Security Center

ATM/Debit Cards: If it's after hours and you've lost your atm/debit card, please call 866-546-8273.


From time to time, we are alerted to a more widespread fraud incident potentially compromising the personally identifiable information and financial data of many.  When this occurs, we often place a restriction on transactions made with your card in other states or regions.  To protect you, that restriction may remain in place for a number of days or months.

Please be sure to let us know if you are traveling outside your state of residence or an unusually far distance from your home.  We can make adjustments that will allow card use in these areas for a limited period of time until you return.

The First US Bank website should never be accessed from a link provided by a third party.  It should only be accessed by typing or by using a "bookmark" that directs your web browser to into your browser. First US Bank does not send e-mail messages requesting confidential information, such as account numbers, passwords, or PINS.  First US Bank customers are reminded to report such requests to the institution.  Our Fraud Watch Services include more information on the following issues:

e-Banking Educational Resources

The links listed below may be helpful regarding your banking security concerns.

Reporting Fraudulent E-mails

To help us track cyber-criminals, please send a copy of the email you've received to and include a response to the questions below:

  1. Do you have an account relationship with First US Bank?
  2. Have you recently enrolled for First US Bank's Internet Banking,
    BillPay, or E-statements?
  3. What Internet Service Provider (ISP) do you use?
  4. Do you have a Cable, dialup, DSL, or other internet connection?
  5. Do you have a firewall installed on your personal computer?

If you have replied to a suspicious email and you are a customer of First US Bank, please call 334-636-5424 during banking hours.


Phishing emails are designed to trick you into revealing your private information.  To make these emails seem more realistic, the senders often duplicate a financial institution's logo and familiar formats or redirect the individual to a fraudulent website.  These emails are often masked under the name of a trusted source such as the FDIC, a trusted financial institution, an Internet Service Provider - or even First United Security Bank.  Please understand that First US Bank does NOT request personal information (i.e. account numbers, PIN numbers, passwords, user ids, etc.) via electronic mail.

If you get an email warning you that your account  will be shut down unless you reconfirm your billing or email information, or that the bank is "missing" information about your account, do not reply or click on the link in the e-mail.  Report any suspicious activity to your bank and to the Federal Trade Commission, immediately.

Identity Theft

Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.

The Federal Trade Commission estimates that as many as nine million Americans have their identities stolen each year. In fact, you or someone you know may have experienced some form of identity theft. The crime takes many forms. Identity thieves may rent an apartment, obtain a credit card, or establish a telephone account in your name. You may not find out about the theft until you review your credit report or a credit card statement and notice charges you didn't make - or until you're contacted by a debt collector. The Federal Trade Commission provides a free resource booklet to help consumers deter, detect, and defend identity theft. To access the booklet to review or print, click here: Take Charge: Fighting Back Against Identity Theft.

Identity theft is serious. While some identity theft victims can resolve their problems quickly, others spend hundreds of dollars and many days repairing damage to their good name and credit record. Some consumers victimized by identity theft may lose out on job opportunities, or be denied loans for education, housing or cars because of negative information on their credit reports. In rare cases, they may even be arrested for crimes they did not commit.

For steps to protect your identity, visit the Frequently Asked Question-"How do I protect my identity" below.


The internet has become a popular method for both conducting business and managing finances through online banking relationships.  While most financial institutions and some individuals have taken steps to protect their computers, many firewall and anti-virus software packages do not protect their computers from one of the latest threats, "spyware" - a form of software that collects personal and confidential information about a person or organization without their proper knowledge or informed consent, and reports it to a third party.

Spyware Infection is usualy installed without a user's knowledge or permission.  However, users may intentionally install spyware without understanding the full ramifications of their actions.  A user may be required to accept an End User Licensing Agreement (EULA), which often does not clearly inform the user about the extent or manner in which information is collected. In such cases, the software is installed without the user's "informed consent."

Spyware can be installed through the following methods:

  • Downloaded with other Internet downloads in a practice called "bundling." In many cases, all the licensing agreements may be included in one pop-up window that, unless read carefully, may leave the user unaware of "bundled" spyware.
  • Directly downloaded by users who were persuaded that the technology offers a benefit. Some spyware claims to offer increased productivity, virus scanning capabilities or other benefits.
  • Installed through an Internet browsing technique called "drive-by-downloads." In this technique, spyware is installed when a user simply visits a Web site. The user may be prompted to accept the download believing it is necessary in order to view the Web page. Another method is to prompt the user to install the program through pop-up windows that remain open, or download the software regardless of the action taken by the user.
  • Automatically downloaded when users open or view unsolicited e-mail messages.

Spyware can be difficult to detect and remove because it:

  • Does not always appear as a running program in the Window's Task Manager; therefore, the user may be unaware that his or her computer is infected.
  • May not include a removal option in the Windows "Add/Remove Programs" function. When such an option is present, the removal process may not eliminate all components, or it may redirect the user to an Internet site to complete the removal. This often results in new or additional infection rather than removal. In addition, some spyware includes a feature to reinstall itself when any portion is deleted.
  • May cause a further infestation by installing other spyware programs onto users' computers.

The FDIC recommends the following steps customers can take to detect and prevent spyware from being downloaded on their computers:

  • Installing and periodically updating anti-spyware, virus protection and firewall software.
  • Adjusting browser settings to prompt the user whenever a website tries to install a new program or Active-X control.
  • Carefully reading all End User Licensing Agreements and avoiding downloading software when licensing agreements are difficult to understand.
  • Maintaining patches to operating systems and browsers.
  • Not opening e-mail from untrustworthy sources.


Debit Card Fraud

State-of-the-art thieves are concentrating on plastic cards. In the past, this type of fraud was not very common. Today, it is a big business for criminals. Plastic cards bring new convenience to your shopping and banking, but they can turn into nightmares in the wrong hands. Here are some tips to avoid debit card fraud:

  • Protect your debit card as you would cash. Never write your PIN number on your debit card. Instead, always commit your PIN number to memory.
  • Keep your eye on your debit card whenever it is in use. Watch clerks process your payments. Open your bank statements promptly each month. Make sure that you made the listed purchases. Also, report any charges that you did not make to your financial institution.
  • Protect your debit card. When you receive a new or replacement card, sign the back of it as soon as it is activated. Always be sure to store it in a safe place. Cut up expired cards before disposing of them.
  • Again, never reveal your PIN number to anyone. Also, never keep your PIN number in your purse or wallet. Don't write your PIN on your card either. Always try to memorize it.

Is it too good to be true?

If it sounds too good to be true, it probably is. At First US Bank, we take the safeguarding of our customers' assets very seriously. We exercise the highest level of integrity and urgency in keeping abreast of fraudulent activity on customer accounts. We measure this activity in a number of different ways.

Nothing can replace your own watchful eye over your personal assets. Individuals receive suspicious phone calls, emails, text messages, internet pop-ups, and regular mail correspondence every day. The best rule of thumb is to follow your gut. If you feel that an opportunity sounds too good to be true, it probably is.

Keep in mind that what might seem legitimiate or official, may be posed as such to deceive the unsuspecting or innocent consumer. It is our responsibility to question any unusual activity brought to our attention. These are the kinds of questions we ask, and also share with you as an opportunity to benefit you and/or others: Click here 


How do I protect my identity?

Credit Report
You have the right to a free credit report from or 877-322-8228, the ONLY authorized source under federal law. "Take me to the authorized source."

Credit Cards
Sign new cards immediately. Store them safely - They are money! Only carry the cards you will use. Don't write your PIN # on your card. Shred documents that show your account number before discarding. Don't give your card number over the phone, unless you initiated the call. Remember to get your card and receipt after a purchase, and double check they are yours. Notify the credit card company immediately if your bill is incorrect, or your card is lost or stolen. Check your bill carefully, and notify the credit card company if you don't receive it on time.

Don't write your credit card number or social security number on a postcard or the outside of an envelope. Collect your mail promptly. Have your mail held if you'll be out of town or on vacation. Use collection boxes or the post office for outgoing mail if your home mailbox is unattended. Opt-out of receiving pre-approved credit offers.

Never e-mail your credit card number or social security number. Check carefully that you are on the page you intend, and not an imposter's page. Use only secure web pages for online ordering. (You should see the padlock on the status bar of your web browser where a credit card number is requested.) Online credit applications which request a social security number should also be on secure web pages. (Look for the padlock.) Use anti-virus and personal firewall software, and keep it updated.

What is Phishing?

Phishing is the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.  The e-mail directs the user to visit a website where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has.  The website, however, is bogus and set up only  to steal the user's information.

How do I make sure my CheckCard is secure?

We are protected by a fraud prevention company that constantly monitors all transactions made by the cardholder, and alerts us and possibly you immediately of any potentially fraudulent activity.