Comm(unity) Shred Day
skip to main content

Security Update

We're adding an additional layer of protection to the Online Banking log in process.

Learn about this new security feature and how it may affect you.

Learn More   Continue to Login

CBWY Blog

Comm(unity) Shred Day

Comm(unity) Shred Day

Every year we are amazed with the support from our community for our Shred Day Event.  We are thrilled that so many in our community continue to take the threat of identity theft seriously.  Each year the amount of physical documents that we are able to shred over the course of the event surpasses the previous year’s totals.  

Bring your shred for our Community Shred Day, Tuesday, May 10, 2022 from 10:30 am – 1:30 pm. We are offering shredding services for personal documents such as bills, banking statements, credit card offers, and more. We will be serving hotdogs for lunch, along with collecting a free will donation for Ray Lovato Recycling Center.

Our Shred Day event is the perfect opportunity to remind the members of our community how they can protect themselves from becoming a victim of fraud and/or theft.  Shred-it an information security and document destruction company offers eight key data protection strategies in their blog Eight Key Data Protection Strategies for Data Privacy Week.

Be discerning about granting access. Apps, websites, and other digital products frequently ask for access to your personal information. By granting access, you may be able to take advantage of an app or website at little to no cost. However, it’s important to think carefully about whether to share data with certain businesses and weigh the convenience against potential security risks. Also, be wary of apps or services that ask for information they don’t need to deliver the services they offer. This could be a red flag. By deleting unused apps on internet-connected devices and performing regular updates on the apps you do use, you can safeguard information further.

Use strong passwords. Passwords are a critical line of defense for devices, software, and online accounts. The ideal password should contain combinations of upper and lowercase letters, numbers, symbols, and be at least 8 to 12 characters long, making it hard to guess. You should have unique passwords for different logins and change them frequently, so fraudsters can’t access multiple apps or sites by cracking a single code. To keep track of different passwords, consider using password management software, which can safely store passwords using encryption and generate new ones when needed. Do not write them down or store them in a place that could be accessible to others (such as a sticky note by your computer.) 

Watch out for phishing schemes. Phishing is a social engineering scam where fraudsters pose as legitimate companies, people, or institutions in emails or text messages, with the goal of tricking recipients into sharing sensitive information. Schemes ask people to open an attachment or click on a link, which installs malware or reroutes the individual to a fake website that asks for information. These communications are designed to look familiar, so they can be hard to recognize. However, there is usually something off about the sending address—a misspelling or different name—or the request itself. You should avoid clicking on anything that seems suspicious. If you receive a dubious email at work, notify the IT department immediately. 

Avoid leaving documents lying around. Although society is becoming more digital, people still hold onto paper documents that contain sensitive information, including bank statements, receipts, and tax documents. Be sure to securely store any paper records that someone could use to steal your identity or financial information. If there are confidential papers you no longer need, you should consider working with a document disposal company like Shred-it to securely destroy the documents and help reduce the risk of identity theft. 

Commerce Bank of Wyoming is committed to providing you with the tools, tips and resources you need to keep your information safe and secure. For more tips on how to protect your identity, visit our Online Security Center.

Eight Key Data Protection Strategies for Data Privacy Week.” Shred-it a Stericycle Solution. Web. [https://www.shredit.com/en-us/blog/8-key-data-protection-strategies-for-data-privacy-week]

 

There is a Difference.
top
^