Home | About Us | Contact Us | Bank Hours | SSB News
Security State Bank of Fergus Falls

What's Happening

Christmas Open House

Christmas Open House on December 14, 2016 from 9 am to 4 pm

Top of Page

Winter Survival Kit List

How to Make a Winter Survival Kit

Everyone should carry a Winter Survival Kit in their car. In an emergency, it could save your life and the lives of your passengers. Here is what you need:

  • A shovel
  • Windshield scraper and small broom
  • Flashlight with extra batteries
  • Battery powered radio
  • Water
  • Snack food including energy bars
  • Raisins and mini candy bars
  • Matches and small candles
  • Extra hats, socks and mittens
  • First aid kit with pocket knife
  • Necessary medications
  • Blankets or sleeping bag
  • tow chain or rope
  • Road salt, sand, or cat litter for traction
  • Booster cables
  • Emergency flares and reflectors
  • Fluorescent distress flag and whistle to attract attention
  • Cell phone adapter to plug into lighter

Kit tips:

  • Reverse batteries in flashlight to avoid accidental switching and burnout.
  • Store items in the passenger compartment in case the trunk is jammed or frozen shut.
  • Choose small packages of food that you can eat hot or cold.

911 tips:

  • If possible, call 911 on your cell phone. Provide your location, condition of everyone in the vehicle and the problem you're experiencing.
  • Follow instructions: you may be told to stay where you are until help arrives.
  • Do not hang up until you know who you have spoken with and what will happen next.
  • If you must leave the vehicle, write down your name, address, phone number and destination. Place the piece of paper inside the front windshield for someone to see.

Survival tips:

  • Prepare your vehicle: Make sure you keep your gas tank at least half full.
  • Be easy to find: Tell someone where you are going and the route you will take.
  • If stuck: Tie a florescent flag (from your kit) on your antenna or hang it out the window. At night, keep your dome light on. Rescue crews can see a small glow at a distance. To reduce battery drain, use emergency flashers only if you hear approaching vehicles. If you're with someone else, make sure at least one person is awake and keeping watch for help at all times.
  • Stay in your vehicle: Walking in a storm can be very dangerous. You might become lost or exhausted. Your vehicle is a good shelter.
  • Avoid Overexertion: Shoveling snow or pushing your car takes a lot of effort in storm conditions. Don't risk a heart attack or injury. That work can also make you hot and sweaty. Wet clothing loses insulation value, making you susceptible to hypothermia.
  • Fresh Air: It's better to be cold and awake than comfortably warm and sleepy. Snow can plug your vehicle's exhaust system and cause deadly carbon monoxide gas to enter your car. Only run the engine for 10 minutes an hour and make sure the exhaust pipe is free of snow and keeping a window open a crack while running the engine is also a good idea.
  • Don't expect to be comfortable: You want to survive until you're found.

Top of Page

Verified by Visa

Shop online with greater protection! We've partnered with Visa to offer additional protection when using your debit card online. Registering with Verified by Visa lets you create your own username and password. Once activated, you'll receive a password entry page when shopping at participating Verified by Visa online merchants – so only you can use your card.

Register now at www.ssbfergus.com/verifiedbyvisa or the next time you shop at a participating online merchant.

Top of Page

Cybersecurity Tips

From Wipfli CPAs and Consultants

Tip #2

Install and Update Antivirus Software

One of the top methods of computer attacks comes from malicious software (malware), to the extent that there are tens of millions of new pieces of malware each year. Malware can be transmitted to a computer from file downloads, e-mail attachments, USB thumb drives, and other removable media. To make matters worse, malware is often disguised as something safe or even helpful like antivirus software.

What can you do?

Install antivirus software. Use a product that is going to address all types of malware. A lack of anti-malware software leaves the system vulnerable to a very common and prevalent attack vector. Attackers often use malware to gain access to a system, capture key strokes, or utilize the system as part of a botnet.

Choose a reputable antivirus manufacturer (e.g., McAfee, Kaspersky, Sophos, Symantec). With this product, you get what you pay for. With each year's new batch of malware, you need a team of dedicated professionals to keep the software effective. A paid subscription is well worth it.

Next, use that subscription and keep the software AND the virus definitions/signatures up to date. Use auto-update options within the software to check at least daily for updates to both. There are some days when vendors release thousands of new definitions/signatures throughout a given day. Timing is everything if a new piece of malware is on the rampage!

Any time you use USB thumb drives (or other removable media), run a full scan on it. Often you will have such an option if you right-click on the drive letter in your explorer window. Be sure this is the first thing you do after connecting it to your system. Keep in mind that portable media like USB devices can carry all sorts of malware, so make sure, even before plugging it in, that you know where it came from.

This also holds true for e-mail. All e-mail attachments should be scanned before they are opened. Even though antivirus software may filter your e-mail before it gets delivered to you, take the extra step to scan again. You may have this option by right-clicking on the attachment, or some antivirus programs will scan as soon as you attempt to open them. Know how your version works. Either way, give it another scan.

"Which antivirus software should I use?" Want to know who the best is? Visit http://www.av-comparatives.org. They run many different types of tests against various AV vendors' software and on different types of platforms. Check it out and see what would work for you!

(Please note that if you click the link mentioned in this article you will be leaving the Security State Bank Website.  We do not make representation as to the completeness or accuracy of the information provided at the listed site.)

Top of Page

DATA PRIVACY

4 SIMPLE STEPS TO STOP A CYBER THIEF GETTING YOUR DATA

Security State Bank Raises Awareness for Your Data Privacy.

Fergus Falls– In recognition of National Data Privacy Day on Jan. 28th, Security State Bank is urging consumers to take an active role in protecting their data.

"Security State Bank's first priority is to protect our customers' money and their financial data," said Dave Fournier, IT Operations Specialist. "We use a combination of safeguards to protect our customers' information, and we encourage our customers to partner with us in that effort."

To help ensure the safety of personal information, Security State Bank suggests following these four tips:

1. Create c0mplic@t3d passwords. Avoid birthdays, pet names and simple passwords like 12345. It is also important to change passwords at least three times a year. Because friendly theft – theft by someone the victim knows – is the most common type of identity theft or fraud, don't share your passwords with family members and be mindful of who has access to your personal information.

2. Keep tabs on your accounts. Check account activity and online statements often, instead of waiting for the monthly statement. You are the first line of defense because you know right away if a transaction is fraudulent. Sign up for text or email alerts to be notified of transactions over a certain dollar amount or online transactions. If you notice unusual or unauthorized activity, notify your bank right away. When a customer reports an unauthorized transaction in a timely manner, the bank will cover the loss and take measures to protect the account.

3. Stay alert online. Be sure computers and mobile devices are equipped with up-to-date anti-virus and malware protection. Never give out your personal financial information in response to an unsolicited email, no matter how official it may seem. Your bank will never contact you by email asking for your password, PIN, or account information. Only open links and attachments from trusted sources. When submitting financial information on a website, look for the padlock or key icon at the top or bottom of your browser, and make sure the Internet address begins with "https." This signals that your information is secure during transmission.

4. Protect your mobile device. Use the passcode lock on your smartphone and other devices. This will make it more difficult for thieves to access your information if your device is lost or stolen. Before you donate, sell or trade your mobile device, be sure to wipe it using specialized software or using the manufacturer's recommended technique. Some software allows you to wipe your device remotely if it is lost or stolen. Use caution when downloading apps, as they may contain malware and avoid opening links and attachments – especially from senders you don't know.

Tips for Victims:

If you are a victim of fraud and suspect your personal information has been compromised, you should take the following steps:

 Call your bank and credit card issuers immediately so they can take necessary steps to protect your account.

 File a police report and call the fraud unit of the three credit-reporting companies.

 Consider placing a victim statement in your credit report and a fraud alert on your account.

 Keep a log of all the contacts you make with authorities regarding the matter. Write down names, titles, and phone numbers in case you need to re-contact them or refer to them in future correspondence.

 Contact the FTC's ID Theft Consumer Response Center at 1-877-ID THEFT (1-877-438-4338) or www.ftc.gov/idtheft.

Data Privacy Day commemorates the 1981 signing of the first legally binding international treaty dealing with privacy and data protection. It is led by the National Cyber Security Alliance, a non-profit, public private partnership focused on cybersecurity education for all online citizens.

Security State Bank of Fergus Falls

Top of Page

Cybersecurity Tips

From Wipfli CPAs and Consultants

Tip #3

Download Software Only From Reputable Websites

Software downloads are a great way to disguise malware. There are numerous sites that serve as repositories for independent developers and/or open-source software, which makes validating the source of the software and the download difficult. Without knowing where the software or the download originated, you could expose yourself to some very harmful software.

What can you do?

Major software vendors that we are all familiar with operate their own websites to distribute or sell their own software. Use a major vendor's site to download their software. (e.g., Microsoft, Apple, Google).

How can I safely get software from open-source or independent developers?

Even open-source projects typically have their own websites where you can safely download the software. First, search for favorable references to the project or developers from sources like industry news and review sites or software publishers you've worked with in the past. There are trustworthy software repository sites for lots of independent developers and open-source software. Even with trusted repository sites, it's important that you still consider the publisher of the application.

Top of Page

Cybersecurity Tips

From Wipfli CPAs and Consultants

Tip #1

Use Strong Passphrases

Passwords are naturally subject to many different attacks. Shared password conventions can increase the likelihood of passwords being guessed. Shorter passwords of dictionary words with few or predictable numbers (e.g., the year) and not using all types of complexity are easily cracked with freely available tools and inexpensive graphics cards.

What can you do?

Avoid your username, the same password with just a different digit, seasons, and other easily guessable aspects to your password. Instead, use a passphrase. A passphrase is a sentence that you can easily remember. The longer your passphrase, the stronger it is.
Making your passphrase strong can limit the success of humans and/or computers in guessing your passphrase. Using only simple sentences is becoming less effective with the decreasing cost of consumer graphics cards, which allow  approximately 8,810,000 NTLMv2-encrypted password hashes (how domain user’s passwords are stored in Active Directory) to be attempted each second.

How to make a strong passphrase

Start with a normal phrase that means something to only you so you can remember it. Do not use common quotes from books or other cultural artifacts. Write it down, including spaces.

Super best phrase of pass that only I can remember

Add capitalization in odd places.

SupEr best pHrase of paSs that Only I caN remember

Add numbers.

SupEr7best90 pH32rase of paSs th00at Only I c4aN rem9ember

Add special characters ( !#$)(*&%<>?”:{}|][,./;’ @).

SupE$r7best90 pH32&rase” of paSs: th00at O,nly I c4aN re;m9ember

That looks too hard for me to remember so I’ll simplify.

SupE$r best90 paSs:

I’ll type it into a window that will not save my work but will allow me to read what I have typed a few times to engage muscle memory.

SupE$r best90 paSs:
SupE$r best90 paSs:
SupE$r best90 paSs:
SupE$r best90 paSs:
SupE$r best90 paSs:
SupE$r best90 paSs:
SupE$r best90 paSs:

Now that I’ve typed it a few times, I have an idea of how I usually mess up typing the passphrase, which I use as part of my memory of how to type out the passphrase. Destroy the written copy of this password-generation process that we started with. Now you have a strong passphrase that you can remember.

Top of Page