Question Mark

How Can We Help?


Security Center

Online Fraud

Phishing and Spoofing

The most common types of Online Fraud are Phishing and Spoofing. These usually come in the form of fraudulent e-mails that appear to originate from legitimate sources. These e-mails ask customers to verify personal information (phishing) or link to counterfeit (or spoofed) Websites that appear real.

Watch for e-mails that:

  • Urge you to act quickly because your account may be suspended or closed, or to update your personal information.
  • Don't address you by name, but use a more generic one like "Dear Valued Customer."
  • Ask for account numbers, passwords, Access IDs, or other personal information.

Progressive Bank will NEVER ask for sensitive information, such as account numbers, Access IDs or passwords, via e-mail.

Other Common Fraud Methods

Criminals may also use other contact methods to obtain your private information. These include text messages (also known as short message phishing or "smishing") and through phone calls (also known as voice phishing or "vishing"). You might receive a text message, phone call, or voice mail warning that your account may be suspended, frozen, or compromised unless you visit a particular website or call a designated phone number where you will then be asked for personal information. These scare tactics are designed to convince you to provide your information or face negative consequences.

Again, Progressive Bank will NEVER ask for sensitive information, such as account numbers, Access IDs or passwords, via e-mail.

By clicking the link, you can access the FDIC Bank Customer's Guide to Cybersecurity 2016.  This guide features articles on protecting login information, avoiding identity theft online, and the roles that banks and the government play in protecting our customers.

Corporate Account Takeover (CATO)

Corporate Account Takeover occurs when a criminal obtains electronic access to your corporate bank account and conducts unauthorized transactions.  The criminal obtains electronic access by stealing the confidential security credentials of your employees who are authorized to conduct electronic transactions (wire transfers, Automated Clearing House-ACH, and others) on your corporate bank account.  Losses from this form of cyber-crime range from the tens of thousands to the millions, with the majority of these thefts not fully recovered.  CATO thefts have affected both large and small banks.  Click this link for more detailed information about Corporate Account Takeoverand how it could affect your business.  You can find additional information about staying secure online and protecting your business from Corporate Account Takeover by selecting one of the links below:

Helping You Stay Secure Online

Information Security & CATO


Enhanced Online Security

The Online Banking System brings together a combination of industry-approved security technologies to protect data for the bank for our customers. It features password controlled system entry, a VeriSign-issued Digital ID for the bank's server, Secure Sockets Layer (SSL) protocol for data encryption, and a router loaded with a firewall to regulate the inflow and outflow of server traffic. Using these technologies, your Online Banking transactions are secure.

How to Protect Yourself

What is Identity Theft?

Identity theft occurs when someone acquires your personal information and uses it without your knowledge to commit fraud or theft. It is a serious crime and cases are growing. An all-too-common example is when an identity thief uses your personal information to open a credit card account in your name.

No matter how cautious you are, there is no way to completely prevent identity theft from occurring. But there are ways you can help minimize your risk. This section contains valuable information explaining how you can protect yourself by managing your personal information wisely; the warning signs of identity theft; and what to do if you do become a victim.

Helpful Tips

  • Don't give out personal information on the phone, through the mail, or over the Internet unless you've initiated the contact or are sure you know who you're dealing with.
  • Don't carry your Social Security card with you; leave it in a secure place.
  • Carry only the identification and credit and debit cards that you need.
  • Don't put your address, phone number, or driver's license number on credit card sales receipts.
  • Social Security numbers or phone numbers should not be put on your checks.
  • Shred your charge receipts, copies of credit applications, insurance forms, physician statements, checks and bank statements, expired charge cards that you're discarding, and credit offers you get in the mail.
  • Secure your credit card, bank, and phone accounts with passwords. Avoid using easily available information like birth date, the last four digits of your SSN, or your phone number. When opening new accounts, you may find that many businesses still have a line on their applications for your mother's maiden name. Use a password instead.
  • Secure personal information in your home, particularly if you have roommates or hire outside help.
  • Promptly remove mail from your mailbox. If you're planning to be away from home and can't pick up your mail, call the U.S. Postal Service at 1-800-275-8777 to request a Vacation Hold.
  • Ask about information security procedures in your workplace. Find out who has access to your personal information and verify that records are kept in a secure location. Ask about the disposal procedures for those records as well.
  • Before revealing any personally identifying information (for example, on an application), find out how it will be used and secured, and whether it will be shared with others. Ask if you have a choice about the use of your information. Can you choose to have it kept confidential?

For these tips and more, see Identity Theft: It Can Happen to Anyone.

In the wake of the most recent widespread data breach, the Federal Trade Commission has created a brief video for consumers instructing you about the proper steps to take if you believe that your information has been breached.  Follow the links below to access the video or to access additional information at

Data Breach Video

IdentityTheft.Gov Checklist


Check Your Credit Report

Order a copy of your credit report from each of the three major credit-reporting agencies every year. Make sure it is accurate and includes only those activities you have authorized. Under the Fair and Accurate Credit Transactions Act (FACT Act) consumers can request and obtain a free credit report once every 12 months from each of the three nationwide consumer credit reporting companies.

By checking your report on a regular basis you can catch mistakes and fraud before they wreak havoc on your personal finances. Don't underestimate the importance of this step.

Credit Bureaus

If you become a victim, contact:

  • The fraud departments of the three major credit bureaus
  • The creditors of any accounts that have been misused
  • The local police to file a report.
  • The bank to cancel existing accounts held in your name and re-open new accounts with new passwords.

Progressive Bank is committed to safeguarding our customers' financial information. Maintaining our customers' trust and confidence is a top priority.

Privacy Policy

Keeping customer information secure is a top priority for all of us at Progressive Bank. Confidentiality is an important commitment we make to our customers. This policy will explain how we handle the personal information about you that we collect and may disclose. This notice applies to former customers as well as current customers. View the Privacy Notice.

In this notice, we refer to "our affiliates". When we do, we mean our company which is part of the Progressive Bancorp, Inc. family. These affiliates include Progressive Bank and Progressive Financial Advisors, Inc., L.L.C. On the other hand, when we refer to "non-affiliated third parties", we mean companies that are not part of the Progressive Bank family.

Confidentiality and Security Practices

Progressive protects the nonpublic personal information we collect about you by maintaining physical, electronic, and procedural safeguards that comply with federal standards. We train the people who work for us on how to properly handle your personal information. We restrict access to nonpublic personal information about you to persons who need to know that information to provide products and services to you.