United BankDeposit Accounts
Loans and Mortgages
Investment and Planning
Rates and Fees
24 Hour Access
Locations & Hours
About Us
Swift Login
Security

On August 8, 2001, the Federal Government issued a guidance entitled Authentication in an Electronic Banking Environment (2001 Guidance). The 2001 Guidance focused on risk management controls necessary to authenticate the identity of retail and commercial customers accessing Internet-based financial services. Since 2001, there have been significant legal and technological changes with respect to the protection of customer information; increasing incidents of fraud, including identity theft; and the introduction of improved authentication technologies.

 

The agencies consider single-factor authentication, as the only control mechanism, to be inadequate for high-risk transactions involving access to customer information or the movement of funds to other parties. Financial institutions offering Internet-based products and services to their customers should use effective methods to authenticate the identity of customers using those products and services. The authentication techniques employed by the financial institution should be appropriate to the risks associated with those products and services. Account fraud and identity theft are frequently the result of single-factor (e.g., ID/password) authentication exploitation. Where risk assessments indicate that the use of single-factor authentication is inadequate, financial institutions should implement multifactor authentication, layered security, or other controls reasonably calculated to mitigate those risks.

 

In response to this guidance, starting mid-December 2006, new Multi-Factor Authentication (or MFA) security features were implemented to help protect you during Internet banking sessions.  Enrollment for this additional security is automatic. The first time you log on to an Internet session, you will be required to provide some information for enrollment.  The following step should assist you in your first log on, subsequent access and using public or unknown computers. 

 

Home