Security


Security Alerts

*No Alerts at this Time*

 


Our Commitment to Security

Our commitment. Lowry State Bank is committed to the integrity, availability, and confidentiality of your financial resources. We utilize proven technology to protect your personal and financial information and your privacy.

 

Unauthorized transactions. Federal law provides some protections to consumer customers when there is unauthorized account activity. You should notify us as soon as possible if you discover an unauthorized Electronic Funds Transfer (ATM transfers, purchases made with your debit card or ATM card, online banking payments, and online transfers) on your account. While business customers are not entitled to the same regulatory protections as consumers, we will use all commercially reasonable means to help you resolve the matter.

 

Online Banking Password control. After three failed attempts to enter the correct password credentials, the user will be locked out of the system. You will need to contact the bank to regain access.

 

Online Banking Security features. When you sign up for online access, you were asked to create your own username and password to access your accounts. This information is encrypted during transmission. Authentication and device identification at login helps safeguard account information and transactions and enables the bank to verify the authenticity of your activity.

 

Timed log-off. Our system automatically logs you out of online banking after a period of inactivity.

 

Encryption. Lowry State Bank utilizes Secure Socket Layer (SSL) technology to protect your data and transmissions over the internet. This technology encrypts (or scrambles) the information you provide so it’s difficult for anyone other than Lowry State Bank to read it.

 

We will never...email, call, or otherwise ask you for your electronic banking credentials. If you receive a suspicious phone call or mail asking for your authentication credentials, you should decline to do so and call us immediately at (320) 283-5149.

 

Contact us. If you suspect someone has made unauthorized transactions on your Lowry State Bank accounts, please call us at (320) 283-5149. If you send us an email, we cannot ensure our response back to you will be secure, so we will not include personal or account information such as account numbers in an email response.

 


Protecting Yourself when Conducting Transactions Online

In today’s high tech world, we are able to do more things quickly and conveniently through electronic means.  Whether it is to send a letter via email, pay bills, conduct banking transactions, or even go shopping online, this increase in speed and convenience also comes with increased risk.  Sophisticated hacking techniques and growing organized cyber-criminal groups are increasingly targeting financial institutions, compromising security controls, and engaging in online account takeovers and fraudulent electronic funds transfers.  One of the best ways to avoid fraud is to become an educated consumer and we would like to help you in this endeavor.  Please take a moment to read this important information on how to keep your personal information safe when conducting business online.

 

You can help protect yourself by implementing alternative risk control processes like:

  • Use a password that consists of a combination of numbers, letters (uppercase and lowercase), punctuation and special characters.

  • Changing your password—store your password in a secure location and change it often.

  • Try to avoid using public computers.

  • Have a firewall in place when conducting your financial transactions.

  • Be sure to click on the “log out” button to terminate your online session.In addition, you shouldn’t allow your browser to “remember” your username and password information.

  • Do not respond to e-mails requesting personal information.We will never email, call or otherwise ask you for your electronic banking credentials.

  • Monitoring your account activity on a regular basis..

 

Commercial account holders should perform their own risk assessment and evaluation of their controls.   For example:

 

Make a list of the risks related to online transactions. Common risks that many businesses face include:

  • Unsecure passwords—passwords written down and possibly visible to others

  • Inadequate passwords

  • Internal fraud or theft

  • Delays in terminating the access right of former employees

  • Lack of dual control

 

An evaluation of controls your business uses may include:

  • Using password protected software to house passwords

  • Locking computers when not in use

  • Conducting employee background checks

  • Initiating a policy and process to terminate access for former employees promptly

  • Dual Control: Splitting processes among two or more people so no one person has access or control

  • Conducting an audit of third party and internal controls

  • Using firewalls to protect from outside intrusion or hackers

 

Federal regulations provide consumers with some protections for electronic fund transfers.  These regulations generally apply to accounts with Internet access. For example, these federal laws establish limits on a consumer’s liability for unauthorized electronic fund transfers.  They also provide specific steps you need to take to help resolve an error with your account.  Note, however, that in order to take advantage of these protections, you must act in a timely manner. Make sure you notify us immediately if you believe your access information has been stolen or compromised.  Also, review your account activity and periodic statement and promptly report any errors or unauthorized transactions. See the Electronic Fund Transfer disclosures that were provided at account opening for more information on these types of protections. For an additional copy of the disclosure, please contact us and we will gladly provide one to you.

 

If you become aware of suspicious account activity, you should immediately contact the authorities and us at (320) 283-5149.

 


Protect You and Your Family from Internet Threats

Click here for more information.