Security

About Us / Security

Fraud & Identity Theft Protection

At Centier, we recognize the importance of protecting the privacy and security of our customers and those who visit our website or in a branch. It is very important for everyone to understand how to protect their privacy and to help prevent fraud and identity theft. Below is valuable information on how to protect yourself and how we protect you, our number one priority!

Fraud & Identity Theft Protection
Reporting Fraud Activity

If your account information has been compromised in any way, please contact any of our branches or the Client Service Center. For branch listings, hours and contact information — click here

Client Service Center Information

Hours of Operation

  • Monday — Friday 7am - 7pm
  • Saturday 8am - 3pm
  • Sunday 10am - 3pm

Phone Numbers

Client Service Email

Address

  • 600 E. 84th Ave., Merrillville, IN 46410
How We Protect You

24-Hour Visa® Debit Monitoring

  • We monitor your transactions 24/7 and may from time to time call to confirm a transaction. Centier provides this solution as a way to preserve your confidence in us to protect you from the inconvenience of fraud loss and data compromise. Centier also uses an intelligent risk management system designed to detect unusual activity on your Centier Visa Debit Card. This system ?learns? patterns of activity on your card and marks transactions for further research, in real time.
    • Example — card transactions happening in two locations (California and Indiana) in an impossible timeframe (within 2 hours of eachother). A less obvious example is multiple Point of Sale transactions with cash back in a short period of time, or more than 3 pay at the pump gas purchases within one hour.

Enhanced Login Security

  • Centier now offers Enhanced Login Security, a free and easy way to help prevent fraud. This superior security technology protects your identity from whatever computer you're using, whether at home, at the office, or on the go. It identifies you as the true "owner" of your accounts by recognizing not only your password, but your computer as well. If your computer isn't recognized, then you've logged in from a computer you haven't used before, and a temporary access pass code will be sent to your email on record, as an additional line of defense to prevent unauthorized access.

Encryption

  • The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server.

Secure Architecture

  • The computers storing your actual account information are not linked directly to the internet.
    • Transactions initiated through the Internet are received by online banking web servers.
    • These servers route your transaction through firewall servers.
    • Firewall servers act as a traffic cop between segments of our online banking network used to store information, and the public Internet.
    • This configuration isolates the publicly accessible Web servers from data stored on our online banking servers and ensures only authorized requests are processed.
    • Various access control mechanisms, including intrusion detection and anti-virus, monitor for and protect our systems from potential malicious activity. Additionally, our online banking servers are fault-tolerant, and provide for uninterruptible access, even in the event of various types of failures.

Secure Architecture

  • We provide a number of additional security features in online banking to help protect you:
    • Timeout: This prevents curious persons from continuing your online banking session if you left your PC unattended without logging out. You may set the timeout period in the online banking User Options screen. We recommend that you always sign off (log out) when done banking online.
    • Check Images: View an exact facsimile of your check transactions online to help prevent fraud.
    • Alerts: Balance alerts are financial tools we provide to help you to monitor your accounts more actively and to detect suspicious activity more easily.
Protecting Your Identity

How to Protect Yourself Against Identity Theft

  • The best way to protect yourself from fraud and identity theft is to educate yourself on how to prevent it. With so much information being exchanged it is imperative that you understand how to manage your personal information. Listed below are some key ways you can protect yourself.
    • Monitor your bank and credit card accounts regularly. You can check your account information over the phone, at ATM's, or using the internet.
    • Reduce the amount of paper in your life, and shred sensitive documents.
    • Lighten your wallet; most identity theft comes from lost or stolen wallets, checkbooks, and credit cards.
    • Take advantage of your right to obtain a free credit report. https://www.annualcreditreport.com
    • Educational Resources for Hoosiers on how to protect your identity courtesy of the Indiana Attorney General. http://www.in.gov/attorneygeneral/2413.htm

How to Safeguard Your Information

  • Look for website privacy policies and disclosures.
  • Secure online accounts with difficult-to-guess personal identification numbers.
  • Use online accounts; they are a "safe" way to do business.
  • Get a separate e-mail account for your personal e-mail.
  • Do not open e-mail attachments from unknown senders.
  • Clear your temporary Internet files after browsing.
  • Opt-out of third party information sharing.
  • Log off or lock your computer whenever you are away.
  • Choose passwords that are hard for others to guess.
  • Don't give your passwords to anyone, and don't store them in an easy-to-find place.
  • Install anti-virus and anti-spyware software on your PC, and keep it up-to-date.
  • Only use software from reliable vendors.
  • Visit the websites below to learn more about the crime of fraud and identity theft in our nation.
  • http://www.ftc.gov/bcp/edu/microsites/idtheft/http://www.usdoj.gov/criminal/fraud/

Password Complexity

  • The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server.

Secure Architecture

  • It is important to verify that only authorized persons log into online banking. This is achieved by verifying your password. When you submit your password, it is compared with the password we have stored in our secure data center. We allow you to enter your password incorrectly a limited number of times; too many incorrect passwords will result in the locking of your online banking account until you call us to reinitialize the account. We monitor and record "bad-login" attempts to detect any suspicious activity (i.e. someone trying to guess your password). You play a crucial role in preventing others from logging on to your account. Never use easy-to-guess passwords (examples below).
    • Birth dates
    • First names
    • Pet names
    • Addresses
    • Phone numbers
    • Social Security numbers
    • Never reveal your password to another person. You should periodically change your password in the User Option section of Internet Banking.
    • Various access control mechanisms, including intrusion detection and anti-virus, monitor for and protect our systems from potential malicious activity. Additionally, our online banking servers are fault-tolerant, and provide for uninterruptible access, even in the event of various types of failures.

Scams

  • A scam is an intentional attempt to mislead you with the goal of personal gain. There are many different types of mail, telephone, and e-mail scams. One of the most popular types of scam is called "phishing." "Phishing" is an attempt to acquire your personal information by posing as a legitimate business. The most important thing you can do to prevent being a scam victim is to never give your money, or personal information, to an unknown business or person, especially one who has contacted you. To ensure you know who you are communicating with you should call or mail the company back using phone numbers or addresses you know are correct.

Credit Report

Filing a Complaint

  • The Federal Bureau of Investigation (FBI) and National White Collar Crime Center (NW3C) developed this website to give victims of cyber-crime a convenient easy-to-use reporting mechanism that alerts authorities of suspected criminal or civil violations. http://www.ic3.gov/
Security Tips

10 Scams Targeting Bank Customers

  • Click here to check out this article from the FDIC on the basics to protect your personal information and your money.

Tips to Avoid BEC Scams from the U.S. Chamber of Commerce

  • Business email compromise (BEC) is still a highly prevalent scheme, as evident by the $3 billion lost due to these scams reported by the FBI last year. A recent article published by the U.S. Chamber of Commerce outlines multiple tips for financial institutions to consider to prevent BEC attacks from occurring at their organizations. These include:
    • Implement basic security practices including implementing software patches, using strong authentication methods and utilizing anti-malware controls.
    • Educating your employees and executives on how to look for and avoid phishing emails.
    • Having an incident response plan in place that includes your organization’s counsel, communications team, executives, board of directors and law enforcement partners.
    • Designating one staff member to be responsible for your information security program.
Click here to continue reading full article.
Find a banking center near you. Click Here