24/7 credit monitoring
Get around-the-clock notices about important changes in your credit report, including: Loan data, inquires, new accounts, judgements, liens, and more. The fastest and simplest way to guard against fraudulent activity.
- Receive full access to annual credit report from Experian
- Provides deep insight into your credit record
- Helps you proactively manage your financial health and monitor your identity
Monthly Credit Score & Tracker
- Regular review of your credit score, helping you stay on top of your credit
- Avoid the cost of pulling full credit reports
- View trends over time and find out exactly what’s moving your number
Dark Web Monitoring
- You to keep close tabs on your identity online
- Scans millions of international sources in real time
- Quickly spots stolen data that could identify you, such a as a social security number of medical identification number
Lost Wallet ProtectionIn the event of a lost or stolen wallet:
- One convenient point of contact handles cancellation and replacement of all your important documents
- Restoration through your agent includes: Your cards, licenses, social security cards, insurance cards, passports, military IDs, and even traveler’s checks
- Helpful advice and resolution services provided the instant the fraud occurs
- Certified specialists file, dispute, and resolve issues with your credit or other vital records, including:
- Filing fraud alerts
- Placing credit freezes at different bureaus
- Notifying authorities
Legal & Security
Protect yourself from Internet and email scams by keeping your private information secure.
Phishing, pronounced “fishing” is a technique used to steal personal information by directing online consumers to fraudulent websites that look nearly identical to the actual sites. Many times emails will warn of accounts being closed or fees incurred if the user information is not updated or verified. The links within these emails direct the recipient to forms or fraudulent websites that ask for account information, PIN numbers, passwords or Social Security numbers. To protect yourself from phishing:
- Do not click on links in emails that request confidential information. Instead, call the company or go to the website directly by typing the web address into your browser.
- Before submitting confidential information through forms, make sure you are using a secure internet connection. Verify the web address begins with “https://”, which indicates a secure connection.
- Install and run updated anti-virus and anti-spyware regularly
- Watch for misspelling or grammatical errors in emails or forms requesting confidential information. Hackers often make errors while rushing to get a fraudulent website in place.
By nature, email is not a secure form of communication. Never enter private, personal information in a form sent to you by email. Brentwood Bank will never send or request confidential account information through regular email channels. If you receive an email or phone call requesting your personal, confidential information that appears to be from Brentwood Bank, do not respond, contact us at 412.409.2265.
From the Desk of Thomas F. Duffy, Chair, MS-ISAC
Maybe you’ve gotten a new credit or debit card in the mail or heard something about the U.S. moving to the “Chip and Signature” or “Chip and PIN” standard. The U.S. is moving toward adopting these standards, and October 1st, 2015, is a major deadline for U.S. payment companies and merchants.
What is Chip and Signature/Chip and PIN?
The Europay, MasterCard, Visa (EMV) standard uses payment cards with a chip and requires either a PIN (Chip and PIN) or a signature (Chip and Signature) to authorize a payment. The chip is a small metal square, typically silver or gold, on the payment card that stores encrypted, dynamic data. After payment approval during a transaction, the data on the chip will change. This is different from the older magnetic strip cards, where the data on the magnetic strip never changed, which made it easy for malicious actors to copy. With the new chips, it will be more much difficult for malicious actors to read the data on the chip and then, because it constantly changes, to counterfeit it.
Chip and Signature/Chip and PIN cards are only new to the United States. Many countries around the world already uses these new technologies because they help to reduce credit card fraud through the use of authentication, verification, and authorization.
- Authenticating a card through its chip helps to prevent counterfeit cards.
- Verifying the card holder through the signature/PIN helps protect against lost or
- Authorization of the transaction indicates that both the merchant and buyer agree
to the transaction.
When you purchase an item using a chip card, the credit card may be swiped, like you are used to, or it may be placed into a slot, placed on a sensor, or waved over the sensor. The merchant will direct you on what to do.
To ensure backwards compatibility with existing payment systems, the magnetic strip will remain on the new payment cards and store static data. During the transition period, this static data can be stolen and used to commit fraud. After the transition period, the magnetic strips will probably be phased out.
Which is the U.S. using – Chip and Signature or Chip and PIN?
While there is no law that forces credit card companies in the United States to use one or the other, most credit card companies are electing to issue Chip and Signature payment cards to U.S. consumers.
Will this change my online purchases?
No, the change to Chip and Signature should not change how you purchase items online. However, if you are issued a Chip and PIN card, you may need to enter the PIN number to complete the purchase. And as with any new payment card, if you have pre-authorized charges for monthly expenses, such as the gym or an online website, you will need to update your payment card information with the merchant because your account number will change.
Will this change my purchases while traveling overseas?
No, the change to Chip and Signature/Chip and PIN should not change how you purchase items overseas. However, some U.S. citizens are reporting difficulties in using magnetic strip-only credit cards overseas, where Chip and Signature/Chip and PIN has already been implemented.
Why change credit cards?
Malicious actors know how to read the magnetic stripe on the back of magnetic stripe cards and because that information never changes, they can copy it onto a new payment card and fake the card holder’s signature. As long as the real payment card is valid, the fake card will be valid, too. Once there is wide spread adoption of the chip technology, the magnetic stripe will no longer be included on the cards subsequent cards.
What if I’m still the victim of Identity Theft?
Even with the new payment cards you or someone you know may still be the victim of identity theft. If you think you are a victim, file a report with your local police department, and notify the three credit reporting agencies: Equifax, Experian, and Transunion. Also check IdentityTheft.gov, the Federal Trade Commission’s (FTC) website for more resources. It contains free information about recovering from identity theft, as well as information regarding the most current scams and frauds.
Complaints may be filed at ftccomplaintassistant.gov.
More information on EMV and the transition is available at: http://www.emv-connection.com/.
If your bank, email account, or social media account sends a “passcode” to your phone when you try to login, you’re already using two-factor authentication. The passcode sent to your phone requires you to have your phone (something you have) and the website’s password (something you know).
Identity theft occurs when someone steals your personal information and uses it without your knowledge or permission. This crime continues to impact and harm the good name and credit of thousands of people each year.
If you suspect someone has stolen your identity, the key is to act quickly to minimize the damage.
Clearing your name and erasing the effects of identity theft can be a lengthy and difficult process, often times, it may take months or even years.
How do they get my information? Identity thieves are very resourceful. Many go about it the “old fashioned” way and dumpster dive; that is, they rummage through your garbage or through the trash of medical offices, businesses and government offices for example.
They may also attempt to gain your trust by pretending to represent a known institution and try to trick you into releasing information via email or by phone.
What do they do with my information? One of the first things an ID thief may do is to change your address to buy some time. They can then drain your bank account, run up charges on your credit cards, open new accounts (loans, utilities, etc.), obtain medical treatment, file a tax return to get a refund and more.
What are clues that my identity has been stolen?
- Unexplained bank account withdrawals
- Merchants refuse your checks
- Debt collectors calling about bills that aren’t yours
- Questionable items on your credit report
- Health claims denied because you reached benefit limits
- Notice of compromised info due to a data breach
- Medical providers billing you for services/treatment you did not use
- You are arrested for a crime someone else committed in your name
What should I do if I don’t see any fraudulent transactions or other problems but I know my information has been lost or stolen?
- Contact the credit reporting agencies and place an initial fraud alert on your credit file.
- Equifax 1-800-525-6285
- Experian 1-888-397-3742
- TransUnion 1-800-680-7289
What do I do if I think (or know) someone has misused my personal or financial information?
- Call one of the companies listed above and ask them to place an initial fraud alert (this company is required to contact the other two)
- This alert is in effect for 90 days and allows you to order 1 free copy of your credit report from each agency
- Consider a credit freeze which blocks potential creditors from obtaining your credit report. This makes it unlikely a thief can open new accounts in your name. This can be lifted if a business, lender or employer legitimately needs access
- Create an Identity Theft Report
- Submit a complaint to the Federal Trade Commission (FTC). When you are finished writing all of the details, print a copy as it will print as an Identity Theft Affidavit
- File a police report (bring the Affidavit with you); obtain a copy of the police report or report number
- Attach your FTC Identity Theft Affidavit to your police report to make an Identity Theft Report.
- Review your credit reports
- If you find mistakes or accounts you didn’t open, file a dispute online or in writing with each of the 3 credit reporting agencies
- File a dispute with the fraud department of the business reporting the fraudulent
- File a dispute with the fraud department of each business that reported a new account opened in your name by an identity thief
- Get copies of documents used by the thief to open the account or make purchases in your name (you can do this yourself or through law enforcement). You can find sample request letters at www.ftc.gov/idtheft
- File disputes with your bank for any unauthorized or fraudulent ATM or Debit card transactions as soon as you are aware (there are important timing limits that will impact the amount of money for which you may be liable—report as soon as you know!)
- Report any stolen or altered checks to your financial institution as soon as you are made aware
- Report lost/stolen credit cards and file any disputes if applicable
- Keep a log of all calls made; recording date, time, name and number of every contact
- Prepare your questions before calling; document your answers
- Send any letters via certified mail with return receipt
- Keep all originals; send copies of any documents required
- Make a list of deadlines when you must file requests, the time a company has to respond to you and when/if you must send follow up communication
Online Banking Security
We take many measures to ensure that your online banking experience is secure.
- The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server.
- To verify that your online banking session is secure, look for the “https://” in your browser’s website address and for the padlock icon in the lower right corner of your browser.
- A system of firewalls is used to protect our online banking services. This system follows a strict set of standards and routinely monitors all activity that passes through the firewalls to ensure our customers’ data is safe and secure.
To protect your online accounts, practice these helpful tips:
- Memorize your User ID and password. Make sure no one watches as you enter your information on the computer.
- Do not use your Social Security Number as your User ID. For your protection, Brentwood Bank requires that you select an alternate User ID.
- Do not allow your browser to store your information. While this seems useful, storing personal passwords and other information in this manner is a security risk.
- Use a unique and complex password that doesn’t contain personal information or is easy to guess.
- Change your password frequently by selecting User Options.
- When you are finished conducting business in Online Banking, use the “Log Off” button instead of simply closing your browser. This will ensure that your secure session has been closed.
- Brentwood bank will never ask for your password. If you receive an email or phone call that claims to be from Brentwood Bank requesting your account information, please contact Customer Support at 412.409.2265.
- Make sure that you have an anti-virus program running on your computer and that it is kept up to date.