Follow these tips to monitor your accounts and react immediately if you believe your information has been compromised.
Report fraudulent activity or phishing attempts:
Call 877-367-8178 or visit any branch.
Forward suspicious emails to:
Report lost or stolen checkbook or debit card
Personal Credit Card*
*You will speak with a representative from TCM Bank, our credit card service provider.
Commercial Credit Card
See the five steps you can take to repair your stolen identity.
You can help guard against identity theft by periodically checking your credit report. To order a free credit report, visit annualcreditreport.com or call 877-322-8228.
Fraud Protection Services
Premier Bank diligently monitors your account activity for fraud and uses the latest technology to better serve you. If we suspect fraud on your debit card or business credit card, we will alert you in a timely matter using our SecurLock service. Learn more about SecurLock.
Please continue to review your account activity on a regular basis to ensure no suspicious activity has occurred.
Premier Bank will NEVER contact you to ask for your account number, card number, password, or PIN. If our records indicate you have shopped at a retailer during the time of a data breach, Premier Bank will take precautionary measures regarding your debit or credit card to protect your account from fraud.
Identity crimes are known as malware, phishing, and spoofing just to name a few. To avoid these scammers' traps, take action to detect fraud and protect your identity. For additional resources please visit Federal Trade Commission's website.
Protecting Yourself Online
- A secure website will display https:// or the lock symbol in the address bar.
- Premier Bank's website will say "yourpremierbank.com" in the address bar.
- Do not respond to email requests for personal or financial information.
- Check your accounts online often to ensure any questionable activity is reported immediately.
- Ensure you have a valid business address and telephone number when conducting online purchase transactions.
Protecting Yourself on Mobile and Tablet Devices
- Do not respond to text messages asking for personal or financial information.
- Use a mobile operating system (OS) that supports hardware-based encryption for both internal and external storage. This means the data stored on it is protected from all hackers.
- Set a screen lock passcode or PIN to prevent others from snooping on your device if it becomes lost, stolen, or left unattended.
- Enable data auto-wiping after a certain number of incorrect password attempts. Back up your data regularly and use a solution that lets you restore the data.
- Use a remote tracking and management solution on your device to aid in finding it if it’s misplaced or stolen.
- Use a data connection rather than unsecured Wi-Fi hotspots. Unsecured public Wi-Fi hotspots make it easy to capture Wi-Fi users’ passwords. 4G cellular data connections are usually encrypted by the carriers reducing the risk of eavesdropping.
- Consider installing a security app to help prevent viruses, malware, and hacking on mobile and tablet devices.
Protecting Your Computer
- Keep your computer security system and firewall updated. A firewall is software that blocks unauthorized users from accessing your computer.
- Only download files from known and reputable sites that have confirmed that the download is malware free. If you are unsure about the quality of a download, leave the site and research the software you are being asked to install. If it is OK, you can always go back to the site and install it. If it is not OK, you will avoid a malware headache.
- Back up your files onto a removable disc or an external hard drive, and store it in a safe place. If your computer is compromised, you’ll still have access to your files.