Skip to main content

Security Center

The best practice for any consumer to stay safe from identity theft or fraud is to stay informed. Reliabank provides you with many tools to stay on top of your financial information, and we've put together a helpful toolbox of information and resources to help you stay secure.

ID TheftSmart™

According to the U.S. Bureau of Justice, one out of every 13 households could fall victim to identity theft this year. When your sensitive personal information is lost or stolen, it can be a very time-consuming process to repair the damage done. That’s when ID TheftSmart™ comes in. Kroll Fraud Solutions has forensic accountants, attorneys, regulators and former law enforcement personnel who work on your behalf to protect, restore, and preserve your identity.

ID TheftSmart™ Restoration

ID TheftSmart™ Restoration is your answer in the event your identity is ever compromised. Investigators will work on your behalf to restore and preserve your identity. Not only will you receive full service identity restoration from a licensed experienced investigator should you become a victim, but you will also have a resource to help answer questions or provide guidance on security and fraud related concerns, in order to head off possible issues before they materialize.

If your identity is stolen, licensed ID TheftSmart™ investigators will:

  • Confirm identity fraud and determine its nature and scope
  • Assist in obtaining a police report
  • Provide a credit report and perform full non-credit searches
  • Work on your behalf until ALL identity theft issues have been verifiably resolved
  • Place seven-year fraud victim statements with credit reporting agencies, when applicable

ID TheftSmart Restoration is Free to primary Ultimate Checking account holder. Available to all other account holders and signers for only $2/month per person.


Common Threats

Every individual will likely be a target of a scam or fraudulent activity at some point, so be aware of some of the most common threats:

  • Malware - Malicious software intended to harm computer systems through viruses, worms, Trojan horses, etc.
  • Phishing - Attempts to collect personal information, such as user names and passwords by an attacker claiming to be an official source via email, phone call or text typically.
  • Pharming - Online fraud that redirects a true website's traffic to a bogus website in attempts to collect personal, login information or card payment information.
  • Social Engineering - Manipulating people through targeting emotional responses to trick them in attempt to give up or turn over valuable information.


Good Practices

Protecting Your Privacy

Here are some tips to help keep your identity secure:

  • Please know that banks will never contact you for personal information. If you receive a request, it's a good practice to call or stop by your local bank to inquire about the request.
  • Choose your password carefully and never reveal it to anyone. Try to make the password as unique as possible, as long as feasible, and use a combination of uppercase/lowercase/special characters/numbers.
  • Review your account transactions, account statements and credit card statements regularly to watch for any discrepancies and report any immediately.
  • Always log off after you have completed your online transactions; do not just close your browser
  • Install, update and regularly run anti-virus and anti-spyware protection programs on your home and work computers.
  • If you are providing any personal information online, be sure that you are using a secure site. (Note the padlock icon at the top of your screen, and the URL will begin with https.)
  • Report lost or stolen cards immediately.
  • Be aware of your surroundings. Identity thieves can use a camera cell phone to photograph credit or ATM card numbers while in a store. Look around to ensure no one is shoulder surfing by watching from nearby for a personal identification number, and they shouldn’t give a credit card number aloud in public places with others around
  • Shred sensitive materials before disposal

Protecting Your Data

When using your mobile device make sure to follow these rules:

When using your mobile device make sure to follow these rules:

  • Password protect your device
  • Enable the automatic screen locking features on your device
  • Securely store your device name, model and serial number(s) in case of theft
  • Don’t store passwords on your device for other secure websites
  • Consider a remote wiping apps to protect your data in case your device is lost or stolen
  • Make sure to install security updates on your device as soon as possible.
  • Beware of fraudulent emails, text messages, calls or voicemails. Keep your personal information protected
  • Beware of bad and/or malicious apps; get apps from a reputable source like Google Play or the iTunes store. Review the apps privacy policy and what information they can access on your device prior to downloading.