Create a complex passcode for your mobile device. Avoid using personal information (i.e., names and important dates) in your passcode. Do not share your mobile device passcode with anyone.
Enable available security features, such as an auto-wipe feature after excessive password failures or auto-lock after a specified time frame.
Keep your mobile device's software up-to-date. If your mobile device prompts you to install an operating system or firmware update, review the update and install it as soon as you can to address any identified security vulnerabilities in previous update(s).
Disable features not actively in use, such as Bluetooth, Wi-Fi, and infrared. Set Bluetooth-enabled devices to "non-discoverable" when Bluetooth is enabled.
Utilize antivirus software where applicable (i.e., Androids, Windows, etc.).
Do not root, jailbreak, or otherwise circumvent security controls on your device. Compromised security controls could result in the introduction of malware onto the device.
When finished with the device, lock it to require a passcode before the device can be used again.
Download and install mobile applications only from trusted sources authorized by the device manufacturer, such as Apple's App Store, Google Play, or the Windows Store.
Enable mobile device features to block mobile application downloads from unknown sources.
When available, require a passcode to download mobile applications to prevent unauthorized installation.
Protect yourself from fraudulent mobile applications by watching for these signs:
Additionally, review other mobile applications created by the app developer to validate the application's legitimacy.
If possible, create a passcode on any mobile application you install that may have access to your personal information.
When finished with a mobile application, always "Sign Out" or "Log Off" rather than just closing it.
People are trying to steal your personal information. Remember to be on alert for the following types of threats to your mobile financial services.
Phishing is a social engineering tactic used to obtain personal information by masquerading as a trustworthy individual through electronic communications. Some specific types of phishing include spoofing, SMiShing, and vishing.
If you can access an Internet network without entering a password or network key, unauthorized individuals are also able to do so. If you are on an unsecured wireless network, such as a mobile or WiFi hotspot, do not use your mobile device to transmit sensitive data.
Watch for potentially compromised websites. If the website has a security error or your browser gives you a warning about the site, use caution. If you go to one web address and are redirected to another, close your mobile device's browser
immediately and remember:
We're dedicated to providing the highest level of security. When using our mobile banking app, keep these tips in mind to ensure your experience is as secure as possible.
To learn more about information security, visit any of the following websites:
MAIN OFFICE: 201 Main St., Odem, TX 78370
Phone: 361-368-2651 | Fax: 361-368-2047
View all our locations
Lost/Stolen Debit Card
Download Adobe Acrobat
Your privacy is very important to us. We would like to advise you that Internet email is not secure. Please do not submit any information that you consider confidential. We recommend you do not include your social security or account number or other specific identifying information.
You are leaving First State Bank of Odem's website and linking to a third party site. Please be advised that you will then link to a website hosted by another party, where you will no longer be subject to, or under the protection of, the privacy and security policies of First State Bank of Odem. We recommend that you review and evaluate the privacy and security policies of the site that you are entering. First State Bank of Odem assumes no liability for the content, information, security, policies or transactions provided by these other sites.