Personal Banking

Protecting Your Identity

Learn how to keep your identity and information secure

We value your relationship and respect the privacy of your information, which is why we want to help you actively protect yourself against cyber-attacks. Test your knowledge about cybersecurity below and implement these best practices to protect your internet-enabled devices.

Debunking Cybersecurity Myths

Myth 1

I set a strong and complex password to my account, so I’ll be OK. A strong password is important to security, but this alone is not enough to prevent a cyber-attack. Use different passwords between accounts, making it harder for someone to gain access. Activate multi factor authentication (security questions, identification code via text message etc.) whenever possible.

Myth 2

My computer behaves normally, so it can’t be infected. Hackers work to ensure that their activities are not noticed by you. A dangerous hacker works stealthily to take control of your computer and cause damage to your equipment or steal information they can use for their profit.

Myth 3

We have anti-virus software and a firewall. We are safe. Security is a process; not a product. Organizations spend millions on security and a single wrong click is all it takes for the malware to spread. Security awareness is an essential tool in combating the threats we face in our network environments.

Myth 4

Social media is where my friends hang out. No malware there. When a social network becomes popular, you can bet that cyber crooks will be there. Cybercriminals love our trust in social networks and have crafted special scams to fool us into sharing our logins on fake pages and clicking malicious links.

Myth 5

The Internet of Things (IoT) is a safe development. Every single Internet-enabled device in the world with its own unique IP address can be individually connected to the internet. Smartphones, refrigerators, washing machines, cars; a countless number of devices fall into this category. As connectivity to the Internet continues to grow, so does the cyber-attack surface available to hackers.

Protect Your Devices

You hold the power to protect yourself:

For further information on how Radius protects your information, please visit