Click Here to Sign up for Important Security Alerts!
Click Here for Information on How to Report Identity Theft

SECURITY FEATURES

Lone Star’s Mobile Banking software “Mobile Money” is another convenient way to access your bank accounts and securing this channel is just as much a priority to us as the traditional electronic banking.
  • Customers that use Mobile Money to check their balances, history, and make online transfers between accounts as well as participate in online bill pay must first enroll in the Personal E-Banking. Once enrolled, the customer will then be presented with the ability to sign-up for Mobile Banking.

  • Mobile Money uses the same multi-factor authentication that your computer uses, but because a cell phone is much more likely to be lost or left behind than a personal computer, the customer can immediately login to their electronic banking from their computer and disable access to Mobile Money on their cell phone.

  • Once the device is registered with the Mobile Money service, the customer is immediately presented with the same security image and phrase before they login with their existing electronic banking password.

  • For customers that are signed up for online bill pay, only existing billers can be used to pay your bills.  For any bill payments to a brand new biller, you must sign on to the electronic banking from your computer.

 

SMART PHONE SECURITY TIPS
  • Configure your device to require a passcode to gain access if this feature is supported in your device.

  • Avoid storing sensitive information.  Mobile devices have a high likelihood of being lost or stolen so you should avoid using them to store sensitive information.  If sensitive data is stored then encryption should be used to secure it.

  • Keep your mobile device’s software up-to-date.  Mobile devices are small computers running software that needs to be updated just as you would update your computer.  Use the automatic update option if one is available.

  • Review the privacy policy and data access of any applications (apps) before installing them.

  • Disable features not actively in use such as Bluetooth, Wi-Fi, and infrared.  Set Bluetooth enabled devices to “non-discoverable” when Bluetooth is enabled.

  • Delete all information stored on a device before the device changes ownership.  Use a “hard factory reset” to permanently erase all content and settings stored on the device.

  • Only give sensitive information to websites using encryption so your information is protected as it travels across the internet.  Verify the web address begins with “https://” (the “s” is for secure) rather than just “http://”.  Some browsers also display a closed padlock.

  • Do not trust sites with certificate warnings or errors.  These messages could be caused by your connection being intercepted or the web server misrepresenting its identity.

  • Avoid using public computers or public wireless access points for online banking and other activities involving sensitive information when possible.

  • Always “sign out” or “log off” of password protected websites when finished to prevent unauthorized access.  Simply closing the browser window may not actually end your session.