Cybersecurity | TrustTexas Bank (Cuero, TX)
Contact Us Locations

Routing Number: 314971168

Online Banking

Log In

Error, press "Log In" to continue.

Log In

Error, press "Log In" to continue.

Open an Account

Cybersecurity

Cybersecurity education is vital in today’s technology-driven world. We want to help you stay safe online with tips and resources you can use.

MoneyiQ

General Online Safety Tips and Resources

STOP. THINK. CONNECT.™

StaySafeOnline

Simple Steps to Online Safety

Staying safe and secure online is our shared responsibility. Here is easy-to-follow, actionable advice for everyone.

  • STOP: make sure security measures are in place.
  • THINK: about the consequences of your actions and behaviors online.
  • CONNECT: and enjoy the internet.

It is critical for anyone using the internet to continually learn about and consistently practice good cybersecurity habits. To better protect yourself, you should secure your home networks and mobile devices and take the time to learn how to use the internet more safely, securely and responsibly. View these tip sheets to address the top consumer cyber concerns, provide simple steps to protect against these concerns and teach you what to do if you fall victim to cybercrime.

Online Cybersecurity Tip Sheet For All Digital Citizens
Safe Online Shopping
Stay #CyberAware While On the Go – Safety Tips for Mobile Devices
What To Do If You Are A Victim Of Cybercrime
Tips for Passwords & Securing Your Accounts
Privacy Tips for Using Public Computers & Wireless Networks
Simple Cybersecurity Tips for Staying Safe Online During Tax Time

 

More Cybersecurity Tips

Understand your digital profile. 

Internet-based devices are present in every aspect of our lives: at home, school, work, and on the go. Constant connection provides opportunities for innovation and modernization, but also presents opportunities for potential cybersecurity threats that can compromise your most important personal information. Understand the devices and applications you use every day to help keep you and your information safe and secure.

  • Top Tip: Never click and tell. Limit what information you post on social media—from personal addresses to where you like to grab coffee. What many people don’t realize is that these seemingly random details are all criminals need to know to target you, your loved ones, and your physical belongings—online and in the physical world. Keep Social Security numbers, account numbers, and passwords private, as well as specific information about yourself, such as your full name, address, birthday, and even vacation plans. Disable location services that allow anyone to see where you are – and where you aren’t – at any given time. Read the Social Media Cybersecurity Tip Sheet for more information.
  • Top Tip: Keep tabs on your apps. Most connected appliances, toys, and devices are supported by a mobile application. Your mobile device could be filled with suspicious apps running in the background or using default permissions you never realized you approved—gathering your personal information without your knowledge while also putting your identity and privacy at risk. Check your app permissions and use the “rule of least privilege” to delete what you don’t need or no longer use. Learn to just say “no” to privilege requests that don’t make sense. Only download apps from trusted vendors and sources.

Tip Sheets:
Cybersecurity While Traveling
Online Privacy
Social Media Cybersecurity
Internet of Things

 

Secure your digital profile.

Cybercriminals are very good at getting personal information from unsuspecting victims, and the methods are getting more sophisticated as technology evolves. Protect against cyber threats by learning about security features available on the equipment and software you use. Apply additional layers of security to your devices – like Multi-Factor Authentication – to better protect your personal information.

  • Top Tip: Double your login protection. Enable multi-factor authentication (MFA) to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. If MFA is an option, enable it by using a trusted mobile device, such as your smartphone, an authenticator app, or a secure token—a small physical device that can hook onto your key ring. Read the Multi-Factor Authentication (MFA) How-to-Guide for more information.
  • Top Tip: Shake up your password protocol. According to National Institute for Standards and Technology (NIST) guidance, you should consider using the longest password or passphrase permissible. Get creative and customize your standard password for different sites, which can prevent cybercriminals from gaining access to these accounts and protect you in the event of a breach. Use password managers to generate and remember different, complex passwords for each of your accounts. Read the Creating A Password Tip Sheet for more information.
  • Top Tip: Play hard to get with strangers. Cybercriminals use phishing tactics, hoping to fool their victims. If you’re unsure who an email is from—even if the details appear accurate— or if the email looks “phishy,” do not respond and do not click on any links or attachments found in that email. When available use the “junk” or “block” option to no longer receive messages from a particular sender.

 Tip Sheets:

Creating A Password
A How-To-Guide For Multi-Factor Authentication
5 Ways To Be Cyber Secure At Work
Phishing
E-Skimming

 

Maintain your digital profile.

Every click, share, send, and post you make creates a digital trail that can be exploited by cybercriminals. To protect yourself from becoming a cybercrime victim you must understand, secure, and maintain your digital profile. Be familiar with and routinely check privacy settings to help protect your privacy and limit cybercrimes.

  • Top Tip: If you connect, you must protect. Whether it’s your computer, smartphone, game device, or other network devices, the best defense against viruses and malware is to update to the latest security software, web browser, and operating systems. Sign up for automatic updates, if you can, and protect your devices with antivirus software. Read the Phishing Tip Sheet for more information.
  • Top Tip: Stay protected while connected. Before you connect to any public wireless hotspot – like at an airport, hotel, or café – be sure to confirm the name of the network and exact login procedures with appropriate staff to ensure that the network is legitimate. If you do use an unsecured public access point, practice good Internet hygiene by avoiding sensitive activities (e.g., banking) that require passwords or credit cards. Your personal hotspot is often a safer alternative to free Wi-Fi. Only use sites that begin with “https://” when online shopping or banking.

Tip Sheets: 

Social Media Bots Overview
Understanding Foreign Interference In 5 Steps
Identity Theft and Internet Scams
5 Steps To Protecting Your Digital Home 

 

Cybersecurity in the Workplace

Privacy is Good for Business
Technology Checklist for Businesses
Cybersecurity for Small Business Fact Sheets

Learn more at CyberSecure My Business and the Federal Trade Commission's Cybersecurity for Small Business information page. 

Cybersecurity for Kids & Teens

Rethink Cyber Safety Rules and the "Tech Talk" With Your Teens
Tips for Parents on Raising Privacy-Savvy Kids 
Online Gaming Tips for Kids, Teens, & Tweens
NCSA's Parent Primer for Guiding Kids to Careers in Cybersecurity

Cybersecurity for Older Adults

Cyber Tips for Older Americans
Online Safety Tips for Older Adults

Website Security Notice

TrustTexas Bank understands that when it comes to your personal finances, conducting your banking in a safe, secure environment are essential. Whether you are visiting us in person or conducting a transaction at one of our ATMs, you can rest assured that TrustTexas Bank utilizes state-of-the-art technology to protect your interests. More importantly, we continuously evaluate new technologies and procedures to ensure that your protection continues without interruption. That commitment extends to our Online Banking, Mobile & Tablet Banking and Bill Pay services.

About Our Digital Banking Service

Banking via the internet is an established practice in today's society, and the systems available are designed and continuously tested to protect your interests. TrustTexas Bank brings together a combination of industry-approved security technologies to protect data for the bank and for you, our customer. It features password-controlled system entry and multifactor authentication, a VeriSign-issued Digital ID for the bank's server, Secure Sockets Layer (SSL) protocol for data encryption, and a router loaded with a firewall to regulate the inflow and outflow of server traffic.

Secure Access and Verifying User Authenticity
To begin a session with the bank's server the user must key in an Access ID and a password. Our system, the Online Banking System, uses a "3 strikes and you're out" lockout mechanism to deter users from repeated login attempts. After three unsuccessful login attempts, the system locks the user out and requires a phone call to the bank to verify the password before re-entry into the system. TrustTexas Bank also utilizes PassMark Security to provide multifactor authentication technology through their core processing vendor. Upon successful login, the Digital ID from VeriSign, the experts in digital identification certificates, authenticates the user's identity and establishes a secure session with that visitor.

Secure Data Transfer
Once the server session is established, the user and the server are in a secured environment. Because the server has been certified as a 128-bit secure server by VeriSign, data traveling between the user and the server is encrypted with Secure Sockets Layer (SSL) protocol. With SSL, data that travels between the bank and customer is encrypted and can only be decrypted with the public and private key pair. In short, the bank's server issues a public key to the end user's browser and creates a temporary private key. These two keys are the only combination possible for that session. When the session is complete, the keys expire and the whole process starts over when a new end user makes a server session.

Router and Firewall
Requests must filter through a router and firewall before they are permitted to reach the server. A router, a piece of hardware, works in conjunction with the firewall, a piece of software, to block and direct traffic coming to the server. The configuration begins by disallowing ALL traffic and then opens holes only when necessary to process acceptable data requests, such as retrieving web pages or sending customer requests to the bank. Using the above technologies, your Online banking transactions are secure.

Interactive Video Player Interactive Video Player

 

PC-Related Threats:

  • Spyware is software installed on a computer without the user's knowledge, often through a virus or when a user downloads a free program. It is designed to let a hacker eavesdrop, collect personal or confidential information and perhaps track and record a user's activities. Some spyware can obtain such information as passwords or credit card numbers. It also often bombards computer users with unwanted ads.
  • Keystroke Logging is PC software that captures the user's keystrokes, usually unbeknownst to the user. These keystroke loggers wait patiently on the PC until you type in a password and ID that can be associated with a financial institution website at which time the information is sent from the PC to the criminal.
  • Malware is malicious software (Viruses and "Trojans") - latent malicious code or devices that secretly captures data on a consumer's personal computer which may intercept the user's request to visit a particular site and redirect the user to a site a pharmer has set up.
  • Ransomware Facts & Tips

Ways to Prevent Infection:

  • Install current versions of virus detection software, firewalls and spyware scanning tools (more than one is recommended). PC Magazine and PC World are excellent resources that explain software jargon in layman's terms and provide objective product reviews.
  • Regularly update these tools by downloading updated virus definitions. This is extremely important as new viruses can appear daily.
  • Run system virus scans regularly, but especially after extensive Internet surfing or usage.
  • Make sure your browser is up to date and security patches are applied. Most browsers have automatic updates, but it's still a good idea to visit the actual website even if you're not alerted to do so.
  • Be aware of the risks in using public computers, such as those in hotels, libraries or Internet cafes, to connect to online banking because of the uncertainty of what spyware may have been installed on the public equipment.

Google Translate

Login

Chat with Us

Next section