Ongoing Security Evaluation
We operate under a detailed information security
policy which is subject to ongoing regulatory oversight and examination. In
addition, our security practices and technology are continually reviewed by our
own experts to make sure that we are able to adapt to constantly evolving
threats and provide you with the highest level of protection.
Steps to Protect
You have a significant role in safety and
You play a significant part in protecting your
account information and access. You should zealously practice the following
steps to ensure that your use of the Internet is as safe and secure as
Security for your own computer
- Change your passwords on a
- To protect your personal
information, do not send it by email, especially to individuals or
organizations you do not know. Emails are not encrypted and are easy to
- Keep your operating system and
browser up to date.
- Review your browser security
settings to assure that they are set to provide an appropriate level of
- Install anti-virus software on
your computer and keep it up to date.
- Use updated anti-spyware
- Install a personal firewall. A
firewall acts as a filter, which prevents access to your computer by
- Don’t download programs or
files from unknown sources. In particular, be cautious about using
software such as Limewire or Kazaa to download data from file-sharing
sites because files exchanged through these programs are virus prone and
almost always violate copyright laws.
- Do not install software without
knowing exactly what it is or what it will do.
- Do not open spam e-mails,
because they are often riddled with viruses/spyware. Delete unsolicited
emails and never open attachments from them.
- Do not reply to e-mails that
request your personal information.
- Be alert for scam e-mails. These
may appear to come from a trusted business or friend, but are instead
designed to trick you into downloading a virus or other malware. We
will never send an e-mail asking you for your log-in ID or password or
asking you to verify your account number or login information.
- Be cautious when clicking on a
link contained within an e-mail or other message. It may not be
- Do not send confidential
information in a regular e-mail.
- Be aware of phony “look a like”
web sites. They are designed to trick consumers and collect personal
information. Our multi-factor authentication includes the use of a picture
and pass phrase. This lets you know you are on the authentic Capital City
Bank Online Banking system.
- Use strong passwords. These
passwords should be at least 8 characters long. Include letters, both
upper and lower case, as well as numbers when creating your passwords. Do
not use combinations that can be easily guessed such as spouse name, pet
name, social security number, or other common items. Do not post your
password in a conspicuous place, such as on the monitor or on the bottom
of the keyboard.
- Turn your computer off when you
are finished using it – don’t leave it in sleep mode.
- Conduct online banking
activities on secure computers only. Public computers (computers at
internet cafes, copy centers, etc.) should be used with caution, due to
shared use and possible tampering. Online banking activities and viewing
or downloading documents (statements, etc.) should only be conducted on a
computer you know to be safe and secure.
- Do not leave the computer while
in the middle of an Online Banking session. Use the Log Off link located
at the top right corner of every Online Banking page.