Remember that if you bank with Central Federal we already have your account information and will never ask you for it online. But there are con and scam artists that will claim they are from Central Federal or other reputable businesses and they will ask you for your account information. Don’t give it to them!!! When you furnish the information it does not go to Central Federal but to a bogus site that enables a scam artist to use your account information to access your accounts.
When you access a website and you see https at the beginning of the address, it indicates that the site uses encryption for security purposes. You may also see a small padlock in the address bar. When you click on the padlock you should see the websites “Certificate” which indicates the owner of the site. We encourage you to do this on our Online Banking site to ensure you are really on the Central Federal website.
When this is done you have just given that person access to your account information. This can also allow them access to your funds.
Before you start the application process for Central Federal Online Banking please know that you will need to have the following internet secure browser with a Global ID 128-bit encryption. The browser software must be capable of supporting encryption of data transmitted between the computer you are using and our website. Our site is best viewed using the most current versions of Chrome, Firefox, Safari, Opera, and Edge. If you choose to use another browser to access our site, we assume no responsibility for the resulting layout or content. As browsers are updated, this site will evolve with their advancing technology. It is also advisable to use reputable antivirus software on your computer.
Your password and PIN (personal identification number) are the first line of defense, and are your unique identifier. Be sure not to share them with anyone – most frauds involving hijacked accounts originate with someone the victim knows.
This form of identity verification provides added security by requiring multiple forms of identification, such as something you know (password or PIN) and something you have.
Once you are online with Central Federal, your transactions and personal information are secured by encryption software that converts the information into code that is readable by only you and Central Federal. Look for the little lock in the lower right of your screen.
Email is generally not encrypted so be careful in sending sensitive information such as account numbers or other personal information in this way.
Security begins with a strong password, which only you, the user, knows. We advise a combination of letters and numbers, and against using easily guessed passwords such as birthdays or home addresses.
Make sure the anti-virus software on your computer is current and scans your email as it is received.
Always log off by following the Central Federal secured area exit procedures to ensure the protection of your personal information.
Crooks are trying to get your personal information – and they employ some very ingenious methods. Don’t respond to any unusual requests for personal information – when you opened your bank accounts you already gave it. When in doubt call us at 573-364-1024.
Fraudulent emails purporting to be from your bank or a similar trusted source lures you to a copycat website (one that may look just like your bank’s site). Once there you are instructed to “verify” certain personal information, which is then used to hijack your accounts and your identity.
If you receive an unscheduled or unsolicited email purporting to be from Central Federal, be cautious – take the time to call us and make sure the email was sent from your banker. We have your account information and will never need to request it in the form of an email.
Also called “domain spoofing,” this cyber crime intercepts Internet traffic and re-routes it to a fraudulent site. Once there, the victim is asked to enter personal information, just as with Phishing.
This is software designed to infiltrate or damage a computer system without the owner’s knowledge. Examples of malware (malicious software) include computer viruses, worms, Trojan horses, spyware, and adware.