Debit Card Safety
At Cathay Swift, safeguarding your account is an important part of our business.
We're taking every step to make sure you are the one authorizing the use of your card.
In our continuing efforts to provide superior protection to your accounts, we are empowering you with new tools to react to potential fraud quicker and more efficiently than ever before! Falcon, our new fraud alert system, offers you the peace of mind that comes with 24/7 monitoring and three ways to communicate with us - Talk, Text and Email!
***Update your telephone numbers and email addresses with us!***
What you need to know:
- The Fraud Center has a new Phone Number.
- When contacted by the Fraud Center, you will have the option to speak to a live fraud analyst.
- An automatic text message will be sent to each text capable contact number you have on file.
- All text messages from the Fraud Center are free! No cost to you. Ever.
- You will be prompted to confirm whether the detailed transaction is legitimate.
- If fraudulent, a specialist will call you and your card will be stopped.
- If legitimate, your card is unblocked and you can resume using the account.
- An automatic email message will be sent to the email address you have on file.
- You will be prompted via hyperlink to confirm whether the detailed transaction is legitimate.
- You will receive a confirmation email once you have responded to the initial communication.
***Remember Fraud Center messages or telephone calls will never ask for PINs or account numbers.***
We are excited to offer you these complimentary enhancements and look forward to working with you.
Online Security
Cathay Swift is dedicated to providing the greatest level of security possible to
customers and potential customers utilizing our website and online services while maintaining ease of
use and accessibility. To ensure privacy and security, customers may access account information online
from the Cathay Swift website only if the customer has registered for access to myCathay Swift.
The Bank’s myCathay Swift product uses Secure Socket Layer (SSL) technology to encrypt customer personal
information such as User IDs, Passwords, and account information over the internet. Not enrolled? Enroll in myCathay Swift now!
The Internet provides customers and businesses a great opportunity to streamline everyday tasks and take advantage of new services and products. Those who will be the most successful with these new opportunities will be those who use them wisely. Although the information below is not exhaustive, it contains some key points that will help you use the internet in a more secure manner. Use these points with caution and good judgment.
Protecting Your Computer
Cathay Swift takes extreme caution in protecting customer information and access
points to this information that are within the Bank’s control. However, there are still access points
that Cathay Swift does not control. The main point of access outside of the Bank is
customer PCs and other electronic devices used to access
online banking information such as myCathay Swift. While not all inclusive, customers are recommended to follow
the below guidelines to help ensure their protection while Banking online:
- Anti-virus should be downloaded and active on the PC. Free versions are usually better suited for
home environments and are still generally not as complete as others. Anti-virus should include, at a
minimum: real-time protection, anti-spyware, install regular updates and scan email attachments.
- When security patches are released for the operating system and Internet Browser being used they
should be downloaded and kept up to date.
- Internet Security Level settings should be set as high as possible while allowing the computer to
function logically.
- Internet Browsers should never be allowed to remember passwords. These are stored as cookies and
easily accessed if the computer is compromised.
- Passwords should be changed at least every 90 days.
- Passwords should never be shared with anyone.
- myCathay Swift tells each customer when they last logged into their online banking. This can be viewed at
the bottom of the screen. Customers should always check this information to ensure no one else has
been logged into their account.
Submitting Forms Online
Information provided via electronic forms on the Cathay Swift’s website is secure and
encrypted in most instances. This means it is scrambled en route and decoded once it reaches
Cathay Swift’s servers. You may check that your web session is secure by looking for a
small lock symbol usually located in the upper right corner of your web address bar. You may also look
for the letters "https://" at the beginning of your website URL in your web browser. The "s" means that the
web connection is secure.
Sending E-mail to Cathay Swift
E-mail sent within myCathay Swift is secure. However, email sent from Cathay Swift’s main
website or by any other means may not be secure unless Cathay Swift advises that
security measures will be in place prior to transmitting the information. Therefore, customers should
not send confidential information such as social security or account numbers to Cathay Swift via an unsecured email.
General E-mail Security
Turn off the “Preview Pane” in email software. Some viruses execute as soon as an email message is
opened. The preview pane automatically opens all messages. Customers should be extremely cautious with
email from any unknown sender. If a customer is in doubt and cannot confirm the origin of the email,
serious consideration should be given to deleting the email without opening. Any links embedded within
an email should not be clicked. It is generally best to type the URL in the Internet browser yourself
or use a link that is known to be legitimate. Many viruses are embedded in attachments such as word or
PDF files. Extreme caution should be used when opening
any email attachment.
Links to Third Party Websites
Cathay Swift is not responsible for the information practices employed by sites
linked to or from our website. In most cases, links to outside websites are provided solely as
pointers to information on topics that may be useful to the users of the Cathay Swift website. Third party websites may have different privacy policies and/or security standards governing
their sites.
Financial Elder Abuse
Elderly adults are a prime target for financial exploitation. This exploitation can be perpetrated
by caregivers and family members as well as other outside parties. While not all elders are victims of
financial abuse, it is important to be aware of the signs of financial elder abuse in order to prevent
it from happening to you or a loved one.
What is Financial Elder Abuse?
It is when an elderly person’s money or property is being used in an unauthorized way. Often they
are frail physically and their mental state is not what it once was, so they may not know that they
are being abused or they may be too scared to manage the situation.
Elder financial abuse spans a broad spectrum of conduct, including:
- Taking money or property.
- Forging a signature.
- Getting an elderly individual to sign a deed, will, or power of attorney through deception,
coercion, or undue influence.
- Using the elderly individual’s property or possessions without permission.
- Promising lifelong care in exchange for money or property and not following through on the
promise.
- Confidence crimes ("cons") are the use of deception to gain victims' confidence.
- Scams are fraudulent or deceptive acts.
- Fraud is the use of deception, trickery, false pretense, or dishonest acts or statements for
financial gain.
- Telemarketing scams. Perpetrators call victims and use deception, scare tactics, or exaggerated
claims to get them to send money. They may also make charges against victims' credit cards without
authorization.
Caregiver Exploitation
Exploitation by caregivers is the most common type of elder financial abuse. This is due to the
unlimited access caregivers often have to an elderly adults' funds and property as they care for them.
Caregiver exploitation is recognized when a caregiver wrongly uses an elderly adult's cash, bank
accounts, checks, income or personal items. For example; you notice that the caregiver is using funds
for their personal benefit instead of for the elderly adult.
Other ways that caregivers might financially exploit elderly adults is via identity theft or forged signatures. If you notice that a caregiver is not providing for the personal needs of an elder, financial abuse may be occurring.
Outside Party Exploitation
Elderly adults are a leading target for exploitation by outside parties. Many con-artists target
the frailty of elderly adults through various methods. The following list is a few of the ways they
attempt to con the elderly.
- Taking donations for fake charities.
- Investment fraud.
- Jackpot prize winnings (elderly have to pay money in order to claim prize.)
- Emergency Scams (my child is in the hospital and I don’t have money for gas, etc.)
- Work Scams (is there some work I can do for you, and then charging an excessive amount for the
work.)
How do I report elder abuse?
The exploitation of the elderly happens daily. If you suspect elder abuse, you are legally required
to report it. Kentucky is a mandatory reporting state. You can report abuse at the 24 hour toll free
hotline 1-800-752-6200 (calls can be made anonymously.)
Identity Theft
Identity Theft occurs when your personal information is stolen and used without your knowledge to
commit fraud or other crimes.
How can I keep this from happening to me?
- Shred your mail, financial documents, or any paperwork with your personal information listed on
them instead of tossing them in the waste basket.
- Protect your Social Security Number (SSN) – Don’t write your SSN on a check or carry your Social
Security card in your purse or wallet. Give out your SSN only when necessary and ask if they would
take some other type of identifying information instead.
- For personal information that you need to keep, make sure you store it in a secure area at home.
- Do not use obvious passwords like your mother’s maiden name, your date of birth, or the last four
digits of your SSN.
- Do not give out personal information over the phone, through mail, or over the Internet unless you
are certain you are dealing with a secure entity.
- Never click on links sent in unsolicited emails!! Instead, type in a known web address from your
browser. Use anti-virus software on your home computer and be sure to keep this software up-to-date.
How do I know if I’ve been a victim?
Alerts that require your immediate attention:
- A bill does not arrive as expected.
- You receive credit card or account statements that you were unaware of.
- Call or letters about purchases you did not perform.
- Denial of credit for no obvious reason.
- Review your Financial Statements
- Review your financial accounts and billing statements regularly to look for charges that
you’ve not made.
- Review your financial accounts and billing statements regularly to look for charges that
you’ve not made.
What if I become a victim of ID Theft?
- Close any account that has been fraudulently tampered with.
- Contact the security or fraud department of each company where there was an account opened or
changed without your consent.
- Ask for verification that the disputed account has been closed.
- Keep copies of documents and records of your conversations about your ID theft.
- Contact the security or fraud department of each company where there was an account opened or
changed without your consent.
- File a Police Report
- File a report with the police to give to creditors who may want proof of the crime.
- File a report with the police to give to creditors who may want proof of the crime.
Social Media Security
Social media are computer-mediated tools that allow people to create, share or exchange
information, ideas, and pictures/videos in virtual communities and networks. Let’s face it in today’s
fast paced world who doesn’t love to communicate with friends and family via social media. According
to the eMarketer estimates in 2013, 67.7 percent of internet users worldwide will use a social network
at least once a month. The proportion will increase to more than three out of four users in 2016.
Social media, being as wonderful as it is, still poses risks to users. According to the FBI, there
are primarily two tactics used to exploit online social networks, and these tactics are often
combined.
- Computer savvy hackers who specialize in writing and manipulating computer code to gain access or
install unwanted software on your computer or phone.
- Social or human hackers who specialize in exploiting personal connections through social networks. Social hackers, sometimes referred to as “social engineers,” manipulate people through social interactions (in person, over the phone, or in writing).
Social manipulators / hackers know that humans are a weak link in cyber security. With this
knowledge, they design their actions to appear harmless and legitimate while trying to trick people
into getting past their security walls. Falling for these scams can be detrimental for the victim as
an individual, as well as the organization in which the victim works for.
Once information is posted to a social networking site, it is no longer private. The more information you post, the more vulnerable you may become. Even when using high security settings, friends or websites may inadvertently leak your information.
Predators, hackers, business competitors, and foreign state actors troll social networking sites looking for information or people to target for exploitation.
Information collected from social networking sites may be used to design a specific attack that does not come by way of the social networking site.
Preventative Measures
- Do not store any information you want to protect on any device that connects to the Internet.
- Always use high security settings on social networking sites, and be very limited in the personal
information you share. Monitor what others are posting about you on their online discussions.
- Use anti-virus and firewall software. Keep them, and your browser, and operating systems patched
and updated.
- Change your passwords periodically, and do not reuse old passwords. Do not use the same password
for more than one system or service. For example, if someone obtains the password for your email,
can they access your online banking information with the same password?
- Do not post anything that might embarrass you later, or that you don’t want strangers to know.
- Verify those you correspond with. It is easy for people to fake identities over the Internet.
- Do not automatically download or respond to content on a website or in an email. Do not click on
links in email messages claiming to be from a social networking site. Instead go to the site
directly to retrieve messages.
- Only install applications or software that come from trusted, well-known sites. “Free” software may come with malware. Verify what information applications will be able to access prior to enabling them. Once installed, keep it updated. If you no longer use it, delete it.
- Disable Global Position System (GPS) encoding. Many digital cameras encode the GPS location of a
photo when it is taken. If that photo is uploaded to a site, so are the GPS coordinates, which will
let people know that exact location.
- Whenever possible, encrypt communications with websites. It may be a feature social network sites
allow you to enable.
- Avoid accessing your personal accounts from public computers or through public WiFi spots.
- Beware of unsolicited contacts from individuals in person, on the telephone, or on the Internet
who are seeking corporate or personal data.
- Monitor your bank statements, balances, and credit reports.
It is unwise to share usernames, passwords, social security numbers, credit cards, bank
information, salaries, computer network details, security clearances, home and office physical
security and logistics, capabilities and limitations of work systems, or schedules and travel
itineraries.
Cathay Swift Debit and Credit Card Travel Guidelines
Debit Card
- Contact your local office before traveling so we know to expect out-of-town or out-of-state charges. We will alert our Fraud Monitoring Service to help ensure your card(s) will work appropriately while traveling.
- If you are traveling outside Kentucky, please remember you will need to use your card as a Debit card – using your PIN – at all merchants, excluding gas stations and restaurants.
- Due to fraud, we have placed debit card restrictions in certain states. Please contact your local office if you have any concerns.