Welcome to your Security Center


Tips to Keep Your Account Safe

  • Never give out usernames or passwords. Heartland Bank will never ask you for this information.
  • Never send account information, such as your account number or PIN, in the body of an e-mail.
  • Beware of phishing scams! Scammers will send texts or emails that appear to be from your bank or an online merchant asking you to click a link or provide personal information. These should be deleted immediately. Heartland Bank will never ask you for account or personal information in an email.
  • Never click on a link in a text message, as this can allow the download of malware! If you do click on a link, please have your device scanned right away.
  • Be cautious of email attachments. They may be fraudulent and download viruses or other malware to your computer.
  • Before making purchases online, make sure that the site has built-in security features to protect your account information.
  • Have the most current web browsers installed on your computer. Old browsers cannot protect you from new viruses and bugs.
  • Check your accounts online daily to monitor for suspicious activity.
  • Never give your account information to anyone claiming to be from Heartland Bank unless you initiated the call.
  • Do not give your account number or personal information over the phone unless you initiated the call.

Online Shopping 813x500

Privacy and Security

Protecting your privacy and security is a top priority at Heartland Bank. That’s why we utilize several layers of security features to ensure your privacy and security online.

To read more about these security measures, as well as tips to protect yourself, please visit our Privacy and Security page.


Debit Card Controls

Setting Debit Card controls and alerts is a great way to monitor your accounts and gain peace of mind.

  • Card controls allow you to block transactions based on amount limits, transaction types, and merchant types.
  • Card alerts can be requested for many transaction types and limits.

To manage your Debit Card controls and alerts, log in to Online Banking and select Settings, then Manage Debit Card. Next, click on the image of the Debit Card you would like to manage. Click on the Gear icon next to Alert and Controls to access your card settings.

To manage your Debit Card controls and alerts from the Heartland Bank mobile app, log in and select More, then Settings, then Manage Debit Card. From there, you will click on Alerts and Controls.


Online Alerts 813x500

Online Banking Alerts

Another way to easily monitor your accounts is by setting up text or email alerts. Receive an alert for account balances, transaction types, payment due dates and much more!

To set your alerts, log in to Online Banking and click on Settings, then Manage Alerts.



Monitor Your Credit Report

Monitoring your credit is a great way to check for errors and signs of identity theft. You can obtain a free copy of your credit report directly from each of the three nationwide credit reporting companies:


Banks Never Ask That 813x500

Banks Never Ask That

#BanksNeverAskThat is a nationwide campaign from the American Bankers Association to provide educational resources about the persistent threat of phishing scams.

Visit Banks Never Ask That for quizzes, games, and articles created to help you recognize phishing attempts and take steps to protect yourself.


Glossary

Antivirus software helps to detect, defend, and destroy malware from computers and networks.

The process of determining whether someone or something is, in fact, who or what it claims to be.

The translation of data into a secret code. To read an encrypted file you must have access to a key or password that enables you to decrypt it. Encrypted data is referred to a cipher text.

Hardware or software designed to prevent unauthorized access to a computer or network from another computer or network.

Someone who violates computer security for malicious reasons, kudos or personal gain.

A virus or physical device that logs keystrokes to secretly capture private information such as passwords or credit card details.

Software intended to infiltrate and damage or disable computers. Shortened form of malicious software.

Method used by criminals to try to obtain financial or other confidential information (including user names and passwords) from internet users, usually by sending an email that looks as though it has been sent by a legitimate organization (often a bank). The email usually contains a link to a fake website that looks authentic.

Ransomware is a type of malware that holds a company’s data or devices hostage, encrypting it until a specific amount of money is paid. Cybercriminals engaging in ransomware attacks may also threaten to use the stolen data to perpetrate additional attacks on a company’s customers.

Software with malicious payloads sold to consumers. Victims are lured by fake ads warning of an infected computer, etc. Pop up ads trying to sell you anti-virus products are typically scareware.

Phishing attacks conducted via text messaging.

Same as Phishing (see above), but this messaging is targeted at a specific individual or group of individuals, to make the message seem more authentic.

Sending an email disguised to look like it is coming from someplace besides its actual origin. The IP address may be changed, the email address may mimic a known domain, and the email formatting may imitate the design attached to a well-known company or site.

Software that captures information from your computer such as browsing habits, usernames and passwords or credit card information. Current anti-virus software is your best prevention against spyware download.

Software programs that masquerade as regular games or utilities but harm your computer. Keep your anti-virus software and operating system patched and updated for your protection.

Small programs or scripts that harm your computer, causing it to cease functioning properly. This is old school – more of a threat in the early days of the Internet. Cybercrime has become quite sophisticated over the years. Once again, updated anti-virus software virtually eliminates this threat.

Phishing attacks conducted over the telephone. The scammer will try to trick you into divulging personal information over the phone. Never provide your Social Security number, account numbers or passwords to anybody who contacts you unexpectedly. No matter what form of contact they may use. If you believe the call could be legitimate, contact the agency or company they claim to represent using a phone number that is known to you. Do not call a number they provide.

A worm are a type of virus that replicates itself. It does not destroy files but can take up all available memory or had disk space by multiplying itself. It can cause your computer to run slowly or crash.