Security Awareness Information

Everything You Need Know to Securely Bank with Us

Back On Track

At Affinity Bank, keeping your money and your personal information safe and secure is our highest priority. In addition to the safety measures we take on our end, there are precautions you can take to protect yourself as well. When it comes to protecting yourself against identify theft and fraud, there is no such thing as being over-prepared.

Tips To Prevent Identity Theft & Fraud

While identity thieves are resourceful, following the simple measures listed below will help ensure that your personal information is kept as safe and secure as possible.
  •  Don’t include sensitive information in email – A type of email fraud, phishing, occurs when a perpetrator posing as a legitimate trustworthy business attempts to acquire sensitive information like passwords or financial information.
  •  Never click on links within an email – It’s safer to retype the Web address than to click on it from within the body of the email.
  • Don’t open SPAM or attachments from strangers – If you do not know the sender or are not expecting the attachment, delete it.
  • Be suspicious of emails asking for personal information – Forged email purporting to be from your financial institution or favorite online store is a popular trick used by criminals to extract personal information for fraud.
  • Be selective when providing your email address – If you don’t know the reputation of a Web site, don’t assume you can trust it. Many Web sites sell email addresses or may be careless with your personal information. Be wary of providing any information that can be used by others for fraudulent purposes.
  • Update and strengthen the security of your online passwords – The best password is an undetectable one. Never use birth dates, first names, pet names, addresses, phone numbers, or Social Security numbers. Use a combination of letters, numbers and symbols. Be sure to change your passwords regularly.
  • Use a secure browser and trusted computer for sensitive transactions – Only use secure Web pages when you’re conducting transactions online (a Web page is secure if there is a locked padlock in the lower left-hand corner of your browser or within the Security Status Bar depending on your browser).
  • Log off when you’re done using web sites that require a user ID and password – Always logout from your online banking session or any other Web site that you’ve logged into using a user ID and password.
  • Disconnect and shut down when you’re not using your computer – When a computer is not in use, it should be shut down or disconnected from the Internet.
  • Monitor your postal mail – Identity thieves often search through mail looking for credit card or loan offers and mail them in with your information so they can make purchases using your name and credit line. Protect yourself against identity theft by ensuring your mail receiving habits allow little opportunity for mail theft.
  • Don’t give out your personal information freely – Treat your personal information like cash every time you are asked for your personal information – whether in a web form, an email, a text, or a phone message – think about whether you can really trust the request.
  • Check your credit report annually – or 1.877.322.8228

If you notice any suspicious account activity or experience any customer information security related events please, contact Affinity Bank at 1.866.736.8194 or

Fraud Tactics

Different fraud tactics all share the same goal: to obtain your personal, confidential and financial information for fraudulent use. From obtaining your information ‘the old fashioned way’ via discarded mail, to emails that ask you to verify personal information under the guise of a trusted source ― like your financial institution ― fraudulent activity comes in many different forms.

Fraud Tactics Include: 

  • Be vigilant and when it comes to wire transfers and to verify the information from trusted sources. If you receive an email, you need to make sure it’s from a trusted source. If you receive a text, you must make sure it’s from a trusted source. If you receive a call, you need to make sure it’s from a trusted source.
    • Review Emails and Verify Instructions:  If wire instructions are received via email, mail or phone, you should always verify you are speaking with the right party by meeting in person or following a call back procedure using a phone number from a third-party source. If wiring instructions are ever changed, you should presume the change to be fraudulent. Review the modified instructions in detail for any inconsistencies and always follow a call back procedures.
Thieves rummage through trash looking for bills or other paper that includes your personal information.
Also known as “malicious software”, malware is designed to harm, attack or take unauthorized control over a computer system. Malware includes viruses, worms and Trojans. It’s important to know that Malware can include a combination of all three types noted.

A scam that involves the use of replicas of existing Web pages to try to deceive you into entering personal, financial, or password data. Often suspects use urgency or scare tactics, such as threats to close accounts.

Vishing is a type of phishing attack where the attacker uses a local phone number in the fake email as a means of obtaining your sensitive information. The goal is to fool you into believing the email is legitimate by instructing you that responding to the request by phone is safer than responding by email and shows authenticity. The unsuspecting caller is then tricked through an automated phone system to relinquish their sensitive information.
Pharming takes place when you type in a valid Web address and you are illegally redirected to a Web site that is not legitimate. These “fake” Web sites ask for personal information such as credit card numbers, bank account information, Social Security numbers, and other sensitive information.
A Trojan is malicious code that is disguised or hidden within another program that appears to be safe (as in the myth of the Trojan horse). When the program is executed, the Trojan allows attackers to gain unauthorized access to the computer in order to steal information and cause harm. Trojans commonly spread through email attachments and Internet downloads. A common Trojan component is a “keystroke logger” which captures a user’s keystrokes in an attempt to capture the user’s credentials. It will then send those credentials to the attacker.
Spoofing is when an attacker masquerades as someone else by providing false data. Phishing has become the most common form of Web page spoofing. Another form of spoofing is URL spoofing. This happens when an attacker exploits bugs in your Web browser in order to display incorrect URLs in your browser location bar. Another form of spoofing is called “man- in-the-middle.” This occurs when an attacker compromises the communication between you and another party on the Internet. Many firewalls can be updated or configured to significantly prevent this type of attack.
Loaded on to your computer unbeknownst to you, spyware is a type of program that watches what users do and forwards information to someone else. It is most often installed when you download free software on the Internet. Unfortunately, hackers discovered this to be an effective means of sending sensitive information over the Internet. Moreover, they discovered that many free applications that use spyware for marketing purposes could be found on your machine, and attackers often use this existing spyware for their malicious means.
A form of Web advertising that appears as a “pop-up” on a computer screen, pop-ups are intended to increase Web traffic or capture email addresses. However, sometimes pop-up ads are designed with malicious intent like when they appear as a request for personal information from a financial institution, for example.

A computer virus is a malicious program that attaches itself to and infects other software applications and files without the user’s knowledge, disrupting computer operations. Viruses can carry what is known as a “payload,” executable scripts designed to damage, delete, or steal information from a computer.

A virus is a self-replicating program, meaning it copies itself. Typically, a virus only infects a computer and begins replicating when the user executes the program or opens an “infected” file.

Viruses spread from computer to computer only when users unknowingly share “infected” files. For example, viruses are commonly spread when users send emails with infected documents attached.

This virus specifically targets your computer defenses. It will look for vulnerabilities within your computer operating system or any third party security software. Most security vendors have some form of tamper-proof measure in place, so it is important to keep your patches up-to-date. Retro Viruses are usually combined with another form of attack.

A worm is similar to a virus, but with an added, dangerous element. Like a virus, a worm can make copies of itself; however, a worm does not need to attach itself to other programs, and it does not require a person to send it along to other computers.

Worms are powerful malware programs because they cannot only copy themselves, but they can also execute and spread themselves rapidly across a network without any help.

If you notice any suspicious account activity or experience any customer information security related events please, contact Affinity Bank at 1.866.736.8194 or

Be The First To Know.

Sign up for the latest news, public notices & community initiative updates.  

Serving Our Clients since 2002. 

Let's Get Started - Ready When You Are.

Connect with a Client Services Representative to Open An Account and receive help with an application. Thank you for considering Affinity Bank. 

Affinity Bank protects depositors as a member of the FDIC. Effective September 15, 2023, the Bank converted from a federal savings association to a national bank, and as a result, the Company became a bank holding company instead of a savings and loan holding company. Affinity Bank is not responsible for and has no control over the subject matter, content, information, or graphics of the web sites that have links here. Please contact us with any concerns or comments.   ©2023-2024 All Rights Reserved.