Chickasha Bank & Trust Company Logo Banner Ad
Spacer Image
Online BankingDeposit AccountsLoan ProductsOur Story
Spacer Image
Spacer Image
What's New
Here are some helpful links:
Spacer Image Spacer Image
Spacer Image

Conducting Your Transactions Online

Federal financial regulators are reporting that Internet threats have changed significantly over the past several years. Sophisticated hacking techniques and growing organized cyber-criminal groups are increasingly targeting financial institutions, compromising security controls, and engaging in online account takeovers and fraudulent electronic funds transfers.

In order to help ensure the security of your online transactions, we want you to know that:

1) We will never email, call, or otherwise ask you for your user name, password, or other electronic banking credentials.

2) You can help protect yourself by implementing alternative risk control processes like:

  • Making sure you choose an adequate user name and password that, at a minimum, mixes in lower case letters, upper case letters, and numbers
  • Periodically changing your password. Our system will prompt you when it is time to make that change
  • Having current anti-virus and anti-malware software
  • Safeguading your user name and password information
  • Making sure you have a firewall in place when conducting your financial transactions
  • Logging off the system when you are done conducting business (don't just close the page or "X" out of the system)
  • Monitoring your account activity on a regular basis
  • In addition, we may require owners of commercial accounts to perform their own risk assessments and controls evaluations. For example:

    1) Make a list of the risks related to online transactions that your business faces, including:

  • Passwords being written down and left out in the open
  • The use of old or inadequate passwords
  • The possibilty of internal fraud or theft
  • Delays in terminating the rights of former employees
  • The lack of dual control or other checks and balances over individual access to online transaction capabilities
  • 2) An evaluation of controls your business uses may include:

  • Using password protected software in which to house passwords
  • Conducting employee background checks
  • Initiating a policy and process to terminate access for former employees
  • Segregating duties among two or more people so no one person has too much access or control
  • Conducting internal or third party audits of controls
  • Using firewalls to protect from outside intrusion or hackers
  • Federal regulations provide consumers with some protections for electronic funds transfers. These regulations generally apply to accounts with Internet access. For example, these federal laws establish limits on a consumer's liability for unauthorized electronic funds transfers. They also provide specific steps you need to take to help resolve an error with your account.

    Note, however, that in order to take advantage of these protections, you must act in a timely manner.

  • Make sure you notify us immediately if you believe your access information has been stolen or compromised.
  • Also, review your account activity and periodic statements and promptly report any errors or unauthorized transactions.
  • See the Electronic Funds Transfer disclosures that were provided at account opening for more information on these types of protections. If you can't find yours, we will gladly provide you with a copy if you request one by asking for New Accounts at 405-222-0550.

    If you become aware of suspicious account activity, you should immediately contact the authorities and contact our Customer Service department at 405-222-0550.

    NOTE: You will find additional Helpful Links in the upper left column of this page. Those same links can also be found if you click "Online Banking".

    Top of Page
    Spacer Image
    Application CenterCalculatorsEmploymentPrivacy PolicyHome Member FDIC & Equal Housing Lender Logos