<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1594118447410323&amp;ev=PageView&amp;noscript=1">

Disclaimer

You are now leaving the Independent Bank website.

Linked web pages are not under the control of Independent Bank, its affiliates or subsidiaries. Be aware the privacy policy of the site to which you are going may differ from that of Independent Bank. Independent Bank provides external links as a convenience and is not responsible for the content, accessibility, or security of any linked web page.

Click “OK” to continue or “Cancel” to go back

Ok Cancel

Disclaimer

You are now leaving the Independent Bank website.

Linked web pages are not under the control of Independent Bank, its affiliates or subsidiaries. Be aware the privacy policy of the site to which you are going may differ from that of Independent Bank. Independent Bank provides external links as a convenience and is not responsible for the content, accessibility, or security of any linked web page.

Click “OK” to continue or “Cancel” to go back

Ok Cancel
x

Disclaimer

You are now leaving the Independent Bank website.

Linked web pages are not under the control of Independent Bank, its affiliates or subsidiaries. Be aware the privacy policy of the site to which you are going may differ from that of Independent Bank. Independent Bank provides external links as a convenience and is not responsible for the content, accessibility, or security of any linked web page.

Click “OK” to continue or “Cancel” to go back

x Want to chat? How can we help you? open chat
Menu
Search
Locations
Login

Cyber Threats Related to the Russia-Ukraine Crisis

Tips and tricks to keep your banking information protected. 

Cyber Threats Related to the Russia-Ukraine Crisis

On February 24, Russia launched a comprehensive invasion of Ukraine, indicating a major escalation of the ongoing war between the two countries.  There were many early indications that an invasion was imminent.  These included troop build-ups, unusual troop movements, military exercises, and global rhetoric regarding an escalation of hostilities.

 

We have also seen similar early warning signs of potential cyberattacks related to the conflict.  Based on current threats combined with a history of using cyberattacks as a weapon, it was assumed that attacks against US interests was a real possibility.  We have received information from U.S. government agencies and other trusted sources that this conflict will include cyberspace and that we should expect an increase in phishing and social engineering attacks.

 

We place a high priority on the security of your personal and financial information.  While we have not seen indications of abnormal or increased cyberattacks, everyone must be extremely vigilant during these difficult times. 

Sample Cyberattack Characteristics

We have prepared for increased cyberthreats and you should too.  Review the following to be ready for the possibility of increased threats against your personal and financial information:

  • Be wary of email or text messages asking for donations for Ukraine.  Many are legitimate, but this is a common means of exploiting current events to perpetrate fraud.
  • You should be suspicious of any aggressive email or text messages that attempt to pressure you with a sense of urgency.  They may ask you for sensitive information or present a fraudulent copy of a real website login page after you click on a link.
  • If you have any concerns about a link in an email, don’t click on it.  You can usually find legitimate content through other means.
  • If someone is asking you to pay a bill or invoice, be extremely cautious, especially if the request includes a change to the method of payment.  Always verify information directly with your vendor using other methods than what was used for the original request.
  • Monitor your accounts for unauthorized activity and report concerns immediately.
  • Secure your home network.  Some recommendations are to change default credentials in all devices, disable remote management of your Wi-Fi router, keep device operating systems updated, and move Internet of Things (IoTs) like thermostats to a guest Wi-Fi network.
  • Be prepared with a plan in the event that your information gets compromised.  Know what to do and who to contact before it happens.  If you are a business owner, communicate regularly with your employees regarding cyberthreats to your business and your response plan.

How Will Independent Bank Contact You and What We Will Not Do

Some cyberattack-related communication may have nothing to do with Independent Bank, but could appear to come from us.  The following list will help you identify what is normal and what is suspicious:

  • We will not ask you for your Online Banking User ID via email or text message
  • We will never ask you for your Online Banking password
  • We will not include website links in text messages.  Don’t click if the text has a link in it
  • We continually monitor your accounts for suspicious activity.  If we suspect fraud on your debit card, we will contact you to verify suspicious transactions
  • If we send you a text message regarding a suspicious transaction, you will be asked to reply to that message to verify if the transaction is legitimate or not

Contact Us

If you have received suspicious communication via phone, email, text, or other means; we recommend that you contact Independent Bank using one of the methods below:

  • Call us at 800.355.0641
  • For less urgent contact, send us a message in the One Wallet Mobile App
  • Visit any Independent Bank location
  • Find more security information on our website at the IB Security Center