Safe Online Banking

Safe online banking includes:

  • Understanding the threats
  • Protection against account fraud and identity theft
  • Securing your internet transactions


When you travel the Internet to access online banking, you want to be assured, first and foremost, that effective safeguards are in place to make your visit safe, secure, and reliable. When you use online banking to visit First Northern Bank, whether it's to learn about rates, to review your accounts or to pay your bills, you are entering a secure area. Measures First Northern Bank takes include the following:

Password Protection & PIN

Your password and PIN (personal identification number) are the first line of defense, and are your unique identifier. Be sure not to share them with anyone – most frauds involving hijacked accounts originate with someone the victim knows.

Multi-Factor Authentication

This form of identity verification provides added security be requiring multiple forms of identification, such as something you know (password or PIN) and something you have (ATM card, smart card).


Once online with First Northern Bank, your transactions and personal information are secured by encryption software that converts the information into code that is readable by only you and the Bank.

Privacy Policies

First Northern Bank's privacy policies protecting your personal information are stringent. Your confidential information is treated with the utmost care, meeting or exceeding federal and state mandates.


Whether you are conducting online financial transactions over the Internet or simply "surfing," some easily implemented precautions can help safeguard your personal information from identity theft and account fraud:


Security begins with a strong password, which only you, the user, knows. Experts advise a combination of letters and numbers, and advise against using easily guessed passwords such as birthdays or home addresses.

Anti-Virus Protection

Make sure the anti-virus software on your computer is current and scans your email as it is received. This simple step is critical to your personal safety and security when online.

Email Communication

Email is generally not encrypted so be wary of sending sensitive information such as account numbers or other personal information in this way. If you receive an unsolicited email purporting to be from the Bank, be cautious – take time to call the Bank and make sure the email was sent from your banker.

Signing Off

Always log off by following the Bank's secured area exit procedures to ensure the protection of your personal information.

Be Aware

Crooks are trying to get your personal information – and they employ some ingenious methods. Don't respond to any unusual requests for personal information – when you opened your bank accounts you already gave it. When in doubt, call First Northern Bank.


Drop by First Northern Bank today to learn more about online banking and the security measures that are in place for your protection. Or contact any of these financial industry regulators.

Understanding what criminals are trying to do over the Internet is the first step in building a good defense.

Most electronic fraud falls into one of three categories. Experts advise: understand these to understand how best to protect yourself.



Fraudulent email purporting to be from your bank or a similar trusted source lures you to a copy cat website (one that may look just like your bank's site). Once there, you are instructed to "verify" certain personal information, which is then used to hijack your accounts and your identity. If you receive a suspicious email, delete the message and call First Northern Bank to inform your banker of the email.


Also called "domain spoofing," this cyber crime intercepts Internet traffic and re-routes it to a fraudulent site. Once there, the victim is asked to enter personal information, just as with Phishing.


This is software designed to infiltrate or damage a computer system without the owner's knowledge. Examples of malware (malicious software) include computer viruses, worms, Trojan horses, spyware, and adware.