Security Practices

The protection and security of our customer’s personal and financial information is one of our most important commitments. Along with the safety measures practiced by the bank, there are steps our customers can take to help keep their information and accounts secure.

Encryption Technology and Internal Protocol

Our website uses the latest encryption technology. We take precautions in-house such as encryption, passwords, secured areas, shredding of old documents and employee training to protect all customer data against unauthorized access.

Protect against "phishing"

Be very suspicious of any email from a business or person, even if they are known to you, that ask for your password, social security number, or other highly sensitive information. Also beware of any email that sends you personal information and asks you to update or confirm it.

Greenfield Cooperative Bank and Northampton Cooperative Bank, and its employees, will never contact you and ask for personal information over the telephone or by email.

Protect your Mobile Devices

Keep the following tips in mind to protect data on your Mobile Devices:

  • Use the passcode lock on your smartphone and other devices to make it more difficult for thieves to access your information if your device is lost or stolen
  • Log out completely when you finish a mobile banking session
  • Protect your phone from viruses and malicious software or malware, just like you do for your computer, by installing mobile security software
  • Use caution when downloading apps, as they can contain malicious software, worms, and viruses. Beware of apps that ask for unnecessary “permissions”
  • Download software updates for your phone and mobile apps
  • Avoid storing sensitive information like passwords or a social security number on your mobile device
  • Tell GCB immediately if you change your phone number or lose your mobile device
  • The most basic form of information theft is observation: Be aware of your surroundings
  • Wipe your mobile device before you donate, sell or trade it using specialized software or the manufacturer’s recommended technique. You may also be able to wipe your device remotely if it is lost or stolen
  • Beware of mobile phishing avoid opening links and attachments in emails and texts, especially from senders you don’t know. Be wary of ads (not from your security provider) claiming that your device is infected
  • Public Wi-Fi as public connections aren’t very secure, so don’t perform banking transactions on a public network. If you need to access your account, try disabling the Wi-Fi and switching to your mobile network
  • Report any suspected fraud to GCB immediately

Protect your Small Business Account from fraud

  1. Educate your employees. You and your employees are the first line of defense against corporate account takeover. A strong security program paired with employee education about the warning signs, safe practices, and responses to a suspected takeover are essential to protecting your company and customers. Don’t be a victim of “phishing”, where a criminal attempts to gain your personal information or log-in credentials by posing as a legitimate business. To avoid being a victim you should never enter private information to a website unless you initiated contact and are sure you are at the legitimate site. Never click links to enter websites in email messages and remember, our bank, and any other legitimate business, will not ask for private information either by phone or email when initiating contact with you.
  2. Protect your online environment. It is important to protect your cyber environment just as you would your cash and physical premises. Do not use unprotected internet connections. Encrypt sensitive data, use a firewall, and ensure that updated virus protection is in place. DO NOT include personal or private information in non-encrypted emails. Another important tip: your passwords should be complex – a mix of upper case letters, lower case letters, numbers, symbols, not easily guessed, and no less than 8 characters. Passwords should be kept secret – do not share with others, and do not post them where they can be found. Passwords should also be changed regularly, and you should never make your password the same or similar to your User ID.
  3. Partner with your bank to prevent unauthorized transactions. Review your statements promptly and regularly to ensure only transactions you initiated are posted to your account. Notify us promptly if you discover any problems. Remember, our online service has various security features to help protect your systems, and we have also put transaction dollar limits in place to help protect you from fraud.
  4. Pay attention to suspicious activity and react quickly. Look out for unexplained account or network activity, such as pop ups, suspicious emails system slowness, etc. If detected, immediately contact your financial institution, stop all online activity, and remove any systems that may have been compromised. Keep records of what happened.
  5. Understand your responsibilities and liabilities. The agreement with your bank will detail what commercially reasonable security measures are required in your business. It is critical that you understand and implement the security safeguards in the agreement. If you don’t, you could be liable for losses resulting from a takeover. Talk to your branch manager or commercial lending officer if you have any questions about your responsibilities.