Security at Park Bank

At Park Bank, we use leading-edge technology to protect the confidentiality of your information and online transactions. We use a combination of security measures that are among the best in the ecommerce industry.

  • Encryption - We use the highest industry standard for online security – Secure Sockets Layer (SSL) encryption – to encrypt your personal information, such as user IDs, passwords and account information. Your personal information is scrambled en route and decoded once it reaches your browser. We use 128-bit encryption, one of the highest level generally available today. Our secure servers are also protected by numerous firewalls, which are constantly monitored with the intent to prevent security breaches. This process helps safeguard your banking session from intruders.
  • Authentication - Account access is restricted by confidential user IDs and passwords. You are responsible for not sharing your user ID, password and other confidential account information with anyone, including family, friends, accountant or employee. Do not write your password on something others may see. Never access the banking site from a computer that an untrusted individual may have access to. Contact us immediately if you suspect someone has discovered it.

    We confirm your identity using two additional components: complex device profiling and "step-up" authentication which will either require entry of a one-time security code or ask you to answer out-of-wallet questions (consumer accounts only).
  • Sign on information - We show the last day and time you signed on to online banking.
  • System time-out - You will be automatically signed out of online and mobile banking after several minutes of inactivity.
  • Firewall security - Park Bank uses leading firewall and network security technology to protect our internal computer systems from unauthorized access.

Security Alerts

We take the security of your information seriously. Check here periodically to stay updated on the latest major security alerts. We also provide helpful resources for how to protect the security of your financial resources:


December 2015 – CEO Fraud Scams Continue Despite Warnings 
In the last few months, law enforcement has warned repeatedly about a new scam that is rapidly expanding. The FBI calls it "Business Email Compromise" (BEC), but it is better known as "CEO Fraud."

October 2015 – CFO/CEO Wire Fraud  
Fraudsters may be watching your company email activity, and when the moment is right – they are ready to strike. This scam has hit Milwaukee and companies we do business with. Don’t be one of the 7,000 U.S. companies that have lost money to this scam.


Common Scams

While there are a number of fraudulent schemes circulating in today’s world, there are three primary methods used to deliver scams today: 
  • Phishing – the most common and most effective method criminals use to obtain your personal data. According to Merriam-Webster, Phishing is defined as a scam by which an email user is duped into revealing personal or confidential information which the scammer can use illicitly. There is a wide variety of topics used in phishing attacks, but the goal is to trick, or even scare you, into providing confidential data. Some of the more common tricks include purported messages from the IRS claiming you either have substantial money coming to you, or that you are behind in taxes and an agent needs to hear from you. Package delivery scams claiming to be from FedEx, UPS or the U.S. Postal Service are also common. Family concerns are another hot topic used by criminals. They claim to be a relative who was robbed while on vacation and need money to return home, or they stoop as low to feign to be a funeral home asking for information due to the unexpected death of a relative. 
  • Vishing – not as popular of a scheme as Phishing, but is a common tactic. Instead of email as the medium to connect with you, vishing uses telephone calls and voicemail messages. Criminals using this method often manipulate caller ID information to present the legitimate name of a business or entity. Similar to Phishing, obtaining personal and financial data is the goal. 
  • SMShing - the least popular of the three, but in circulation. SMShing is a fraud scheme using text messages on a cell phone to trick victims into visiting a fraudulent website, calling back a fraudulent phone number or downloading malicious content via a phone.

Electronic fraud schemes

  • Skimming - debit/credit/prepaid card identity theft using "skimming" is increasing at automated teller machines (ATMs) and gas station pumps. Skimming occurs when a criminal places a small, undetectable electronic device on a card reader, which then takes information from the card’s magnetic strip whenever a customer uses the card in that machine and transmits the information to the fraudster. Skimming tactics are growing, and experts believe it costs U.S. banks and their customers tens to hundreds of millions of dollars each year.  Skimming devices are typically installed for short periods of time, usually just a few hours, and are often attached by glue or double-sided tape. When removed by the criminals, stolen account information is downloaded and encoded onto blank cards. The cards and PINs can then be used to make withdrawals from the accounts of users of the compromised ATMs.

    Be aware of the people near the machine and inspect the machine before using it. Look for anything suspicious about the machine. Check the card reader and the area near the key pad. Be suspicious if you see anything loose or crooked, or notice marks or adhesive tape residue and consider finding another source. Normal business hours are the safest times for ATM use. The higher level of activity around branches and ATMs make it harder for fraudsters to install their equipment, or be spotted doing so.
  • ACH and wire transfer schemes - Account takeover occurs when a fraudster opens an illegitimate business account at a financial institution.  Shortly after, campaigns begin to try and trick people to provide personal information. These campaigns are often in the form of the aforementioned phishing, vishing and /or smshing. The goal of the fraudster is to install malicious software (Malware) onto a computer which allows them to spy on the activity of the computer.

    Malware installs can lead to a Keylogger/Man in the Middle (MitM) infection. Keylogging involves the recording or logging of the key pattern typed on a keyboard.  The infection runs in a manner that the victim using the keyboard is unaware the keystrokes are being monitored. The stealth monitoring allows thieves to record your credentials when logging into an online service, ultimately allowing them to log into your account, and potentially send money elsewhere from your account.  

A few tips to keep yourself safe

  • If you receive a message that contains poor grammar, punctuation and spelling, there is a very good chance the message is fraudulent.
  • Refrain from giving out your PIN (personal identification number). Park Bank will never ask you for a PIN or request personal financial information in an email message.
  • Ignore email messages from any source you are not familiar with. Open only the messages from an entity you were expecting a response from.
  • Be leery of email messages with “urgent” subject lines. These type of messages are preying on quick emotions from you rather than a rational one.
  • Should you receive an email message that requests personal information, but it does not appear to have any contact information, do not respond.    
  • If you aren’t completely confident, or if you have any doubt about the legitimacy of a message or website, stop what you are doing. Re-evaluate the situation.
  • Do your best not to download software from websites that you don't completely trust. Listen to that little voice inside of you as your guide. You may end up downloading a keylogging program or other malicious software unknowingly.  
  • Scrutinize links before clicking them, and be cautious of downloading software from unfamiliar websites. 
  • Purchase and maintain a subscription to a desktop antivirus system.
  • Be sure your computer operating system, software, browser version and plug-ins are current. Unpatched and outdated software can lead to security vulnerabilities.
  • Refrain from conducting online banking activities on computers that are shared by others – like publicly shared computers.
If you feel you have been the victim of a fraud scheme, please contact your local police department. If you feel your financial information may have been compromised, please contact us at 414-466-8000.