Online Security Tips
Raymond James Bank is committed to making your online transactions as safe and secure as possible by using industry-standard encryption technology. In addition to our efforts, there are also security measures that you should take to help ensure your personal information is protected, both at Raymond James Bank's website and on the rest of the Internet.
- Password Security - Never choose a password that can be easily guessed, such as a name or hobby. Passwords should be changed regularly.
- Credit Cards - Before entering a credit card number, be sure the website is using encrypting software to protect your information. Depending on your browser, this can usually be detected by a "lock" icon on the bottom of your window.
- Social Security Number - Never use your social security number as a login ID or password.
- Email and Social Networks - Be careful about the information you share via email and on social network sites, even with friends. While you may employ strong password standards, your friends may not. If a hacker gains access to their accounts, they gain access to all the information you shared. Also be cautious about who you accept as friends on social networks, as spammers and identity thieves are stepping up their game and using "friending" as a strategy.
- Virus Protection - Install a virus protection program on your computer. Make sure it is regularly updated.
Raymond James Communications – No personal information is ever requested by email or phone.
Raymond James Bank will never contact you via email or the telephone asking for your personal information: No passwords, account numbers or social security numbers.
- Do not respond to such an email or phone call claiming to be from Raymond James.
- Call Raymond James Bank immediately at 800.718.2265. When you initiate a phone call, Raymond James Bank will ask for personal information to confirm your identity.
There’s a new type of Internet piracy called “phishing.” It’s pronounced “fishing,” and that’s exactly what these thieves are doing: “fishing” for your personal financial information. What they want are account numbers, passwords, Social Security numbers, and other confidential information that they can use to loot your checking account or run up bills on your credit cards.
In the worst case, you could find yourself a victim of identity theft. With the sensitive information obtained from a successful phishing scam, these thieves can take out loans or obtain credit cards and even driver’s licenses in your name.
They can do damage to your financial history and personal reputation that can take years to unravel. But if you understand how phishing works and how to protect yourself, you can help stop this crime.
Here’s how phishing works:
In a typical case, you’ll receive an e-mail that appears to come from a reputable company that you recognize and do business with, such as a financial institution. In some cases, the e-mail may appear to come from a government agency, including one of the federal financial institution regulatory agencies.
The e-mail will probably warn you of a serious problem that requires your immediate attention. It may use phrases, such as “Immediate attention required,” or “Please contact us immediately about your account.” The e-mail will then encourage you to click on a button to go to the institution’s Web site.
In a phishing scam, you could be redirected to a phony Web site that may look exactly like the real thing. Sometimes, in fact, it may be the company’s actual Web site. In those cases, a pop-up window will quickly appear for the purpose of harvesting your financial information.
In either case, you may be asked to update your account information or to provide information for verification purposes: your Social Security number, your account number, your password, or the information you use to verify your identity when speaking to a real financial institution, such as your mother’s maiden name or your place of birth.
Phishing scams may also be attempted through other mediums, such as phone calls or phone text messages, posing as a bank, the IRS or other financial institution. As with email phishing, do not provide any personal information to the callers. Call the bank or agency yourself, at a number you trust (not one provided by the caller), to determine if the call is legitimate. As for text messages, simply delete those outright.
If you provide the requested information, you may find yourself the victim of identity theft.
Please use caution when using ATM’s and Point-of-Sale (POS) terminals to avoid being the victim of card skimming. Skimming is the theft of card information during a financial transaction, where a credit, debit or ATM card's magnetic strip is read ("skimmed") by an electronic device to obtain the card details. In some cases, thieves have installed phony card readers directly on legitimate ATM machines. Thieves will then linger nearby or even use cameras to obtain the card's PIN as the user types it in. To avoid falling victim to this kind of scam, follow these guidelines:
- Use ATM's that provide enough privacy to prevent others from reading your card or PIN.
- Check the area to be sure that it does not appear that a skimming device or camera has been attached to the ATM.
- Look for oddly placed mirrors on the ATM or vehicles situated to view the ATM through a camera or video recorder lens.
How to Protect Yourself
- Never provide your personal information in response to an unsolicited request, whether it is over the phone or over the Internet. E-mails and Internet pages created by phishers may look exactly like the real thing. They may even have a fake padlock icon that ordinarily is used to denote a secure site. If you did not initiate the communication, you should not provide any information.
- If you believe the contact may be legitimate, contact the financial institution yourself. You can find phone numbers and websites on the monthly statements you receive from your financial institution, or you can look the company up in a phone book or on the Internet. The key is that you should be the one to initiate the contact, using contact information that you have verified yourself.
- Never provide your password over the phone or in response to an unsolicited Internet request. A financial institution would never ask you to verify your account information online. Thieves armed with this information and your account number can help themselves to your savings.
- Review account statements regularly to ensure all charges are correct. If your account statement is late in arriving, call your financial institution to find out why. If your financial institution offers electronic account access, periodically review activity online to catch suspicious activity.
What to do if you fall victim:
- Contact your financial institution immediately and alert it to the situation.
- If you have disclosed sensitive information in a phishing attack, you should also contact one of the three major credit bureaus and discuss whether you need to place a fraud alert on your file, which will help prevent thieves from opening a new account in your name. Here is the contact information for each bureau’s fraud division:
Equifax, 800-525-6285, P.O. Box 740250, Atlanta, GA 30374
Experian, 888-397-3742, P.O. Box 1017, Allen, TX 75013
TransUnion, 800-680-7289, P.O. Box 6790, Fullerton, CA 92634
- Report all suspicious contacts to the Federal Trade Commission through the Internet at http://www.ftc.gov/idtheft, or by calling 1-877-IDTHEFT.
You can fight identity theft. Here’s How:
Never provide personal financial information, including your Social Security number, account numbers or passwords, over the phone or the Internet if you did not initiate the contact.
Never click on the link provided in an e-mail you believe is fraudulent. It may contain a virus that can contaminate your computer.
Do not be intimidated by an e-mail or caller who suggests dire consequences if you do not immediately provide or verify financial information.
If you believe the contact is legitimate, go to the company’s Web site by typing in the site address directly or using a page you have previously book marked, instead of a link provided in the e-mail.
If you fall victim to an attack, act immediately to protect yourself. Alert your financial institution. Place fraud alerts on your credit files. Monitor your credit files and account statements closely.
Raymond James & Associates, Inc. and Raymond James Financial Services, Inc. are affiliated with Raymond James Bank, N.A. Unless otherwise specified, products purchased from or held at Raymond James & Associates or Raymond James Financial Services are not insured by the FDIC, are not deposits or other obligations of Raymond James Bank, are not guaranteed by Raymond James Bank and are subject to investment risks, including possible loss of the principal invested.