Online Security

SAFE COMPUTING TIPS

  • Never share personal information.
  • Know the person or organization with whom you’re communicating.
  • Use a firewall, anti-virus and anti-spyware software.
  • Update your Web browser and its security settings regularly.
  • Keep passwords in a secure place and change them periodically.
  • Use dedicated machines for online transactions.

PROTECT YOURSELF AND YOUR COMPANY

  • Avoid sending sensitive data through unsecured email.
  • Reconcile your transactions daily (or more often) to catch suspicious transactions early.
  • Practice proper PC security. Use updated anti-virus, anti-spyware programs, and be sure to leave your firewall on.

Our Online Security Features

A bank should provide its customers with excellent, personalized customer service, as well as security measures to keep your funds safe. For these tools to be most effective, it is important to take a layered approach. Using multiple steps can help build a quality security barrier and greatly reduce your exposure.

Time and Dollar Amount Restriction
These restrictions can be set to limit the times and dollar amounts for certain users on your account. 
Multi-Factor Authentication
This includes the use of security questions for logging in, and secure tokens, which are small electronic devices. Secure tokens provide an extra level of assurance to the user by requiring two-factor authentication. The owner of the device uses a PIN number which authorizes them as the owner; the device then displays a number which uniquely identifies the user to the device. The ID number for each user is changed frequently for added security.
Transaction Reconciliation
We recommend that you review your transactions daily.
Email and Login Alerts
These alerts can be utilized to notify you when ACH or wire transfers are processed on your account, you can receive Bill Pay alerts for bills paid, failed and canceled, and if you make a change to the payee of the bill.
Dual Control
This is a feature that requires two individuals to send ACH or wire transactions. This feature is currently required for all wire customers and can be enabled for ACH customers as well.
IP Address Restriction
This creates a “white list” of IP addresses for your online ID and it must be set up by the Great Southern Bank Online Banking staff. 
Text Banking
This utilizes SMS messaging to provide you with account balances and history, make transfers, and can also send you alerts for account transactions. These alerts can be utilized as a way of catching fraud as it happens on your account. 
Positive Pay
Positive Pay ensures that items are presented for payment against a customer’s account are verified against an issued file prior to being paid, thus reducing the possibility of fraud.
Alpha-Numeric Passwords
Passwords that contain both letters and numbers are generally harder to crack and can offer added security for multi-user accounts. However, malware can expose even the strongest password.

Types of Online Fraud

Malware
Malware, short for “malicious software,” includes viruses and spyware designed to infiltrate or damage a computer system. Malware can steal personal information to commit fraud. Awareness can minimize the threat of malware:
  • Downloads from file sharing and social networking sites can be distribution points for malware.
  • Attachments and free software from unknown sources shouldn’t be opened or installed.
  • Pop-up advertisements asking for personal or financial information are likely fraudulent.
  • Updated security and system software can protect your computer from malware threats.
Phishing and Spoofing
Criminals may send you email that looks like it has come from Great Southern, requesting personal information or directing you to a Website that looks similar to ours. Great Southern will never ask you to reply in an email with any personal information, such as your Social Security number, Debit Card number or PIN.
Vishing
Vishing uses Voice over Internet Protocol (VoIP) to call with an automated recording. These messages, claiming to be Great Southern, generally alert consumers of ‘unusual’ account activity and instructed you to call a number. If called, another recording requests personal or financial information be entered using the telephone key pad. Great Southern will never contact you in this way, and will never ask you to reply with personal information. 

Protection

Protecting yourself from cyber predators can be a daunting task. Rest assured - we are here to help.

Employee Education 
Ensures your employees receive periodic training on preventing internal and external fraud. This empowers them to help you detect problems, and it also sends the message that you are aware of financial misconduct and are actively working to defend your business. Your employees should also be informed about your policies and procedures related to fraud, the internal controls in place to prevent fraud, your organization’s code of conduct and ethics policies, and how violations of these policies will be disciplined. Every employee should sign a form to verify receipt of this material.

Perform Regular (and Irregular) Audits
Every company should have regular assessments. Random, unannounced financial audits and fraud assessments can help identify new vulnerabilities, and measure the effectiveness of existing controls. This also lets your employees know that fraud prevention is a top priority for your organization. 

Implement Internal Controls
Internal controls are measures that ensure the effectiveness and efficiencies of operations.

  • Separation of duties – No employee should be responsible for both recording and processing a transaction.
  • Access controls – Access to physical and financial assets and information, as well as account systems, should be restricted to authorized employees.
  • Authorization controls – Develop and implement policies to determine how financial transactions are initiated, authorized, recorded, and reviewed.