Below are some key steps to protecting your computer from intrusion, as detailed on the Federal Bureau of Investigations’ cybercrime webpage:
Keep Your Firewall Turned On: A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be purchased for individual computers. For multiple networked computers, hardware routers typically provide firewall protection.
Install or Update Your Antivirus Software: Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users’ knowledge. Most types of antivirus software can be set up to update automatically.
Install or Update Your Antispyware Technology: Spyware is just what it sounds like—software that is surreptitiously installed on your computer to let others peer into your activities on the computer. Some spyware collects information about you without your consent or produces unwanted pop-up ads on your web browser. Some operating systems offer free spyware protection, and inexpensive software is readily available for download on the Internet or at your local computer store. Be wary of ads on the Internet offering downloadable antispyware—in some cases these products may be fake and may actually contain spyware or other malicious code. It’s like buying groceries—shop where you trust.
Keep Your Operating System Up to Date: Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates to ensure your computer has the latest protection.
Be Careful What You Download: Carelessly downloading e-mail attachments can circumvent even the most vigilant anti-virus software. Never open an e-mail attachment from someone you don’t know, and be wary of forwarded attachments from people you do know. They may have unwittingly advanced malicious code.
Turn Off Your Computer: With the growth of high-speed Internet connections, many opt to leave their computers on and ready for action. The downside is that being “always on” renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning the computer off effectively severs an attacker’s connection—be it spyware or a botnet that employs your computer’s resources to reach out to other unwitting users.
Linking to Non-Bank of Tucson Websites
This icon appears next to every link that directs to a third party website not affiliated with Bank of Tucson. Please be advised that if you click this link you will be taken to a website hosted by another party, where you will no longer be subject to, or under the protection of, the privacy and security policies of Bank of Tucson. We recommend that you review and evaluate the privacy and security policies of the site that you are entering. Bank of Tucson assumes no liability for the content, information, security, policies or transactions provided by these other sites.
You can now use your Bank of Tucson credit and debit cards on your compatible Apple® devices to pay at many of your favorite stores and apps. Apple Pay® is an easy, secure and more private way to pay.
EMV chip cards are making it more difficult for criminals to steal or clone credit card information, but there are still vulnerabilities, and when purchases are made online, chip card security features don’t work. Plus, if you’ve used your chip card recently, you’ve probably noticed that it takes much longer to authenticate a purchase than the old swipe cards. Apple Pay brings both convenience and an additional layer of security that even the EMV chip cards can’t provide.
First, paying with Apple Pay is as easy as holding your Apple Pay compatible device in front of the payment terminal and placing your thumb on the device’s Touch ID. Authentication occurs within seconds (and you don’t even have to take your wallet out!). After completing a payment, your phone will vibrate and a confirmation will appear in your Wallet app.
Second, with Apple Pay, instead of using your actual credit and debit card account numbers when you add your card to Apple Pay, a unique Device Account Number is assigned, encrypted and securely stored. Each time you make a transaction with Apple Play, a one-time unique code is generated, adding another layer of protection.
Your actual credit or debit card numbers are never shared by Apple with merchants or transmitted with payment. In addition, paying with Apple Pay is private, as the cashier never sees your name, card numbers or security code.
While Apple Pay is not available everywhere, the list of apps as well as retailers that accept Apple Pay is growing constantly. Simply look for these symbols when you check-out:
Apple Pay will work on:
- iPhone® 6, iPhone 6S, iPhone 6 Plus, iPhone 6S Plus or later model
- Apple Watch®
- In-app, Apple Pay can be used with your iPhone 6, iPhone 6S, iPhone 6 Plus, iPhone 6S Plus, iPad Air™ 2, iPad Pro, iPad mini 3, and iPad mini™ 4
To add your Bank of Tucson credit or debit card, simply open the Wallet app and click the “+” button in the upper right hand corner.
There is no cost for Apple Pay from Bank of Tucson. Based upon your device’s data plan, additional message and data charges could apply.
To learn more about Apple Pay, visit the Apple Pay page on our website.