Security Information

Northpointe Bank is dedicated to protecting your data and keeping your account information safe and secure. We utilize PassMark, which is latest generation security that provides added safety by helping us to identify you and prevent unauthorized account access.

Q: How safe is my account information?
A: Advanced technology that provides full data encryption keeps your transactions secure and private. Our system utilizes firewalls and trusted operating systems so that your account information is protected.

 

Security Tips

  • Practice good password management
    • We all have too many passwords to manage – and it’s easy to take short-cuts, like reusing the same password. A password management program can help you to maintain strong unique passwords for all of your accounts.  These programs can generate strong passwords for you, enter credentials automatically, and remind you to update your passwords periodically.  There are several online password management services that offer free versions.

Here are some general password tips to keep in mind:

  • Use long passwords – 20 characters or more is recommended.
  • Use a strong mix of characters, and never use the same password for multiple sites.
  • Don’t share your passwords and don’t write them down (especially not on a post-it note attached to your monitor).
  • Update your passwords periodically, at least once every 6 months (90 days is better).

 

  • Phishing (Email Fraud or Spoofing), Smishing, Vishing
    • Steps to follow to avoid being scammed
      • Never click on a link from a suspicious mail
      • Do not call any phone number provided in a suspicious email
      • Always use anti-virus and anti-spyware software on your computer and keep them up-to-date.
      • Remember, email is not a secure form of communication. So, feel free to use your email, but don’t use it to send or receive confidential information.
      • If you receive an unexpected phone call that appears to be from the Bank or another company that asks for personal information, be suspicious.
      • Attachments: Be cautious of e-mail claiming to contain pictures in attached files, as the files may contain viruses.
  • Common signs of Fraud
    • Requests for personal information.
    • Urgent appeals. Fraudulent emails often have a sense of urgency, indicating the need to communicate with you for your own security or a request to update your information immediately
    • Typos and incorrect grammar.
    • Awkward greeting or salutation. Fraudulent emails often have nonsensical greetings or a salutation that does not refer to the customer by name.
    • Strange or unfamiliar links
    • A message about an order that says you’ve been charged for an item you clearly didn’t purchase.
    • Messages about system, software and security updates.
    • Offers that sound too good to be true.
  • Keep software up to date
    • Installing software updates for your operating system and programs is critical. Always install the latest security updates for your devices:
      • Turn on Automatic Updates for your operating system.
      • Use web browsers such as Chrome or Firefox that receive frequent, automatic security updates.
      • Make sure to keep browser plug-ins (Flash, Java, etc.) up to date.
  • Be careful what you click
    • Avoid visiting unknown websites or downloading software from untrusted sources. These sites often host malware that will automatically, and often silently, compromise your computer.
    • If attachments or links in email are unexpected or suspicious for any reason, don’t click on it.
    • Consider installing Click-to-Play or NoScript, browser add-on features that prevent the automatic download of plug-in content (e.g., Java, Flash) and scripts that can harbor malicious code.
  • Never leave devices unattended
    • The physical security of your devices is just as important as their technical security.
      • If you need to leave your laptop, phone, or tablet for any length of time – lock it up so no one else can use it.
      • If you keep sensitive information on a flash drive or external hard drive, make sure to keep these locked as well.
      • For desktop computers, shut-down the system when not in use – or lock your screen.
  • Protect Sensitive Data
    • Be aware of sensitive data that you come into contact with, and associated restrictions – review the UCB Data Classification Standard to understand data protection level requirements.  In general:
      • Keep sensitive data (e.g., SSN’s, credit card information, student records, health information, etc.) off of your workstation, laptop, or mobile devices.
      • Securely remove sensitive data files from your system when they are no longer needed.
      • Always use encryption when storing or transmitting sensitive data.
  • Use mobile devices safely
    • Considering how much we rely on our mobile devices, and how susceptible they are to attack, you’ll want to make sure you are protected:
      • Lock your device with a PIN or password – and never leave it unprotected in public.
      • Only install apps from trusted sources.
      • Keep your device’s operating system updated.
      • Don’t click on links or attachments from unsolicited emails or texts.
      • Avoid transmitting or storing personal information on the device.
      • Most handheld devices are capable of employing data encryption – consult your device’s documentation for available options.
      • Use Apple’s Find my iPhone or the Android Device Manager tools to help prevent loss or theft.
      • Backup your data.
  • Install anti-virus protection
    • Only install an anti-virus program from a known and trusted source. Keep virus definitions, engines and software up to date to ensure your anti-virus program remains effective.
  • Back up your data
    • Back up on a regular basis – if you are a victim of a security incident, the only guaranteed way to repair your computer is to erase and re-install the system.
  • Here are some additional tips to help keep you safe and secure online:
    • Use a firewall – Mac and Windows have basic desktop firewalls as part of their operating system that can help protect your computer from external attacks.
    • Use public wireless hot-spots wisely – follow these tips for staying safe.
    • Be conscientious of what you plug in to your computer (flash drives and even smart phones can contain malware).
    • Be careful of what you share on social networking sites.
    • Monitor your accounts for suspicious activity.
    • Bank or shop online only on trusted devices and networks – and logout of these sites when you’ve completed your transactions.