Technology and Internet Safety

Internet Security Tips

Tips and resources to avoid becoming a victim of online fraud.

Read More >>

Email Security Tips

Get quick tips on what to do if you think your email has been compromised or if you doubt the validity of an email.

Read More >>

Examples of Common Email Scams

Most email scams end up involving requests to send money, cash checks, establish business relationships or requests for information, view these examples.

Read More >>

Mobile Banking Security Tips

Learn ways to keep your mobile device from becoming infected with malware and how to keep your information from being intercepted by hackers.

Read More >>

Online Safety and Security Videos

From phishing to identity theft, these helpful videos will help you protect you and your family from fraud.

Read More >>

Support Ending for Windows XP and Office 2003

Microsoft announced that technical assistance for Windows XP and Office 2003 will not be available after April 8th, 2014. This means Microsoft will no longer provide security-related patches for known vulnerabilities.

Read More >>

Protecting Your Computer

Diligently following these simple steps to safeguard your computer will minimize your risk of becoming a victim of computer hacking.

Read More >>

Protecting Yourself Online

Connecting online with friends, family and businesses provides enjoyment and opportunities. Following this advice will keep hackers and thieves from ruining your online experience.

Read More >>

Security for Mobile Devices

Consider the safety of your personal information on whatever handheld device you use.

Read More >>

Stay Secure: Look for the Green Bar

Look for the green address bar to help verify you're at the legitimate TowneBank website.

Read More >>

Internet Explorer Vulnerability

On May 1, 2014 Microsoft announced the release of an emergency patch to address a vulnerability found on all affected versions of Internet Explorer.

Read More >>

Understanding Phishing

Avoiding phishing attacks requires being alert to the signs of fraudulent requests. Do not respond to any request for personal and financial information without verifying the legitimacy of the source.

Read More >>