Anstaff Bank Logo Login

Security Notice

 

Overview

Anstaff Bank has developed strict policies and procedures to safeguard your personal information.

  • We restrict employee access to your sensitive personal information to a "need to know" basis.
  • We maintain physical, electronic, and procedural safeguards that comply with federal regulations to guard your nonpublic personal information.
  • We educate our employees about the importance of confidentiality and customer privacy.
  • We take appropriate disciplinary measures to enforce employee privacy responsibilities.
  • We recommend that you contact us in person or on the phone to discuss sensitive personal information and not email it to us.
  • We view mail as a convenient means of communication but it is not secure.

Introducing Enhanced Online Security

Anstaff Bank works hard providing additional security measures to our online banking services so that our customers have the confidence that their information is being protected.

Anstaff Bank provides additional layers of security. These security steps will provide even greater levels of protection against fraudulent attacks such as phishing, spoofing, key logging and identify theft. All users will be required to select challenge questions and answers. Each time you log in thereafter, verify you are on the official Anstaff Bank's website by looking for the Extended Validation Certificate in your address bar.

The final level of the security is the authentication of your computer. Anstaff Bank has the ability to recognize the computer or computers from which you usually log on. If our system detects a suspicious login due to an unfamiliar computer, it will automatically present you with challenge questions that were previously selected.

Once the new layers of security are in place, getting started is easy!

  • Step 1: Login using your User Code.
  • Step 2: Select your challenge questions and provide your answers.
  • Step 3: Select whether to register this computer. (Note: Only register personal computers that you frequently use and are not available for public use.)
  • Step 4: Select NEXT

 

Back to Top