Online security is a serious issue, and threats come from many sources and in many forms. Identity theft occurs when someone illegally obtains and uses your personal or business information—such as:
- Name
- Address
- Date of Birth
- Social Security Number
- Driver’s License
- Bank or Credit Card Account Number
This data is used without your knowledge or consent, typically for financial gain or to commit fraud. This can involve:
- Opening unauthorized credit card or bank accounts.
- Applying for loans, government benefits, or medical services in your name.
- Using your personal information to file fraudulent tax returns.
- Making unauthorized purchases or withdrawals from your accounts.
- Establishing utility services or rental agreements under false pretenses.
- Committing crimes or creating false identities for illegal activities.
Identity theft can disrupt your finances, damage your credit, and compromise your sense of security. Protecting your personal information is essential to reducing the risk of falling victim to this crime.
Security Tips to Protect Against Indentity Thefts and Cyber Threats
We have provided helpful information to help you be smart and stay safe while using online services. Expand any of the topics below by clicking the '+' symbol to learn more.
{beginAccordion H2}
Online Banking Security Services
Online banking is an excellent way to monitor your account activity and make sure the transactions on your account are your own.
Preventing Fraud and Identity Theft
Kleberg Bank uses multi-factor authentication to provide an additional layer of security for your online banking and cash management accounts.
Securing Your Password
Your online banking password is the key to your personal and financial information. If criminals know your password, they can use it to steal from you or pose as you in online transitions. This newsletter will provide you with some simple tips to make your online banking experience safer.
Criminals will always gravitate towards the easiest money. The more barriers that you can put into place, the more likely the criminal will go elsewhere. The reason all financial institutions implemented new login procedures (known as multifactor authentication) a few years ago was to add a layer of security and deter criminals from your online account. Criminals adjust and so should you. Here are some easy Do's and Don'ts that you can use to steer criminals elsewhere:
Do's
Install a reputable antivirus software program on all computers and keep them current. This is the single most important thing you can do to protect yourself. While we do not endorse or recommend a particular product, some good solutions are Internet Security packages available from makers such as: Norton, McAfee, or Kapersky.
Make your password as long and complex as possible. Kleberg Bank online banking or mobile banking will permit you to create a password that is a minimum of 12 characters long.
Make it easy to remember, but hard to guess. Use a combination of letters and numbers that you know, but that wouldn't make sense to others. Combine initials and important numbers and, if you are feeling particularly adventurous, a special character such as @ or # or $ or & or *. A good password could be 17dg*wm4. How can you make a similar combination work for you?
Use more than one password. Use a generic password for low-risk situations such as a newspaper website where there is little risk to you if someone figures it out. Not every website warrants the same level of protection as your online banking website. To make your ever-growing list of passwords more manageable, consider using a general-purpose password for websites that do not contain personal or financial information, and creating a unique, secure password for each website that does, such as online banking.
Enable Multi-Factor Authentication (MFA). Add an extra layer of security by requiring additional verification methods beyond just passwords.
Log Out After Each Session. Always log out of your online banking session when finished.
Use trustworthy computers. Shared public computers like those in airport lounges, Internet cafes, public libraries, and hotel lobbies could be connected to keystroke loggers or infected with password-stealing viruses. Don't use them to access online banking or other websites containing confidential information about you.
Avoid Public Wi-Fi: Refrain from accessing online banking services over unsecured public Wi-Fi networks.
Don'ts
Never e-mail your password or respond to an e-mailed request for your password or other confidential information. We will never ask you to submit confidential information in an e-mail. E-mail travels the Internet in much the same way as a postcard travels through the U.S. Mail. There is no "envelope" to protect the contents from prying eyes. There is no reason for anyone but you to know your password ever. Requests for your passwords via e-mail are most assuredly scams.
Do not include your login name in your password. Similarly, any part of your login name is a poor choice for a password.
Avoid predictable sequences of characters, such as "1234" or "abcd", in your password. Automated password crackers often start by guessing predictable sequences such as these.
Avoid dictionary words or names Words in any language can be determined by automated password crackers that also contain multi-lingual dictionaries. Similarly, password crackers also contain lists of names used as possible passwords. No one else may remember the name of your high school sweetheart, but if his or her name is on the list, your password may be vulnerable.
Understanding Your Protections Under Regulation E
Regulation E, part of the federal Electronic Fund Transfer Act (EFTA), provides important protections to consumers who use electronic funds transfer (EFT) services. These protections apply to accounts accessed electronically, such as checking and savings accounts linked to debit cards or online banking platforms.
What Regulation E Covers
Regulation E protects you in cases of:
- Unauthorized Transactions: If your debit card or account information is stolen and used without your permission, you may not be held responsible for the full amount, depending on how quickly you report the issue.
- Errors in Electronic Transfers: If an error occurs with an electronic payment or transfer (such as an incorrect amount or duplicate transaction), you have the right to dispute the transaction.
- Lost or Stolen Debit Cards: Reporting a lost or stolen debit card promptly can limit your liability for unauthorized transactions:
- Within 2 business days: Your liability is limited to $50.
- After 2 business days but before 60 calendar days: Your liability increases to $500.
- After 60 calendar days: You may be responsible for the full amount.
Examples of EFT Services Covered by Regulation E:
- ATM withdrawals
- Debit card purchases
- Direct deposits
- Online and mobile banking transactions
- Bill payments made electronically
What Regulation E Does Not Cover
Certain types of accounts and transactions are not protected under Regulation E, including:
- Business Accounts: Regulation E protections apply only to personal consumer accounts, not business accounts.
- Checks or Paper-Based Transfers: Transactions involving paper checks or check images are not covered.
- Wire Transfers: Most wire transfers are outside the scope of Regulation E.
- Credit Card Transactions: These are covered under a separate regulation, known as Regulation Z.
What to Do If You Suspect Fraud or an Error
- Act Quickly: Notify us immediately if you notice unauthorized activity, errors, or a lost or stolen debit card. Prompt reporting limits your liability and ensures we can assist you effectively.
- Submit Your Dispute: Provide a written statement detailing the issue, including the date, amount, and type of transaction, if requested.
- We will Investigate: Kleberg Bank will investigate your claim and notify you of the results. In most cases, you’ll receive provisional credit within 10 business days while we complete the investigation.
How Regulation E Applies to Online Accounts
Regulation E applies to any consumer account that is accessible online for electronic funds transfers, including:
- Checking accounts
- Savings accounts
- Accounts linked to your debit card or ATM card
When accessing your accounts online, it is essential to follow best practices for security, such as enabling multi-factor authentication and monitoring your account regularly for unauthorized transactions.
Protecting Your Financial Security
At Kleberg Bank, we are committed to helping you understand and exercise your rights under Regulation E. If you have questions or need assistance with an issue, please contact us at in Kingsville at 361-592-8501 or Corpus Christi at 361-850-6800. We are here to help!
How Kleberg Bank Protects You
We value the trust you place in us when you allow us to handle your financial information. We take every precaution to handle your financial information securely and with extreme care.
Code of Ethics
Every member of the Kleberg Bank team operates under a strict code of ethics that mandates confidential treatment of your information. Any team member that has access to customer information must complete privacy and information security awareness training annually. In addition, Kleberg Bank maintains physical, electronic and procedural safeguards to protect against unauthorized access to customer information.
Security Policy
Kleberg Bank has adopted a security policy designed to protect the confidentiality and security of your information. This information security program is subject to ongoing regulatory oversight and examination.
Customer Information Security Program
We protect the security of your information in the following ways:
- Computer anti-virus and spyware protection detect and prevents viruses and spyware from entering our computer network systems.
- Firewalls block unauthorized access by individuals and network from entering our computer network systems.
- Secure Email is available on the Kleberg Bank website and our Online Banking Message Center to ensure that your communication with us is secure and confidential. (Read the information on the Kleberg Bank website to sign up and login to our secure email portal, or visit our Online Banking Message Center to post a message to us.
- Third party security experts test our information security systems and processes regularly to make certain our computers and networks remain secure.
- Employee security awareness training ensures that our employees are trained to recognize the tactics that could be used by unauthorized parties to gain access to information.
Kleberg Bank's Commitment to You
We will never:
- Ask you to share sensitive information via email, text, or phone.
- Threaten account closures or demand immediate action.
- Ask for payment via gift cards or cryptocurrency.
By staying informed and vigilant, you can protect yourself from fraud. If you ever have concerns about a communication, contact us directly—we are here to help.
Keeping Your Computer Protected
Keep Your Computer Operation System Updated
- Set your browser security settings at a high enough level to help detect unauthorized downloads. (Click on your browser's "Help" menu for steps.)
- Keep your browser current; install updates as they are sent. You can set your computer to automatically install updates each time you log on. Popular browsers include Microsoft Internet Explorer, Netscape, America Online, Mozilla Firefox.
- Use updated anti-virus software, such as McAfee or Norton; make sure your virus definitions are current and real-time protection is enabled.
- Perform regular full system scans on your computer to help detect and clean viruses and spyware.
- Use updated anti-spyware software. Using more than one will ensure the most thorough scan. Some well known programs are Windows Defender, Ad Aware, Spy Sweeper, Spybot Search & Destroy.
- Activate a pop-up blocker. Users of XP Service Pack 2 and above already have access to this feature in Internet Explorer. (See your browser's "Help" menu for steps on enabling this feature.)
- Install a personal firewall on your computer. A firewall acts as a filter to prevent access to information on your computer. Some well-know programs are McAfee, Norton, Zone Alarm.
- Special precautions should be taken with home or office wireless networks. (Contact a computer professional for more information on how to do this.)
Online and Email Safety
You don't have to be a computer expert to protect yourself from internet fraud or identity theft. Here are a few simple precautions you can take to protect yourself.
Login Safety and Password Protection
- Do not access your bank, brokerage or other financial services at Internet cafes, or other public sites.
- Do not use the automatic login feature that saves your password.
- When creating passwords and answers to challenge questions don't use information that is easily linked to you such as your birth date, pet's name, your mother's maiden name or your Social Security Number.
- Create strong passwords. Don't use words, phrases, names of people or places. Use both numbers and caps and lowercase letters, and special characters such as #, %, @, &, and $. Passwords should be at least eight characters long.
- Change your passwords frequently, especially if you sign in from several computers, including computers at work.
Common Scams and Fraud Schemes
Phishing
What It Is
Phishing is a fraudulent attempt to steal sensitive information, such as usernames, passwords, and financial details, by pretending to be a trustworthy entity.
How It Works
- Fraudsters send emails, texts, or pop-ups disguised as legitimate organizations.
- You are asked to click a link, download an attachment, or provide personal information.
- The information is used to access your accounts or commit identity theft.
How to Protect Yourself
- Never click links or open attachments in unsolicited emails.
- Verify the sender's email address and contact the organization directly.
- Use email filters and security software to block phishing attempts.
Vishing (Voice Phishing)
What It Is
Vishing uses phone calls or voicemails to impersonate legitimate organizations, pressuring you to share personal or financial information.
How It Works
- Fraudsters claim to be from your bank, government agency, or a well-known business.
- They create urgency, such as threats of account closure or legal action, to extract information.
How to Protect Yourself
- Never provide sensitive information over the phone unless you initiated the call.
- Hang up and call the organization directly using an official number.
- Be skeptical of unexpected requests for immediate action.
Ransomware
What It Is
Ransomware is malicious software that locks your files or systems until you pay a ransom.
How It Works
- Ransomware spreads through phishing emails, downloads, or compromised websites.
- Your files are encrypted, and you are asked to pay (often in cryptocurrency) to regain access.
How to Protect Yourself
- Regularly back up your data to an offline location.
- Keep software and security patches up to date.
- Avoid opening attachments or links from unverified sources.
Business Email Compromise (BEC)
What It Is
BEC involves fraudsters spoofing legitimate business email accounts to trick employees into transferring money or sensitive information.
How It Works
- Fraudsters use email addresses that mimic real executives, vendors, or clients.
- They request urgent wire transfers or sensitive data.
How to Protect Yourself
- Verify requests via a secondary communication channel, such as a phone call.
- Train employees to recognize phishing and spoofing attempts.
- Enable multi-factor authentication (MFA) for email accounts.
Account Takeover
What It Is
Account takeover occurs when fraudsters gain unauthorized access to your online accounts.
How It Works
- Credentials are stolen through phishing, malware, or data breaches.
- Fraudsters log in to your accounts to transfer money, make purchases, or steal sensitive data.
How to Protect Yourself
- Use strong, unique passwords for every account.
- Enable multi-factor authentication (MFA).
- Monitor your accounts for unusual activity.
Check Washing
What It Is
Check washing involves stealing and altering checks to change the payee and amount.
How It Works
- Checks are stolen from mailboxes or unsecured locations.
- Fraudsters use chemicals to erase original details and rewrite the check for a higher amount.
How to Protect Yourself
- Use secure, gel pens to write checks.
- Mail checks directly from the post office or use secure mailboxes.
- Monitor your accounts for unauthorized transactions.
Drive-By Downloads
What It Is
A drive-by download is the unintentional download of malicious software onto your device when visiting a compromised website or clicking on deceptive links.
How It Works
- Malware exploits vulnerabilities in your browser or plugins.
- It installs on your device without your knowledge to steal data or control your system.
How to Protect Yourself
- Regularly update your browser, operating system, and security software.
- Avoid clicking on suspicious ads or visiting untrusted websites.
- Use pop-up blockers to reduce exposure to malicious links.
Financial Scams: Lottery, Overpayment, Advance Fee, and Work-from-Home Scams
What They Are
Fraudsters use these schemes to trick individuals into providing money or personal information through false promises or manipulative tactics.
How They Work
- Lottery Scams: Fraudsters claim you’ve won a lottery or prize but require upfront fees to claim it.
- Overpayment Scams: A buyer sends a check for more than the purchase price and asks for a refund of the excess amount. The check later bounces.
- Advance Fee Scams: Fraudsters pose as officials needing help transferring money and request upfront fees.
- Work-from-Home Scams: Fraudsters offer fake jobs requiring you to process financial transactions, often using counterfeit checks.
How to Protect Yourself
- Be skeptical of unsolicited offers or promises of easy money.
- Avoid paying upfront fees to claim prizes or job offers.
- Verify any organization or individual contacting you through independent research.
- Do not accept checks for more than the agreed amount.
Malware and Virus Scams
What It Is
Malware is malicious software designed to harm devices, steal personal information, or compromise your security. Examples include viruses, spyware, ransomware, and Trojan horses.
How It Works
- Malware can infect your device through suspicious email attachments, links, downloads, or websites.
- It can slow down your computer, display unwanted ads, or steal sensitive data like passwords.
What to Look For
- Unexpected pop-ups or ads.
- Programs crashing or slowing down your device.
- Unusual network activity or high data usage.
How to Protect Yourself
- Install and update trusted antivirus software regularly.
- Keep your operating system, browsers, and apps updated.
- Avoid clicking on suspicious links, attachments, or downloads.
- Download software only from official websites or app stores.
- Use strong passwords and enable multi-factor authentication (MFA).
What to Do If You Suspect Malware
- Stop Sensitive Activities: Avoid online banking or sharing personal information.
- Run a Security Scan: Use antivirus tools like Windows Defender or Malwarebytes to remove malware.
- Disconnect from the Internet: To stop data theft or spread of malware.
- Seek Help: If the issue persists, contact a reputable computer repair professional.
File Sharing, Downloading, and Streaming Safety
Sharing, downloading, and streaming content online—whether through cloud storage, peer-to-peer (P2P) platforms, or streaming services—can expose your devices to malware, viruses, and unauthorized access. Staying cautious is key to protecting your data and privacy.
How It Can Be Risky
- Malware and Viruses: Files or streams from untrusted sources may contain hidden malware or spyware.
- Unauthorized Access: Misconfigured settings in file-sharing apps can expose your private files.
- Copyright Issues: Downloading or streaming pirated content may be illegal and expose you to malware or phishing scams.
How to Protect Yourself
-
Use Trusted Sources: Download files or stream content only from official websites, verified app stores, or legitimate streaming platforms. Avoid suspicious or pirated sites.
-
Scan Before Opening: Use up-to-date antivirus software to scan all downloaded files. Delete anything flagged as suspicious.
-
Check File-Sharing Settings: When using cloud storage or P2P platforms, verify that you’re sharing only intended files. Avoid exposing personal folders or sensitive documents.
-
Be Wary of Free Streaming Links: Cybercriminals often disguise malware as “free” access to movies, music, or sports events. Stick to reputable streaming services.
-
Keep Software Updated: Enable automatic updates for your operating system, browsers, and security software to patch vulnerabilities.
-
Limit Permissions: Use a separate user account with limited rights for downloads, file sharing, or streaming to reduce risks.
-
Back Up Your Data: Regularly back up important files to an external drive or secure cloud storage in case of malware infection or device failure.
Talk to Family Members
Discuss safe file sharing and streaming habits with others in your household. Everyone using your devices needs to understand the risks and follow security best practices.
Recognizing and Reporting Fraudulent Communications
Fraudulent communications are attempts by scammers to trick you into sharing personal or financial information. These scams can take many forms, including emails, phone calls, text messages, and even fake social media messages. Protecting yourself starts with recognizing the signs and knowing how to respond.
How to Recognize Fraudulent Communications
Spoofed Phone Numbers
- Scammers may use technology to mimic your bank’s phone number or another trusted number, making it appear legitimate.
- Calls may use urgent language, such as threats to close your account or claims of suspicious activity requiring immediate action.
Phishing Emails
- Messages may appear to come from a trusted organization, but they often include poor grammar, generic greetings, or unusual requests.
- Phishing emails frequently include links to fake websites designed to steal your information.
Smishing (SMS Phishing)
- Text messages may include fake warnings about account issues, asking you to click a link or reply with personal information.
- Smishing attempts may use short, urgent messages to pressure a quick response.
Social Media Messages
- Fraudsters may send direct messages claiming you’ve won a prize or need to verify account information.
- Scammers may impersonate your bank's social media accounts.
What to Watch For
- Requests for Sensitive Information: Legitimate organizations, including the bank, will never ask for your passwords, Social Security number, or PIN via email, phone, or text.
- Urgent or Threatening Language: Phrases like "act immediately" or "your account will be closed" are red flags.
- Unfamiliar Links or Attachments: Links may lead to malicious websites, and attachments could contain malware.
- Unverified Caller Identity: Always verify the identity of a caller claiming to represent the bank.
- Odd Payment Requests: Requests for payment via gift cards, wire transfers, or cryptocurrency are almost always scams.
How to Protect Yourself
- Verify Communications: If you receive a suspicious message, independently verify it by contacting the bank directly using the phone number listed on its website.
- Avoid Clicking Links: Never click links in unsolicited messages. Instead, navigate to the organization’s website manually or call directly.
- Be Skeptical: Question any message asking for immediate action or sensitive information.
- Use Caller ID Carefully: Caller ID can be spoofed. Hang up and call back using the bank’s official number if you suspect fraud.
- Enable Alerts: Set up account alerts through online banking to monitor your transactions in real time.
Staying Secure on Social Media
Social networking platforms like Facebook, Instagram, TikTok, and LinkedIn help us connect, share, and collaborate. However, the personal information you share online can make you a target for hackers, scammers, and identity thieves. Protect yourself with these simple guidelines:
Limit Personal Information
- Avoid Oversharing: Refrain from posting sensitive details like your full birthdate, address, or phone number.
- Protect Challenge Questions: Avoid revealing information often used in security questions, such as your pet’s name, mother’s maiden name, or high school. Scammers may use social media quizzes or posts to gather this information.
Use Privacy Settings
- Restrict Visibility: Adjust privacy settings to control who can see your posts, photos, and personal details.
- Review Permissions: Regularly review app permissions and remove any unnecessary access to your social media accounts.
Strengthen Your Passwords
- Unique Passwords: Use a strong, unique password for each social media platform. Avoid reusing passwords from your email, banking, or other accounts.
- Enable Multi-Factor Authentication (MFA): Add an extra layer of protection by requiring a second verification step when logging in.
Think Before You Click
- Beware of Suspicious Links: Links sent in messages or posts may lead to phishing sites or malware. Verify the sender’s identity before clicking.
- Spot Red Flags: Messages with typos, unfamiliar senders, or requests for sensitive information should be treated with caution.
Be Selective About Connections
- Know Your Network: Only accept friend or connection requests from people you know and trust. Scammers may pose as friends or acquaintances to gain access to your information.
Talk to Your Kids About Online Safety
If you have children, teach them safe social media habits:
- Keep Information Private: Help them understand what should remain private.
- Set Boundaries: Use privacy settings to limit who can access and interact with their profiles.
- Be Present: Consider joining the platforms they use to stay informed and engaged.
- Encourage Open Communication: Let them know they can come to you if they feel uncomfortable or encounter suspicious activity online.
Stay Informed
- Monitor for Breaches: If a platform you use reports a data breach, update your password immediately and enable MFA if not already in place.
- Beware of Fake Accounts: Report fake profiles or accounts impersonating someone you know.
By staying vigilant and following these best practices, you can enjoy the benefits of social networking while keeping your personal and financial information secure.
Protecting Your Laptop and Personal Data from Theft
Laptops are prized for their portability, but their mobility also makes them prime targets for theft. While replacing the device itself can be costly, the personal or business data stored on it could be even more valuable—and harder to recover.
Follow these tips to keep your laptop and its information secure:
- Treat Your Laptop Like Cash
Think of your laptop as a stack of money equal to its value. Would you leave that much cash unattended in a coffee shop or airport? Probably not. Treat your laptop with the same level of caution. - Lock It Up
Use a laptop security cable to attach your device to something immovable, like a table or heavy furniture, whenever you’re working in public spaces. - Encrypt Your Data and Use Built-In Security Features
Protect your sensitive information with hard disk encryption and enable built-in security features like fingerprint scanners or facial recognition (such as Windows Hello or Touch ID). Biometrics make it far harder for thieves to access your data, even if they have your laptop. - Secure Your Passwords
Avoid storing passwords on your laptop or in its carrying case. Memorize them or use a password manager for secure storage. Treat passwords like car keys—don’t leave them behind. - Use a Discreet Bag
Carrying your laptop in a branded computer bag advertises what’s inside. Instead, use a plain backpack, briefcase, or padded messenger bag to avoid drawing attention. - Avoid Leaving It in the Car
Extreme temperatures and opportunistic thieves make cars a risky place for laptops. If you must leave it behind, lock it in the trunk and ensure it is out of sight. - Stay Alert at Airport Security
The hustle of airport security makes it easy for laptops to be stolen or mistakenly swapped. - Mark your laptop with a distinct identifier to recognize it quickly.
- Hold onto your laptop until you’re ready to walk through the scanner.
- Watch it closely as it emerges on the other side.
- Be Careful in Hotels
Never leave your laptop out in plain sight when you’re not in your room. Use the in-room safe if available, or take it with you when possible. - Report Theft Immediately
If your laptop is stolen:- Report it to local authorities as soon as possible.
- If it’s a business laptop, notify your employer or IT department immediately to protect sensitive company data.
Stay Vigilant and Stay Secure
By treating your laptop like a valuable asset and taking proactive steps to secure your data, you can minimize the risk of theft and data loss—whether at home, in the office, or on the go.
Securely Dispose of Your Old Computer
When it’s time to part with your old computer—whether you’re recycling, reselling, or donating it—take the proper steps to protect your personal information. Computers store sensitive data like account numbers, passwords, tax returns, and credit card information, and simply “deleting” files isn’t enough to keep that information safe.
Back Up Important Data
Before you dispose of your computer:
- Transfer files you want to keep to an external hard drive, USB flash drive, cloud storage, or a new computer.
- Double-check that all necessary data (photos, documents, tax returns, etc.) has been backed up.
Tip: Consult your computer manufacturer’s website for tools to help transfer files to a new device.
Wipe the Hard Drive
Deleting files doesn’t permanently erase them; they can still be recovered. Use one of these methods to securely wipe your data:
-
Data-Wiping Software: Use trusted tools like DBAN (Darik’s Boot and Nuke) or Blancco Drive Eraser to securely erase the hard drive. These tools overwrite data multiple times, making it virtually unrecoverable. For personal use, DBAN can be effective, but for organizational needs requiring certified data erasure and compliance reporting, Blancco Drive Eraser may be more appropriate. Always verify that the data erasure method chosen aligns with the specific compliance requirements relevant to your situation.
-
Built-In Operating System Tools: Modern operating systems offer built-in options to reset and securely erase drives.
- Windows: Use the “Reset this PC” feature and select “Remove everything” with the “securely wipe” option.
- macOS: Use Disk Utility to erase and reformat the hard drive.
-
Physical Destruction: For ultimate security, remove the hard drive and physically destroy it. Use a hammer or drill to damage the drive. For businesses or sensitive data, consider professional shredding services.
Recycle, Donate, or Resell Safely
Once your personal information has been wiped, choose an environmentally responsible way to dispose of your computer:
-
Recycle: Older computers contain hazardous materials and should not go to landfills. Check with:
- EPA Recycling Programs: Find certified e-waste recycling centers at epa.gov/recycle/electronics.
- Manufacturer Takeback Programs: Many computer brands offer recycling or trade-in programs.
-
Donate: Local charities, schools, and nonprofits often refurbish old computers for reuse. Wiping your data first ensures security.
-
Resell or Give Away: If your computer still has life left, sell it on a trusted platforms, or give it away through organizations like Freecycle.org.
Why Proper Disposal Matters
Improperly discarding computers can:
- Leave your personal information vulnerable to identity theft.
- Contribute to environmental waste through hazardous materials.
By securely wiping your data and choosing responsible disposal methods, you can protect your information and the environment.
Trusted Cybersecurity Resources
Protecting your financial and personal information is more important than ever. Below, we have compiled a list of trusted resources to help you stay informed and secure in today’s digital world.
- Independent Community Bankers of America (ICBA) Cybersecurity Awareness
Learn how to identify and protect against online scams, fraud, and cyberattacks with resources designed for community bank customers.
Explore ICBA Cybersecurity - Federal Trade Commission (FTC) Consumer Advice
Find practical tips on avoiding scams, protecting your identity, and securing your devices. The FTC also offers detailed instructions on reporting fraud and identity theft.
Visit FTC Consumer Advice - IdentityTheft.gov (FTC)
A one-stop resource if you suspect you’ve been a victim of identity theft. This site helps you create a recovery plan and provides guidance on protecting your information.
Start a Recovery Plan - Cybersecurity and Infrastructure Security Agency (CISA): Cyber Essentials
A government resource offering simple steps to enhance your cybersecurity practices at home and work. Topics include recognizing phishing attempts, password safety, and multi-factor authentication.
Visit CISA Resources & Tools - Federal Deposit Insurance Corporation (FDIC): Cybersecurity Tips for Consumers
Learn how to secure your online banking, recognize fraudulent communications, and protect your financial information with resources from the FDIC.
Explore FDIC Resources - National Cybersecurity Alliance (NCA)
The NCA offers clear, actionable advice for consumers on securing devices, recognizing scams, and shopping safely online.
Visit Stay Safe Online - Texas Department of Banking Consumer Alerts
Stay up to date with the latest scams and fraud alerts affecting Texans, including banking-related cyber threats.
View Alerts
What to Do If You Suspect Fraud
- Do Not Respond: Avoid replying to the message or answering questions.
- Report to the Bank: Immediately report any suspicious communication to us by calling the Customer Service Center in Kingsville at 361-592-8501 or Corpus Christi at 361-850-6800.
- Monitor Your Accounts: Check for unauthorized transactions and notify the bank of any unusual activity.
- File a Report: If your information is compromised or you have lost money, file a report with the Federal Trade Commission (FTC) at IdentityTheft.gov.
{endAccordion}