Online Security

Protect yourself

Protecting yourself from cyber predators can be a daunting task. Rest assured - we are here to help.

Employee Education

Ensures your employees receive periodic training on preventing internal and external fraud. This empowers them to help you detect problems, and it also sends the message that you are aware of financial misconduct and are actively working to defend your business. Your employees should also be informed about your policies and procedures related to fraud, the internal controls in place to prevent fraud, your organization’s code of conduct and ethics policies, and how violations of these policies will be disciplined. Every employee should sign a form to verify receipt of this material.

  • Avoid sending sensitive data through unsecured email.
  • Reconcile your transactions daily (or more often) to catch suspicious transactions early.
  • Practice proper PC security. Use updated anti-virus, anti-spyware programs, and be sure to leave your firewall on.

Perform Regular (and Irregular) Audits

Every company should have regular assessments. Random, unannounced financial audits and fraud assessments can help identify new vulnerabilities, and measure the effectiveness of existing controls. This also lets your employees know that fraud prevention is a top priority for your organization.

Implement Internal Controls

Internal controls are measures that ensure the effectiveness and efficiencies of operations.

  • Separation of duties – No employee should be responsible for both recording and processing a transaction.
  • Access controls – Access to physical and financial assets and information, as well as account systems, should be restricted to authorized employees.
  • Authorization controls – Develop and implement policies to determine how financial transactions are initiated, authorized, recorded, and reviewed.

Online security features

A bank should provide its customers with excellent, personalized customer service, as well as security measures to keep your funds safe. For these tools to be most effective, it is important to take a layered approach. Using multiple steps can help build a quality security barrier and greatly reduce your exposure.

Time and Dollar Amount Restriction

These restrictions can be set to limit the times and dollar amounts for certain users on your account.

Multi-Factor Authentication

This includes the use of security questions for logging in, and secure tokens, which are small electronic devices. Secure tokens provide an extra level of assurance to the user by requiring two-factor authentication. The owner of the device uses a PIN number which authorizes them as the owner; the device then displays a number which uniquely identifies the user to the device. The ID number for each user is changed frequently for added security.

Transaction Reconciliation

We recommend that you review your transactions daily.

Email and Login Alerts

These alerts can be utilized to notify you when ACH or wire transfers are processed on your account, you can receive Bill Pay alerts for bills paid, failed and canceled, and if you make a change to the payee of the bill.

Dual Control

This is a feature that requires two individuals to send ACH or wire transactions. This feature is currently required for all wire customers and can be enabled for ACH customers as well.

IP Address Restriction

This creates a “white list” of IP addresses for your online ID and it must be set up by the Great Southern Bank Online Banking staff.

Positive Pay

Positive Pay ensures that items are presented for payment against a customer’s account are verified against an issued file prior to being paid, thus reducing the possibility of fraud.

Alpha-Numeric Passwords

Passwords that contain both letters and numbers are generally harder to crack and can offer added security for multi-user accounts. However, malware can expose even the strongest password.

Out-of-Band Authentication

Great Southern offers SMS Messaging via Clickatell Alerts as another layer of security for verifying the customers identity when working with a GSB associate.

Clickatell Alerts Disclaimer: Number of messages varies per subscriber. To opt-out at any time, send STOP to 64805.To receive more information, send HELP to 64085. Message and data rates may apply. Account holder authorizes charges to appear on wireless bill or be deducted from prepaid balance. List of supported carriers: AT&T, Metro PCS, Sprint Nextel, T-Mobile USA, U.S. Cellular®, Verizon Wireless®, and more.

Safe Computing Tips

  • Never share personal information.
  • Know the person or organization with whom you’re communicating.
  • Use a firewall, anti-virus and anti-spyware software.
  • Update your Web browser and its security settings regularly.
  • Keep passwords in a secure place and change them periodically.
  • Use dedicated machines for online transactions.


Types of Fraud

Malware

Malware, short for “malicious software,” includes viruses and spyware designed to infiltrate or damage a computer system. Malware can steal personal information to commit fraud. Awareness can minimize the threat of malware:
  • Downloads from file sharing and social networking sites can be distribution points for malware.
  • Attachments and free software from unknown sources shouldn’t be opened or installed.
  • Pop-up advertisements asking for personal or financial information are likely fraudulent.
  • Updated security and system software can protect your computer from malware threats.

Phishing and Spoofing

Criminals may send you email that looks like it has come from Great Southern, requesting personal information or directing you to a Website that looks similar to ours. Great Southern will never ask you to reply in an email with any personal information, such as your Social Security number, Debit Card number or PIN.

Vishing

Vishing uses Voice over Internet Protocol (VoIP) to call with an automated recording. These messages, claiming to be Great Southern, generally alert consumers of ‘unusual’ account activity and instructed you to call a number. If called, another recording requests personal or financial information be entered using the telephone key pad. Great Southern will never contact you in this way, and will never ask you to reply with personal information.