Teachers Credit Union

Search form

about tcu


Check Reorder: Easily order new checks today with the click of a mouse!


Find your local Branch.

October is Cyber Security Awareness Month – Click Here for tips and tools!  

Four Simple Steps to Stay Secure


#1. You: Attackers have learned that the easiest way to bypass even the most advanced security technology is by attacking you. If they want your password, credit card, or personal data, the easiest thing for them to do is trick you into giving them this information. For example, they can call you pretending to be Microsoft tech support and claim that your computer is infected, when in reality they are just cyber criminals that want you to give them access to your computer. Or perhaps they will send you an email explaining that your package could not be delivered and ask you to click on a link to confirm your mailing address. In reality, they are tricking you into visiting a malicious website that will hack into your computer. This is how attacks such as Ransomware or CEO Fraud start. Ultimately, the greatest defense against attackers is you. Be suspicious. By using common sense, you can spot and stop most attacks. 

#2. Passwords: The next step to protecting yourself involves using a strong, unique password for each of your devices and online accounts. The key words here are strong and unique. A strong password means one that cannot be easily guessed by hackers or by their automated programs. Tired of complex passwords that are hard to remember and difficult to type? Try using a passphrase instead. Rather than a single word, use a series of words that are easy to remember, such as "Where is my coffee?" The longer your passphrase, the stronger it is. A unique password means using a different password for each device and online account. This way, if one password is compromised, all of your other accounts and devices are still safe. Can't remember all those strong, unique passwords? Don't worry, neither can we. This is why we recommend you use a password manager, which is a specialized application for your smartphone or computer that securely stores all of your passwords in an encrypted format.
Another important step you can take to protect your account is to enable two-step verification. Passwords alone are no longer enough to protect accounts; we all need something stronger. Two-step verification is much stronger. It uses your password, but also adds a second step, either something you are (biometrics) or something you have (such as code sent to your smartphone or an app on your smartphone that generates the code for you). Enable this option on every account you can, including your password manager, if possible. Two-step verification is probably the single most important step you can take you protect yourself, and it's much easier than you think. 

#3. Updating: Make sure your computers, mobile devices, apps, and anything else connected to the Internet are running the latest software versions. Cyber criminals are constantly looking for new vulnerabilities in the software your devices use. When they discover vulnerabilities, they use special programs to exploit them and hack into your devices. Meanwhile, the companies that created the software are hard at work fixing them by releasing updates. By ensuring your computers and mobile devices install these updates, you make it much harder for someone to hack you. To stay current, simply enable automatic updating whenever possible. This rule applies to almost any technology connected to a network, including Internet-connected TV's, baby monitors, home routers, gaming consoles, or perhaps even your car. If your operating systems or devices are old and no longer supported with security updates, we recommend you replace them with new ones that are.

#4. Backups: Sometimes, no matter how careful you are, you may be hacked. If that is the case, often your only option to ensure your computer or mobile device is free of malware is to fully wipe it and rebuild it from scratch. The attacker might even prevent you from accessing your personal files, photos, and other information stored on the hacked system. Often the only way to restore all of your personal information is from backup. Make sure you are doing regular backups of any important information and verify that you can restore from them. Most operating systems and mobile devices support automatic backups. In addition, you should store your backups in either the Cloud or offline to protect them against cyber attackers.

Click here for more tips to keep yourself safe, secure and protected.

Back to Top

© Teachers Credit Union. Any links to external websites are links to alternative sites not operated by TCU. TCU is not responsible for the content of the alternate site. The privacy and security policies of the alternate site may differ from those practiced by TCU. TCU does not represent you or the third party if you enter into a transaction with the third party.


Federally Insured by NCUA.
Teachers Credit Union, Lender NMLS #686706