Personal Banking Security Center


The confidentiality and protection of your information is one of our most fundamental responsibilities and your trust is one of our most important assets.

Middlesex Savings Bank will never provide your personal information to you over the phone. We will never call, text, or email you to ask for your pin number or online banking password. If you receive a suspicious inquiry matching this description, please contact us immediately at 1-877-463-6287.

If you believe that you are a victim of identity theft or fraud involving one of your Middlesex accounts, call our local customer information center at 1-877-463-6287 inside the U.S. or Canada.  Outside the U.S., please call 1-508-599-5999.

Middlesex Savings Bank uses Fraud Alert to continuously monitor debit card activity. If suspicious charges outside of the norm appear on your Middlesex Bank Debit Mastercard®, our Fraud Alert Service may phone you directly on our behalf to confirm the charges. The primary method of contact will be performed by text. Other notifications options are available, please contact us to update your preferred contact method. You may be asked to respond to a toll-free number to verify card activity.
To verify your identity, you may be asked to confirm the last four digits of your social security number, your birth date, or last four digits of your card number and your last transaction. You will never be asked to provide your full social security number, Debit Mastercard card number, account number, or PIN.

See our Consumer Privacy Notice for further pertinent information.

In the spirit of the "Pass it on..." program from the Federal Trade Commission, check out some great advice at Off site link opens in new tab. because, "sharing what you know can help protect someone who you know".

The following tips are also provided to help you understand and safeguard yourself against identity theft.

How to Spot a Scam

Scammers are continuously finding new ways to steal your money and they may target you via phone call, mail, email, or social media. They pressure you to “act fast” without thinking and may ask you to send money quickly and urgently. Protect yourself from fraud and potentially falling victim to a scam by knowing what to look out for.

Common Scams and Techniques

How do you know that you may potentially be dealing with a scammer? Here are some common tactics and scams to be aware of:  

  • IRS Imposter Scam: You receive a call or email from a scammer claiming to be from the government demanding immediate payment for back taxes.

  • Lottery/Sweepstakes/Inheritance Scam: You are informed that you’ve won a lottery, contest, inheritance or prize and are asked to pay money upfront to receive the funds.

  • Tech Support Scam: You receive a call that your computer needs repair and to send money for service.

  • Person In Need Scam: You receive a call that a friend or relative needs money to help with an emergency – like paying a hospital bill, getting out of jail, or leaving a foreign country. It may also be referred to as the Grandparent Scam.

  • Phishing: You receive an email from an imposter that looks legitimate asking you to send money or provide personal information. The request may have an urgent tone.

Protect Yourself From Falling Victim To A Scam

  • Never send money to someone that you don’t know. If something doesn't seem right, you can always hang up, stop communicating, or walk away.

  • Never provide personal information in response to an unsolicited request, whether it is over the phone or internet. Scammers may ask for confidential information such as your passwords, social security number, debit card information, and bank account number.

  • Do not respond to any suspicious looking emails, automated calls, or text messages.

  • Ask that the request be verified over the phone with a call back to the individual sending the request.

  • Consult with someone you trust to help assess the legitimacy of the communication.

Virus and Malware

What is a virus? What is malware? What is the difference?

A computer virus is a program designed to replicate within a computer system, either corrupting or destroying the system or the data it contains. On the other hand, malware is a blanket term for several types of malicious programs, including ransomware, spyware, Trojans and viruses.

Do I still need anti-virus?

The short answer to this question is: Yes! Viruses, while considered a "legacy threat," are still a risk to computer users, especially those who operate older computers which no longer receive security updates from their manufacturers.

While computer viruses have decreased in prevalence over the past decade, the risk of other malware has increased considerably. While the destruction and corruption of data is still seen in the internet of today, it is not the only aim of cybercriminals and malicious hackers.

What kind of anti-virus tool should I use?

If your computer operates Windows Vista or later (Windows 7, 8, 8.1, & 10), Microsoft has bundled a free anti-virus tool (Microsoft Security Essentials for Vista and 7, Windows Defender for 8-10).  Beyond this free tool, there are several paid anti-virus suites which have scored well in testing.

The best anti-virus suites will:

  • Offer the ability to schedule regular scans

  • Automatically upgrade their virus recognition files

  • Provide some form of malware scanning

  • Provide additional services like vulnerability scanning, anti-exploit protection, and firewall services

But I have a Mac. I thought Macs don't get viruses?

Computer viruses were initially written with the intent of causing the maximum amount of damage. For this reason, the majority of early viruses were written to attack a Windows-based infrastructure, since Windows computers significantly outnumbered Macs. Unfortunately, this spawned a myth that Macs don't get viruses.

While the design of MacOS includes safeguards to prevent viruses from taking hold, there are documented cases of cybercriminals exploiting flaws to sneak viruses past Apple's security measures. For this reason, it is recommended that users install anti-virus tools in some form (there are decent free options for MacOS) and definitely anti-malware.


While most major anti-virus suites include some form of malware scanning, a dedicated anti-malware tool is just as important as anti-virus. The best anti-malware tool will offer real-time and scheduled scanning, automatic updates, and additional tools like website scanning and automatic threat removal.

Malware has the potential to attack both Windows and MacOS hardware. In the case of MacOS, malware will attempt to exploit a vulnerability in an installed program, bypassing the security measures in Apple's design. For this reason, it is recommended that, just like anti-virus, Mac users employ some form of anti-malware on their systems.

Use these tips to protect your computer:

Anti-virus and anti-malware are not the only tools to protect your computer from threats. Beyond installing these programs, and keeping them updated, all computer users should:

  • Install security patches issued by software providers as they are released. Apple and Microsoft both offer the ability to automate this process, automatically installing updates as they are released.

  • Ensure that they do not use outdated operating systems that no longer receive updated security patches.

  • Never grant remote access to "tech support" firms calling you out of the blue. These scammers walk you through opening up your computer's defenses to allow them in, and can cause considerable damage. If you have security questions or require assistance, contact your anti-virus/anti-malware provider directly.

  • Practice safe web browsing and email habits. Be on the lookout for potential phishing emails; these emails can contain malware. Even though you may have security software, it is better to keep malware off your computer all together!

  • When visiting sensitive websites, check the connection is secure by:

    • Verifying that the web address begins with "HTTPS" instead of "HTTP"

    • Looking for the padlock icon, indicating a secure connection

  • Use strong, unique passwords for each website. Instead of writing down passwords, use a password manager or password vault, which can generate truly random passwords and store them in an encrypted state.


Public Wi-Fi

Public Wi-Fi is a major convenience in today's connected world. It helps users avoid data overages on mobile devices and allows users to join the internet in countless locations. However, public Wi-Fi hotspots are not safe locations to perform sensitive tasks, like Online Banking or online shopping.


What Risks Come With Public Wi-Fi?

Most public Wi-Fi networks are open networks, meaning they do not employ any form of wireless encryption. Anybody can join the network at any time, as long as they are within range of the access point. Because the network is unencrypted, data sent between your computer and the access point can be read by cybercriminals and potentially exploited. This includes everything from emails to passwords to credit card numbers. Another risk of public Wi-Fi is the spread of malware.


How to Stay Safe on Public Wi-Fi

  • Never use public Wi-Fi to access or transmit sensitive information.

  • Make sure you are connecting to the right network! The list of networks may say "Free Wi-Fi!", but it may be a rogue network. Most establishments post the name of their Wi-Fi network, along with connection information, in an easy to spot area. Check with the staff to make sure you aren't logging on to the wrong network.

  • Turn off file sharing in System Preferences (MacOS) or the Control Panel (Windows). This will reduce the chance of a criminal accessing your shared files or attempting to plant malware on your computer. Windows will automatically disable file sharing on wireless networks you classify as public.

  • Even if you had to enter a password to access the network, don't assume the network is secure for sensitive tasks. You are still accessing the internet via a public network and relying on that network owner's equipment and infrastructure. You have no way of knowing if the owner has taken proper security precautions, or if someone else on the network is attempting to intercept network traffic.

  • If you need to access sensitive information on the go, use a mobile device's mobile data connection (turn off the Wi-Fi first). Additionally, make sure you only download mobile apps from official sources, such as Apple's App Store and Google Play.


Identity Theft Protection Tips

Tips to help you protect your identity.

  • Don’t share personal information online, such as your address, phone numbers, SSN, birth date, or birth place.

  • Store sensitive personal and financial documents in a secure location, and shred them prior to disposal.

  • Never carry around your Social Security card or share your number unless absolutely necessary.

  • Promptly retrieve your mail or arrange a hold with USPS if you are unavailable for several days.

  • Opt out of prescreened credit and insurance offers by calling 1-888-567-8688 or go to Off site link opens in new tab..

  • Delete all personal information on electronic devices prior to disposal.


Tips to protect your computer

  • Only download programs from known, reliable sources.

  • Make sure your operating system, software, browser versions and plug-ins are current.

  • Install a personal firewall, like Easy Solutions, on your computer and keep anti-virus software installed and updated.

  • Use public computers with caution. Online banking, downloads, and other private activities should be conducted, when possible, on a private computer.

  • Protect your devices with password security to prevent unauthorized users from remotely accessing your devices or home network.


Tips to help secure your mobile communications

  • Avoid using public charging stations or public computers to charge your mobile device. Instead, carry a portable charger or battery pack to avoid the possibility of malware infection from compromised charging stations.

  • Use a phone lock function to protect your app or browser based accounts.

  • Delete text message alerts that you set up on your financial accounts after you receive them.

  • Never text personal information such as account numbers, Social Security numbers, passwords, etc.

  • Change your mobile number if you lose or replace your mobile device and service.

  • Always log off apps when you are finished using them.

  • Never store personal information on your mobile device.

  • Upgrade to the latest mobile operating system to be sure you have the latest security protection in place.

  • Only download apps from reputable sources, such as the store built into your device.


Password tips

  • Never use your Social Security number, phone number, Date-of-Birth, or family member names as a username or password.

  • Change your password frequently, using a combination of upper and lowercase letters, numbers, and special characters when allowed.

  • Never use the same password on multiple sites.

  • Don’t write down or share your password with anyone.


Some indicators of fraud you should be aware of

  • New accounts or credit cards you didn’t apply for.

  • Debits on your account you can’t explain.

  • Inaccurate information on your credit reports.  To request a free annual copy of your credit report, go to Off site link opens in new tab..

  • Missing bills or other mail, indicating your account information may have been stolen.

  • Receiving calls or letters from debt collectors for things you didn’t buy.


Signs of possible email fraud

  • Requests for specific personal information.

  • Urgency – often threatening to close your account.

  • Money reward offers in exchange for personal information through a survey or other method.

  • Typos and poor grammar.


Tips to spot and safeguard against ATM Skimming

  • Always check for a skimming device on ATM/POS Swipe Readers. Scammers are known for placing the device directly over the swipe reader, or drill a small hole in the machine and hide it inside. Do not use the ATM/POS Swipe Reader if you suspect it has been tampered with and notify the bank right away.

  • Remember to cover the PIN pad with one hand while typing in the PIN with the other. Any camera trying to capture the information will not be able to see the action on the PIN pad.

  • Regularly check your account activity. Specifically, look for any unauthorized transactions and report them right away.

  • Set up notification alerts through online banking to text or email when a transaction has occurred.

Forward emails that appear to be from Middlesex, but you suspect as fraudulent to: