Resources to help you stay safe online, protect your money and safeguard your identity.
Modern background created from scratch through a multi-step design process
Your quick resource for information on how to report a lost or stolen card, report fraudulent activity on your account, and set up account alerts in Digital Banking.
Should you need additional assistance, we are always here for you!
Details
If your First Kentucky Visa Debit or ATM card is lost or stolen, please notify us as soon as possible.
You may report your lost or stolen Visa Debit card through the Manage Cards option within Digital Banking. This option is available 24 hours a day and will immediately disable your card.
You may also notify us of your lost or stolen Visa Debit or ATM card by calling one of the following numbers:
Monday through Thursday, 8:00 am to 4:00 pm and Friday, 8:00 am to 6:00 pm: 866-839-6271
After hours, including weekends and holidays: 844-202-5333
Details
The safety and security of your accounts is one of our top priorities. If you notice suspicious or fraudulent activity on your account, please notify us as soon as possible using one of the notification methods below.
Please call us Monday through Thursday, 8:00 am to 4:00 pm and Friday, 8:00 am to 6:00 pm at 866-839-6271.
After hours, including nights and weekends, please email us at fkb@firstkentucky.com.
If the suspicious activity has occurred with your Visa Debit or ATM card and you are contacting us after hours, including weekends and holidays, you should also turn your card off through the Manage Cards option within Digital banking or by calling 844-202-5333.
Details
Account alerts allow you to receive important account and security related notifications by email or text.
Setting up account alerts is easy! Simply log into Digital Banking, click “Manage Alerts” in the main menu and follow the on-screen instructions to set-up the Custom and/or Security alerts you wish to receive.
Protecting yourself and your business from cybersecurity threats has never been more important. Minimize the risks by arming yourself with knowledge about online security, scams, and identity theft.
Should you need additional assistance, we are only a phone call or email away!
Details
We strive to keep you and your information safe at all times. For more information, please review our privacy policy. For any questions about this policy, contact us.
Details
At First Kentucky security is one of our top priorities. We have many robust security protocols and systems in place to protect you when using our digital banking solutions. Equally important is the role you play in protecting your personal information and account data.
To help you have a safe and secure online experience, we have put together a list of best practices:
Safeguard your computer
Safeguard your personal information and data
Safeguard your mobile devices
Browse the web safely
Details
Fraudsters are always looking for a way to steal your money and your identity. Understanding how different types of fraud schemes and scams work can help you avoid becoming a victim.
Phishing
Phishing is a scam in which e-mail spam or pop-up messages are used to deceive you into divulging personal or financial information over the internet. Phishers will send you an email or a pop-up message that appears to be from a company that you recognize or deal with, such as your employer, credit card company, bank, or a government agency. These emails will often be related to subject or topic of current relevance. For example, the message may be related to a current political or social issue, or you may receive one of these messages in early April related to tax filing. The message usually requests that you update or validate account information and it will direct you to a fraudulent website that looks just like the legitimate organization’s website. The purpose of the bogus website is to deceive you into entering your personal information so the scammers can steal your money, your identity, and possibly even commit crimes in your name.
To avoid being a victim of a phishing scam:
Variations of this scam are also sometimes perpetrated by text message, referred to as “smishing”, or by telephone call, referred to as “vishing.” As with emails, legitimate companies will not ask you for personal information, account information, or usernames and passwords via text message or by phone. You should only provide personal information by phone if you have initiated the call seeking assistance and you are being asked for such information as a means of identification.
Malware
Malware, short for “malicious software,” comes in many forms including viruses, spyware, ransomware, adware, and other types of malicious code. Malware can be installed on your computer, phone, or mobile device without your consent. Once installed, malware can be used to steal personal information, send spam, and commit fraud.
The best way to avoid malware is to avoid opening email attachments included with suspicious or unexpected emails, practicing safe web surfing, and by installing and regularly updating antivirus, anti-spyware, and anti-malware software on your device.
For more information on malware, visit the Federal Trade Commission’s website at: https://www.consumer.ftc.gov/articles/0011-malware.
Details
Never has it been more important to have systems and processes in place to protect your business from cyber thieves.
Corporate account takeover, also referred to as CATO, is a growing form of electronic crime where thieves typically use some form of malware, or malicious software, to obtain login credentials to corporate online banking accounts and fraudulently transfer funds from the accounts. Another means fraudsters commonly use is phishing or masquerading as a trustworthy entity in an electronic communication or through social engineering to gain access to your sensitive information. Once they have your credentials (username and password), they will login to your online banking and create transfers normally using ACH or Wire Transfer features to steal funds from your accounts.
These types of attacks can result in substantial monetary loss for your company that often cannot be recovered. As your bank, we do everything we can to keep your money safe. Unfortunately, our security procedures can only go so far to protect your accounts from corporate account takeover. There are some vulnerabilities that can only be addressed from your side and therefore require that you implement sound practices with your staff, systems, and offices. Awareness of online threats and education about common account takeover methods are helpful measures to protect against these threats.
Basic Online Security Practices
Contact the Bank immediately at 866-839-6271 if you:
Incident Response Plans
A written incident response plan will provide important guidelines for your employees so that they will know what to do and who to contact for help if a CATO incident were to occur. Since each business is unique, you should write your own incident response plan. Having a plan and reviewing/updating it annually will help minimize losses. A general template should include:
Additional Business Security Resources:
U.S. Secret Service, FBI, IC3, and FS-ISAC – Fraud Advisory for Businesses: Corporate Account Takeover
http://www.ic3.gov/media/2010/CorporateAccountTakeOver.pdf
The Better Business Bureau -Business Cybersecurity
The Federal Trade Commission’s (FTC) Cybersecurity for Small Businesses: https://www.ftc.gov/tips-advice/business-center/small-businesses/cybersecurity
NACHA – Current Fraud Threats and how to protect your organization from fraud.
https://www.nacha.org/content/current-fraud-threats
Federal Communications Commission (FCC) -Cyberplanner to help you create and customize cybersecurity plans
https://www.fcc.gov/cyberplanner
National Cyber Security Alliance (NCSA)- CyberSecure My Business™ is a national program helping small and medium-sized businesses learn to be safer and more secure online.
https://staysafeonline.org/cybersecure-business/
STOP. THINK. CONNECT– Cybersecurity awareness campaign developed in part with NCSA and The Department of Homeland Security.
U.S. Small Business Administration– Small Business Cybersecurity Guide
https://www.sba.gov/business-guide/manage-your-business/small-business-cybersecurity
Details
Identity theft occurs when someone obtains your personal information, such as your social security number, date of birth, address, and account numbers, and then uses that information to assume or take on your identity. Once they have stolen your identity, the criminal is able to illegally make purchases and obtain credit in your name.
In some instances, these criminals may even fraudulently obtain a driver’s license or seek employment in your name. Among other things, these acts can damage your credit and result in large financial losses. Unfortunately, you may not know you have become a victim of identity theft until you suffer financial consequences such as receiving a mysterious bill or being denied for a loan.
The following are best practices you can follow to protect yourself from becoming a victim of identity theft:
What to do if you are a victim of identity fraud
If you learn that you have become a victim of identity theft, do the following:
Additional ID Theft Resources:
The Federal Trade Commission: identitytheft.gov
Federal Bureau of Investigation: fbi.gov/investigate/white-collar-crime/identity-theft
U.S. Department of Justice: justice.gov/criminal-fraud/identity-theft/identity-theft-and-identity-fraud