IMPORTANT!!

We are keeping a close eye on the "Heartbleed" bug you may have heard about. The vendor we use for Online Banking has completed a preliminary assessment and has not discovered any vulnerability. We will be sure to keep you updated should anything to the contrary be discovered. Rest assured that we are doing everything we can to help ensure that your information is safe.

It is always a good practice to use unique passwords for all of the online services you access. If your GCF Online Banking password has also been used with a different service, we do recommend that you change your Online Banking password at this time.





If you currently utilize GCF’s online banking EXPRESS TRANSFER function to make your loan payments, this service will be temporarily unavailable from April 25, 2014 through June 9, 2014. As an alternative to this temporary inconvenience, you can do one of the following:

  • Contact 1-877-589-6600 ext. 320 or 368 between the hours of 9:00 a.m. and 5:00 p.m., Monday through Friday, to manually complete the transaction.
  • Mail a check to Investors Bank, 101 Wood Avenue South, Iselin, NJ 08830.
  • Sign up for GCF’s online bill payment system and set up a monthly payment to be sent to Investors Bank.


Fast Access




GCF Bank is now part of the Investors Bank family!

Tuesday, August 2, 2011

Edition #622


Today's Highlights:

For version of GCFlash with larger text, click here.

Past issues of GCFlash:

July 26, 2011 Edition #621

July 19, 2011 Edition #620

July 12, 2011 Edition #619

July 5, 2011 Edition #618

Looking for articles from a past issue of GCFlash not listed above? Enter keywords into our Site Search! Find archived articles prior to August 2009 in our Knowledge Base.


Weekly Spotlight:

Looking for a security-related article from a past issue of GCFlash? Find the best of the batch here.



Our Current Rates:

For a listing of our current deposit and loan rates, click here.

Today's National Market Rates
August 2, 2011 6 Mo Ago
02/02/11
1 Yr Ago
08/02/10
5 Yrs Ago
08/02/06
Dow Jones Industrial Average
(Up 289.11 or 2.50% since 12/31/10)
11,866.62 (-2.19%) 12,041.97 10,674.38 11,199.92
S&P 500
(Down 3.59 or 0.29% since 12/31/10)
1,254.05 (-2.56%) 1,304.03 1,125.86 1,277.41
NASDAQ
(Up 16.37 or 0.62% since 12/31/10)
2,669.24 (-2.75%) 2,749.56 2,295.36 2,078.81
10 Year Treasury Bond Yield 2.62% 3.49% 2.96% 4.96%
British Sterling 1.6302 1.6081 1.5685 1.8678
Euro 1.4203 1.3747 1.3047 1.2761

Back to top

1st Flash

Phone Smarts

We're all well aware of the need to protect our personal information. A stolen wallet containing credit cards, driver's license or other identifying information can cause major upheaval in our lives as we try to restore our good name and credit rating.

We protect our computer against viruses, hackers and other malware to prevent login information from falling into the hands of cyberthieves.

Yet many of us are a bit lax with the one item that carries the most risk if lost or stolen. And that's your smartphone.

Any danger present on your computer can affect your smartphone as well. Plus you have the added risk of portability. Your phone can easily fall into the wrong hands.

Just what can be stolen from your smartphone? Plenty. Your phone holds login information for any site you visit. Do you use mobile banking? What about email or social media accounts?

Many companies will send a one-time password (OTP) in the form of a text message as an additional form of authentication when conducting business. The thief who is trying to login to your bank account using your stolen smartphone now has all the tools to conduct a high-value transaction at your expense.

Data can be compromised even if you haven't lost your phone. Signals can be intercepted when transmitted over public WiFi or personal Bluetooth.

So what is a savvy smartphone user to do? There are several steps you can take to protect your phone.

Keep your screen locked with a PIN code or password. This adds an extra layer of difficulty for an unauthorized user.

All major mobile operating systems offer remote services. Install and enable whatever your phone supports. Options differ by system, but can include the ability to delete your files, lock your phone remotely or find it using GPS location.

If your phone allows for data encryption, use it. This protects data stored on external memory cards as well as SD cards installed in the device.

Mobile malware is on the rise. It isn't enough to protect your PC against threats. Your smartphone needs antivirus software, too.

Take the time to download software updates. Like their PC counterparts, they often include patches for security flaws recently detected.

Don't provide personal information when using public WiFi or personal Bluetooth. You can browse online shopping sites, but wait until you're in a secure setting before sending your credit card number. Save your online banking chores or visiting any sites requiring a login/password for a time when you can do it securely.

Exploring all of those neat apps can turn your phone into an entertainment experience. But unless you're using a Blackberry, those apps can be distributed by some unscrupulous folks. Only download apps from sites you trust. Check its rating and read reviews first.

Read the small print to learn what information the app will access. Stay clear of any app that wants access to any personal information, text messages or location that doesn't seem important to its function.

As you've learned with traditional email, don't click on links sent by users you don't know or appear suspicious. Smishing, a combination of SMS texting and phishing, has become quite common.

Like your PC, create a backup plan. Backup your data often. All important data should be saved at least twice, in separate locations. If your remote service utility includes a weekly backup, choose a mid-cycle day to backup to your computer as well.

Your smartphone is no longer a device used solely to place a phone call. You're holding your identity, your personal information, and your very security in the palm of your hand. Do it wisely.

On The World Wide Web

In the market for a new smartphone, laptop or desktop PC? Visit cnet.com first for unbiased reviews of everything electronic.

What can say summer more than packing the family into your car and heading off to your nearest drive-in theater? Find one in your area along with showtimes and tips for attending at this site.

Enjoy the dog days of summer with your favorite pet, read dog-friendly articles, tips for moving or playtime, and a list of dog-friendly adventures. Your adventure begins here.

Back to top

2nd Flash

ZeuS Gone Mobile

Regular GCFlash readers may remember our article about the ZeuS banking Trojan last August. Those who don't can refresh their memories here.

While the article was written one year ago, the threat today is stronger than ever. And this time, it's gone mobile.

Android devices have been targeted by this man-in-the-middle attack. Symbian, BlackBerry and Windows phones are also vulnerable. Communications between the sender and receiver are intercepted by a proxy in the middle, who reads and modifies data sent between the two with this type of threat.

It works like this: A consumer logs into their bank's website from a PC. The bank responds with a text message to the consumer's phone number that includes transaction details and a verification code. The code is then typed into the PC, assuming that an unauthorized user wouldn't be able to complete the transaction.

But when that PC is infected with ZeuS, the malware asks the victim to download a security component onto their mobile device to complete the login process. The user thinks their bank is requesting the download and complies. Now both devices are controlled by cyberthieves.

The malware then initiates a fraudulent transaction posing as the consumer. The bank sends a confirmation message to the infected mobile device, the malware sends the message to the victim's PC. It enters the confirmation code and transaction is approved.

The malware then deletes the bank's confirmation message to erase any trace of what occurred.

Take action to protect your smartphone from being compromised. All of the tips offered in today's 1st Flash apply here equally.

Research the publisher of an app before downloading. The open architecture of both Android and Apple makes it easy to distribute malware through suspicious apps.

Read reviews to learn what other users are saying about an app. But realize that malware developers can post fake reviews. Research, but don't believe everything you read. If something doesn't feel right, don't download.

Download and install apps only from official sources, not a third-party site. Malicious code is easily embedded in APK files.

Turn WiFi, Bluetooth and other connections off when you're not using them. Turn them on only when you need them.

Connect through only known access points. Avoid networks with a generic name like "linksys."

Major antivirus software vendors are scrambling to develop a suite of products to protect your mobile device. Norton, McAfee, Trend Micro and Kapersky are already on the market. Others are close behind.

You'll also find antivirus solutions specific to your device in your system's app store. As with any other app, research a variety of sources before you choose to download a particular product.

Tip of the Week

It's vacation time, but you just couldn't leave your laptop or smartphone behind. And they can't swim. Can they be saved? Maybe. This video discusses laptops, but works equally as well for a soggy phone. Find it here.

Back to top


Financial News

Lawmakers, debt ceilings, spending and taxes: The national lawmakers declare that once again the deadline was met with a law that expects to reduce the U.S. deficit by $2.1 trillion in the future. Without this law, the U.S. could have defaulted on debt. This possibility caused the rating agencies to warn that the U.S. could be downgraded from the stellar credit worthiness the country enjoys.

However, the rating agencies are still not happy with this package. Standard & Poor's warned that they had expected to see a deficit reduction of $4 trillion in the next 10 years. Moody's also may still downgrade the US, with Fitch deferring until the end of August. The Dow Jones Industrial Average dropped in response to this continued uncertainty.

So what does a downgrade mean? A higher rated borrower enjoys paying lower interest because they are such a great credit risk. Other countries, like Greece, have had their credit rating downgraded, causing that country to pay higher interest rates. On the other hand, Japan was dropped from the highest rating years ago and still pays very low rates compared to other nations. In fact, yields on government bonds are still low. This seems to mean that the market still feels that the U.S. is a stable investment, and willing to take the lower return to invest in its debt.

Still, getting a compromise on Capital Hill that would meaningfully reduce our debt is a goal shouldn't be left behind - despite the impact to the bond market!


Quotable

"My reading of history convinces me that most bad government results from too much government." - Thomas Jefferson


Today in History

1909 - First Lincoln head penny is minted.


Flash Fact

Due to rising metal prices, it now costs 1.79 cents to make one penny.

Have a comment about something you read in GCFlash? Suggestions for future articles? Drop us an email!

Back to top


PURPOSE:

GCFlash is a weekly e-mail sent only to its listed customers and associates free of charge. GCFlash informs customers of special product offerings which may be of interest, current interest rates on both deposit and loan products, selected financial news and other financial tidbits. GCFlash is intended to supplement the more comprehensive information listed on the GCF Web site at http://www.gcfbank.com.

For more comprehensive information, visit our Web site at http://www.gcfbank.com or call (856) 589-6600 Ext: 337 (Timothy P. Hand)

GCFLASH PRIVACY STATEMENT

For a copy of our Privacy Policy, visit www.gcfbank.com/gcflash_privacy.aspx

GCF maintains your e-mail address in a confidential and secure database along with much of your other account information, such as mailing address and telephone number, etc. Before aggregating our e-mailing list each week, we filter out any duplicates. In most cases, this inhibits the unintended e-mailing of multiple copies of GCFlash to a single e-mail address. However, because these account records are kept by both individual and account, there is a chance members of the same household could each receive a copy of GCFlash or any other transmission at the same e- mail address - resulting in multiple copies. For example, a husband and wife that both have accounts with GCF may both receive a copy because the names are different but listed at the same e-mail address. This is similar to the manner in which each individual may share a common telephone number. To handle this situation, GCF recommends you simply delete any extra copies of GCFlash as this will ensure that ALL individuals receive any future promotional mailings, which might only be targeted or offered to specific accountholders meeting certain criteria. GCF has the capability to suppress customer e-mail addresses so they are omitted from our transmission list. If you would rather have a specific household member’s e-mail address suppressed in our electronic database, simply send us a reply, as stated below, and indicate the accountholder for which you would like to have e-mail suppressed. Please keep in mind that this suppression will mean that NO future e-mails are sent, including special promotional offers. If you have any questions about this process or need additional information, please contact us at netaccess@gcfbank.com.

If you would like to be removed from this electronic mailing list, please hit reply and place the word REMOVE in the subject line. Please note, removing your name from our electronic mailing list means GCF will send NO FUTURE NEWS or SPECIAL OFFERS.


GCF Bank
381 Egg Harbor Road
Sewell, NJ 08080
(856) 589-6600
www.gcfbank.com