Online Security Center Navigation

Security FAQs

Selecting a watermark

Why a personalized watermark or image?

Choosing an image that will appear every time you log in will confirm that you are logged into the authentic NetTeller site.

Each time you log in, simply verify the image on the left of the screen as the one selected for your personal watermark.

Until you choose a watermark from the image library, a random image will appear. You will be prompted at login to select your own watermark or image.

Updating security questions

Why update your security questions?

Answering and verifying three security questions will provide you with an even higher level of security for your account.

You will be asked to answer your security questions to verify your identity only when we detect any unusual or uncharacteristic activity.

What is phishing or spoofing?

Phishing, pronounced “fishing,” is when fraudsters on the Internet impersonate businesses to trick you into giving them personal or confidential information. Also referred to as “spoofing,” phishing takes the form of a fake message, most often an email but sometimes a text or pop-up message, which appears to be from a financial institution or service provider.

Beware that the message often appears “official,” including the company name, logo and even a link to a website which instructs you to update your account information by providing details such as a Social Security number, bank account number, PIN or password. Some phishing instructs a user to call an 800-number to verify account information instead of visiting a website.

There may even be a “dire warning” that you must take action immediately because, for instance, your account has to be verified or there has been an “unauthorized transaction on your account.”

You should NEVER validate or confirm personal information by responding to an email, opening a link or email attachment or calling an 800 number included in such a link or email attachment. Optima Bank will never contact you by email requesting this type of confidential information.

In fact, should you receive such an inquiry, please contact us immediately at 603-433-9600.

What is Malware?

Malware is short for “malicious software.” It includes viruses and spyware that get installed on your computer without your consent. These programs can cause harm or loss to the system or its data or be used as a platform to attack other computers. Malware may be installed unintentionally by clicking on a button or pop-up window or visiting a malicious website. Malware can be used by criminals to steal personal information, send spam and commit fraud.

What is a keylogger?

A keylogger is a computer program that actually logs each keystroke a user types on a keyboard and then saves the data into a file before transferring it via the Internet to a pre-determined remote host. A keylogger also can capture screenshots of user activity and log-in passwords or record online chats to discover information. Often downloaded inadvertently by clicking on links in fraudulent emails, keyloggers pose the most serious threat to user privacy.

What are Trojan Horse programs?

Trojan Horse programs, including Remote Access Trojans or RATS, may be hidden in games, videos, music files or programs downloaded from the Internet or in an email that then install a malicious program on your computer. Download and install software only from websites you know and trust. Although many anti-virus programs are able to detect and remove Trojan Horse programs, they must be updated regularly to be effective.

How could my user name and password be compromised?

Accounts may be compromised by responding to a phishing email, by a keylogger or because of a Trojan Horse virus that was installed on your computer through a fraudulent email. It also could be compromised by someone with whom you may have shared your user name and password.

How can I prevent becoming a victim of identity theft or fraud?

The best thing you can do is protect access to your personal information.

Be suspicious of any email with urgent requests for personal information, especially personal financial information.

If you suspect a message is not authentic or you don’t recognize the sender’s address, do not click on the link in the email.

Regularly log on to online accounts to check bank, credit card and debit card statements to ensure all transactions are legitimate. Report any suspicious activity immediately.

Ensure that your browser is up-to-date and security patches have been downloaded.

The best ways to prevent having your information compromised:

  • Installing anti-virus software on your computer that updates automatically.
  • Deleting email and text messages asking you to confirm or provide personal information.
  • Being cautious about opening attachments and downloading files from emails, regardless of who sent them.
  • Never sharing your user name and password.

A resource for tips on ways to keep your computers secure is the Federal Trade Commission’s site at

For more information on identify theft, visit the Federal Trade Commission’s Identity Theft site at

Back to Top