Security & Protection “hyperlink” 

At Trust Bank we take your banking security seriously, and we are doing everything we can to keep your money and information safe. However, an extra layer of security such as applying some common-sense steps to help protect yourself adds an extra layer of protection to your online experience. 

  • Trust bank emails will never ask you to provide any personal information such as your ATM PIN or online banking credentials.  
  • If you receive an email that appears to be from trust bank and ends up in a junk folder, leave it there 

Online and Mobile Banking Security Guarantee 

We’re committed to making Online and Mobile Banking secure and protected. Our Online and Mobile  helps provide protection against fraudulent Online Banking transactions, secures your financial information and covers the timely processing of your payments. 

Using Mobile Banking app is a fast and efficient way to send money to family and friends. We verify your enrollment with a code and also provide transaction alerts for new payees, password changes and other potentially suspicious activities. Plus, you’re not responsible for transfers you don’t authorize. 

Online Banking provides you with a convenient way to review your account activity and detect fraud earlier. If you receive an alert for unusual activity on your account, you can use Online and Mobile Banking to confirm transactions as valid or fraudulent. 

Make sure you’re on the right site 

To help ensure you’re on the real trust bank online banking platform before you log in, check your browser address bar for: 

  • https://ibank.trustbankgm.com 
  • look out for Lock padlock icon  

Help protect your computer 

  • Keep your internet browser up to date. See our browser and operating requirements  (The writings in blue should be a hyperlink and the vendor can specify the minimum requirements to use the online banking and the minimum requirements to install the mobile App. 
  • Only download software or applications from well-known or trusted sources 
  • Install system and software updates (sometimes called patches or service packs) 
  • Turn off Wi-Fi and Bluetooth services when you’re not using them, and avoid using public Wi-Fi for financial transactions unless you use a secure, private connection, like VPN software 
  • Back up your data regularly. If you use online or cloud storage, be sure you understand its privacy and security policies and keep your access codes safe. 
  • Avoid links from unknown sources, and suspicious emails. See how to spot email scams (writings in blue should be a hyperlink directing you to a page that will contain the information in section 3) 

Section 3 

How to spot a suspicious email or text 

Clicking a link in an email or text that isn’t what it appears to be could cost you or your business time and money. Fraud tactics are becoming increasingly sophisticated, and according to the FBI’s annual Internet Crime Report, cybercrime accounts for billions of dollars of losses to businesses and individuals each year. Use these tips to keep your information safe. 

Know the red flags  

Phishing attacks, typically communications that attempt to lure individuals into providing personal information, can be difficult to distinguish from legitimate emails. However, there are a number of clues. For instance, be wary of: 

  • Subject lines that demand urgent or immediate action 
  • Odd or unfamiliar senders 
  • Unexpected requests 

This is an example of a suspicious email and the signs that it is not legitimate. 

 

This is an example of a suspicious email and the signs that it is not legitimate.