Delete e-mails from unknown senders
Do not open e-mails from a sender you do not know. If a virus is attached to the e-mail, it can be released simply by opening it and will infect your program files. In some cases, it replicates by automatically mailing to your entire e-mail address book.
Do not provide your personal information in an e-mail
Even when communicating with family and friends, avoid sending personal information via e-mail. The Sender Address (“From” field) is easy to forge, so you may in fact not be communicating with people you know. In addition, the unsecured nature of e-mail makes it possible for others to see this information.
Learn to spot fraudulent e-mails
Be aware that counterfeit e-mails often contain logos, hyperlinks and phone numbers that appear to be authentic. Other common identifiers of fraudulent e-mails are misspellings, poor grammar or random characters in the subject line. E-mail scams will try to trick you by:
- Creating a false sense of urgency such as the closing of an account
- Offering prizes and other rewards
- Pretending to confirm recent transactions or verify account information
If an unexpected e-mail requests you to enter a user ID or password, provides a Website link that requests personal information or attempts to rush you into responding, it is more than likely a fraudulent e-mail. You should never respond to these requests.
Golden State Bank does not solicit information (SSN, account numbers, credit card numbers, passwords, etc) by means of e-mail. If you receive an e-mail requesting confidential information from someone claiming to represent Golden State Bank, do not respond to the e-mail. Please contact the Bank to report any solicitation of this kind that you receive.
Protect your passwords
Try to pick passwords that are easy for you to remember but not easy for others to guess. Avoid using Social Security Numbers, birthdays, telephone numbers or other personal information as your usernames or passwords. Do not write them down or share them with anyone. Longer passwords and passwords that combine letters, numbers and special characters are more secure. As an added layer of protection, it is a good practice to change your passwords on a regular basis.
Disconnect from the Internet when idle
Turn off your Internet connection when you're not using it. Attackers cannot access your computer when it isn't connected. High-speed connections are especially at risk.
Carefully review all End User Licensing Agreements
If the licensing agreement is difficult to understand, avoid downloading that software. It may contain spyware.