accounts as appropriate, request a review all recent transactions and electronic authorizations on the account and ensure that no one has added any new payees or made any other critical changes to account information.
  • File a police report; having a police report on file will often help facilitate the filing of claims with insurance companies, financial institutions and other establishments that may be the recipient of fraudulent activity.
  • In addition, you may choose to file a complaint online at www.ic3.gov. For substantial losses, contact your local FBI field office. (http://www.fbi.gov/).
  • Have a contingency plan to recover systems suspected of compromise.
  • Consider whether other company or personal data may have been compromised.

back to top

Educational Resources for Businesses

The Federal Trade Commission’s (FTC) Bureau of Fraud Protection Business Center contains information about how to protect your business from fraud.

US Chamber of Commerce commonsense guide to Cyber Security for businesses.

The Federal Trade Commission (FTC): “Protecting Your Business from Fraud” video.

back to top

Fraud Alerts and Communications

April 4, 2012
Fraudulent emails claiming to be from NetTeller - Online Banking provider

On April 4, 2012, we were informed by our Online Banking vendor that some Online Banking customers have received a fraudulent email that has the appearance of having been sent from NetTeller, our Online Banking system. Specifically, the email subject line reads "NetTeller Watch Notice".

Phishing is the act of sending email that falsely claims to be from a legitimate organization. This is usually combined with a request for information such as account numbers, passwords, Social Security numbers and other confidential information. This information is then used to conduct fraud.

Be aware that phishing emails frequently have attachments and/or links to Web pages that host malicious code and software. Do not open attachments or follow Web links in unsolicited emails from unknown parties or from parties with whom you do not normally communicate, or that appear to be known but are suspicious or otherwise unusual.

If you receive or have received this email, do not click on any links or attachments and delete the email. You should also notify us immediately.

Please note that any Online Banking alert emails that you receive with the bank’s name and Watch Notice in the subject line that are sent from the bank’s ebank address are not impacted by this phishing attempt

October 27, 2011
Fraudulent emails claiming to be from NACHA - The Electronic Payments Association

NACHA - The Electronic Payments Association has received reports that individuals and/or companies have received a fraudulent e-mail that has the appearance of having been sent from NACHA and signed by a non-existent NACHA employee. Specifically, this email claims to be from the "Electronic Payments Association" and appears to be coming from a "payments@ nacha.org" or “transfers@ nacha.org” email address. See a sample of the email below.

Phishing is the act of sending email that falsely claims to be from a legitimate organization. This is usually combined with a threat or request for information: for example, that an account will close, a balance is due, or information is missing from an account. The email will ask the recipient to supply confidential information, such as bank account details, PINs or passwords; these details are then used by the owners of the website to conduct fraud.

Be aware that phishing emails frequently have attachments and/or links to Web pages that host malicious code and software. Do not open attachments or follow Web links in unsolicited emails from unknown parties or from parties with whom you do not normally communicate, or that appear to be known but are suspicious or otherwise unusual.

Please note that NACHA itself does not process nor touch the ACH transactions that flow to and from organizations and financial institutions. Further, NACHA does not send communications to individuals or organizations about individual ACH transactions that they originate or receive.

Be alert for different variations of fraudulent e-mails such as the following sample:

= = = = = Sample E-mail = = = = = =

From: p ayments@nacha.org [mailto:p ayments@nacha.org]
Sent: Tuesday, February 22, 2011 7:32 AM
To: Doe, John
Subject: ACH transaction rejected

The ACH transaction, recently sent from your checking account (by you or any other person), was cancelled by the Electronic Payments Association.

Please click here to view report.

Otto Tobin, Risk Manager

= = = = = = = = = = = = = = = = = = = =

If you have received correspondence you believe to be suspicious, do not click on any of the links. Delete the email and contact your bank if you should have questions or concerns.

(September 2, 2011). Fraudulent Emails Appearing to Come from NACHA (Action Requested). NACHA – The Electronic
Payments Association. Retrieved October 27, 2011 from
http://www.nacha.org/news/newsDetail.cfm/RecentBusinessNewsID/243.

back to top