August Tips

Your Bank, Your Way

If you’re like most people, you want better choices when it comes to banking. You want more convenience. In short, you want to do your banking on your terms. That’s where the industry is heading, and it’s what First Nebraska Bank’s “Your Bank, Your Way” campaign is all about. Because we understand that there are a whole lot of things you’d rather be doing than waiting in line at the bank.

So, what does this new approach to personal banking entail? At First Nebraska Bank, it means we offer conveniences like the following:

Convenient interactive and mobile banking isn’t just a fad; it’s the new standard consumers are coming to expect. And First Nebraska Bank will continue to be in the forefront of this exciting new trend. After all, we haven’t been around for nearly 140 years by living in the past.

Don’t Let Fraudsters Invade Your Company’s Network

You’re sitting at your desk, working, when the phone rings. The person on the other end says, “This is Dave in IT. We’re having issues with the network at your location, and I need to run a tool on your system to determine what’s going on.”

Depending on the size of your organization, you might be familiar with the IT team — you may even recognize Dave’s voice. But if you work for a large organization, aren’t familiar with your company’s IT team, or encounter a caller claiming to represent an outside vendor approved by your company, then you could be talking to a scammer who’s trying to gain access to your organization’s network. Even if you just grant access to your computer, a hacker can use that as a gateway to your company’s network.

Your default position should always be skeptical in this situation. Ask yourself the following questions:

  1. Can you positively identify the person on the other end?
  2. Does it make sense that you would receive an unsolicited call asking to help with technical issues?

If the answer is “no” to either question, then you should look for more information before granting the caller access to your computer or the network. Offer to call the person back at a known internal number, such as the company helpdesk line. If the caller is persistent and you still have doubt, refuse whatever they are asking until you can verify that the request is legitimate. Your company’s IT team would rather you err on the side of caution than give a fraudster access to the network because you ran that “tool” in an effort to be helpful.

Don’t rely on caller ID, either. It’s simple for fraudsters to spoof phone numbers, especially with voice-over-internet protocol (VOIP). Numerous services are available to alter what shows up on a target’s phone, which could make a would-be attacker seem legitimate. And that’s exactly why they do it — to make the call feel more authentic and put you at ease.

If you receive any kind of suspicious calls, make sure you report them to your IT team immediately. Someone else at your company might receive the same call, and they may not be as skeptical, putting the entire organization at risk.