credit card payment


Preventing Identity Theft

Steps to Reduce Your Risk of Fraud and Identity Theft

  • Reduce the number of credit and debit cards you carry in your wallet. Most identity theft happens when a purse or wallet is stolen.
  • Do not use debit cards when shopping online. Use a credit card; you are better protected in case of fraud.
  • Keep a list or photocopy of all your credit cards, debit cards, bank accounts, expiration dates and telephone numbers of the customer service and fraud departments in a secure place (not your purse or wallet) so you can quickly contact these companies in case your credit cards are stolen or accounts are being used fraudulently.
  • Never give out your Social Security Number, credit or debit card number or other personal information over the phone, by mail or on the Internet unless you have a trusted business relationship with the company and you have initiated the call.
  • Always take credit card receipts with you. Never toss them in them a public trash container.
  • Watch the mail when you expect a new or reissued credit card to arrive. Contact the issuer if the card does not arrive. Sign the back of all your credit cards.
  • Make sure your mailbox is secure.
  • Buy a shredder and use it to shred sensitive documents before tossing them in the trash.
  • Order your credit report at least once a year. Federal law gives you the right to one free credit report each year from the three credit bureaus: Equifax, Experian and TransUnion.

Special Precautions for Passwords and PIN’s

  • When creating passwords and PINs (personal identification numbers), do not use the last four digits of your Social Security Number, mother’s maiden name, your birth date, middle name, etc. It’s best to create passwords that combine letters and numbers.
  • Utilize all security options available to you particularly those associated with Internet or Telephone banking.
  • Memorize all your passwords. Don’t record them on anything in your wallet.
  • NEVER write your PIN on your ATM or Debit Card.

Obtain a free credit report

A very good way to keep identity theft at bay is to regularly review your credit report.   A new federal law allows you a free copy once a year from each of the national credit reporting companies, Equifax, Experian and Trans Union.

How to get one:

By phone, call (877) 322-8228
On the Internet:
Send a request to: Annual Credit Report Request Service, P.O. Box 105281, Atlanta, GA 30348-5281

If you request your report online, you will be able to access it immediately. If you make a written request, you should receive your report in about 15 days. Because information may vary from one credit bureau to another, it is a good idea to request a report from all three major companies.


Recognizing Fraud


An attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords, account information and credit card details, by masquerading as a trustworthy entity in an electronic communication.


A combination of “voice” and phishing, where the caller typically exploits the public’s trust in landline telephone services in order to gain access to private personal and financial information for the purpose of illegal financial reward. Victims are often unaware that vishing usually allows for caller ID spoofing and complex automated voice systems.

SMS-based phishing, or SMS-ishing

Convinces a user to click on a link in a SMS message leading them to a fake Web site from where their personal details can be phished or to call a phone number in order to gain access to private personal and financial information for the purpose of illegal financial reward.

**Please remember that we will never contact you asking you to verify any of your personal account information.**

How can you help?

We believe that the single most effective weapon against fraud and identity theft is an informed, educated customer. To help you recognize phishing scams, we have some samples of things to look for to help you distinguish a fraudulent email attempt from the real thing. If you believe you have received a fraudulent email, phone call or letter from First Bethany Bank, please contact us at or call us at (405) 789-1110 ext 245.


Responding to Identity Theft

What to Do If You Think Your Identity Has Been Stolen

If you feel that you have been a victim of fraud or identity theft relating to your First Bethany account or ATM or Debit card, please contact us immediately during business hours [8:30 a.m. to 4:00 p.m., CST, Monday through Thursday – 8:30 a.m. to 6:00 p.m., CST, Friday] at (405) 789-1110.  After hours, you can call (800) 791-2525 to have your debit card or ATM card closed.

If you suspect someone has used your name, Social Security Number or driver’s license to obtain credit, contact each of the three credit bureaus:

Equifax (800) 525-6285
Experian (888) 397-3742
TransUnion (800) 680-7289

Get a copy of your credit report. Victims of ID theft can receive copies of their credit reports free.

Make sure your account(s) are flagged with a “fraud alert” tag and a “victim’s statement.” Ask to keep the alert on your account for seven years.

Always send these requests in writing and keep a copy for yourself.

Then, contact the proper authorities.

In the United States, contact the Federal Trade Commission (FTC) to file a complaint. If you are a victim of any type of identity theft, call the FTC’s toll free Identity Theft Hotline at (877) ID-THEFT or (877) 438-4338. To help minimize your responsibility for any debts incurred due to identity theft download and print the FTC’s Identity Theft affidavit and send a copy to all credit card agencies involved. Click here for the FTC’s Identity Theft web site.

File a report with your local police or law enforcement agency.   Get a copy of the police report to notify your bank, credit card company, and other creditors that you are a victim of crime, not a credit abuser.


Internet Banking Security

lock imageOur Internet Banking technology is provided by FIS. FIS addresses security issues below:

FIS has taken every precaution to ensure a secure environment for our Internet Banking customers. To accomplish our goal of secure Internet banking, we have employed the best in Internet firewall and network security technologies. To understand how FIS protects customer data, you must first understand how a hacker will try to steal it. To simplify, a hacker will try one or both of the following: “snooping” the data while it is in transit or, attacking the server where the data resides.

The data is in transit both when it is being acquired by FIS (from the institution) and when it is being queried by the end user. To provide a safe means of getting the data from the institution to the FIS Data Server (see the diagram below), the following method is used: The institution initiates an encrypted logon to the firewall. The firewall authenticates the request and sets up an encrypted file transmission session with the Data Server located on the private internal network (inside the firewall). Thus, when the institution begins transmitting the data, it is encrypted and thus, protected from snooping attacks. To prevent snooping the end user during account queries, we’re using Secure Socket Layer (SSL), a powerful encryption and server authentication protocol, based on the RSA encryption technology. The Internet Information Server supports 128-bit encryption keys, which provides the highest level of encryption capability available for SSL.

fis network image

The Data Server, SQL Server for Windows, is protected by several layers of security. As you can see from the diagram above, the Data Server is located inside the firewall, on a private internal network. All requests to this Data Server must come through the firewall which only allows legitimate requests from the Internet Server. In other words, the only machine that the Data Server will talk to is the Internet Server and the only way it will do it is safely behind the firewall. Combined with the filtering router on the perimeter, this security model means no one could access the data directly from the Internet. The data is in effect “hidden” from the Internet. The Data Server and Internet Server both contain “mirrored” drive arrangements which prevents any loss of data or denial or service even if one of the drives crashes. The Servers are also attached to an Uninterruptable Power Supply (UPS), which will keep the server on-line even during a power outage.

Furthermore, the Windows network which the Internet banking application runs on has been tightly secured physically, at the operating system level, and at the application level of Internet Information Server and SQL Server. In addition to these precautions, the network is monitored extensively. Every logon, successful and failed, is reviewed to pinpoint any intrusion attempts (accounts are locked out after three failed logon attempts ) and if necessary, these logon attempts may be traced back to the source by the user’s IP address, request time, and additional information.