FDIC logo

FDIC-Insured - Backed by the full faith and credit of the U.S. Government

Set a location as your home banking center.

118th St - Pete's Market

3448 E. 118th St., Chicago, IL 60617

(773) 364-2153

55th St.

2740 W. 55th St., Chicago, IL 60632

(773) 843-1900

Archer Ave

2869 S. Archer Avenue, Chicago, IL 60608

(773) 254-1909

Cedar Lake

10201 W. 133rd Ave., Cedar Lake, IN 46303

(219) 374-5308

Chicago (Garfield Ridge)

6162 South Archer Ave., Chicago, IL 60638

(773) 767-5188

Commercial Ave.

9226 S. Commercial Ave., Chicago, IL 60617

(773) 768-4800

Hobart - St. Mary Medical Center ATM

1500 S Lake Park Ave. , Hobart, IN 46342

Lemont

12261 Archer Ave., Lemont, IL 60439

(630) 257-1400

Midlothian

14757 S Cicero Ave., Midlothian, IL 60445

(708) 687-7400

Niles

7840 N. Milwaukee Ave., Niles, IL 60714

(847) 966-7900

Orland Park - 80th Ave.

8000 w 159th St., Orland Park, IL 60462

(708) 460-7400

Orland Park - Ravinia

14701 South Ravinia Ave., Orland Park, IL 60462

(708) 226-2727

Pulaski Rd.

5400 S. Pulaski Rd., Chicago, IL 60632

(773) 382-2210

Westmont

21 E. Ogden Ave., Westmont, IL 60599

(630) 969-2305

Whiting

1900 Indianapolis Blvd., Whiting, IN 46394

(219) 659-6700

East Chicago

4901 Indianapolis Blvd., East Chicago, IN 46312

(219) 378-1000

Dyer

1300 Sheffield Ave., Dyer, IN 46311

(219) 322-2530

Munster - Corporate and Local Banking Center

9204 Columbia Ave., Munster, IN 46321

(219) 836-1964

Munster - Community Hospital ATM

Community Hospital, Munster, IN 46321

Hammond - Woodmar

7120 Indianapolis Blvd., Hammond, IN 46324

(219) 844-4500

East Chicago - St. Catherine Hospital ATM

4321 Fir St., East Chicago, IN 46312

St. John

9903 Wicker Ave., St. John, IN 46373

(219) 365-5400

Valparaiso

2905 Calumet Ave., Valparaiso, IN 46383

(219) 462-4100

Schererville

141 West Lincoln Hwy., Schererville, IN 46375

(219) 865-4300

Highland

3927 Ridge Rd., Highland, IN 46322

(219) 838-9101

Crown Point

855 Stillwater Pkwy., Crown Point, IN 46307

(219) 662-0220

Gary

1801 West 25th Ave., Gary, IN 46404

(219) 944-0005

Broadway

8600 Broadway, Merrillville, IN 46410

(219) 685-8600

Hobart

1501 South Lake Park Ave., Hobart, IN 46342

(219) 945-1305

BRUSH UP ON YOUR VOCAB

As the digital world evolves, new terms have developed to define and better identify fraud. Review our glossary to increase your understanding of potential threats.

Cybersecurity Glossary

A

Antivirus Software: 
A program designed to monitor a computer or network for malware detection and to prevent malware-related incidents.

Authentication: 
The process of verifying the identity of a user or device before granting access to an account or system.

B

Biometrics: 
Authentication that uses unique physical characteristics, including fingerprints and facial recognition.

Black Hat Hacker: 
A malicious hacker who exploits vulnerabilities within a system or program for personal gain or to cause harm.

Business Email Compromise (BEC):
A scam that uses email to trick employees into sending money or divulging confidential company info by impersonating an executive.


C

Card Skimmer: 
A device placed on a card reader with the intent to intercept card information.

Compliance: 
Adherence to laws, regulations, and guidelines that govern data protection and privacy in the financial sector.

Cookie:
A small file containing data stored on your computer by websites. These files help identify your computer while you browse the internet or use a network. Cookies allow websites to remember your information, including logins, shopping carts, and more.

Cyber Hygiene: 
Practices and steps that users take to maintain system health and improve online security.

Cybersecurity: 
The process of protecting information by preventing, detecting and responding to attacks.


D

Data Breach: 
An incident where unauthorized access to sensitive data occurs, potentially leading to data theft or exposure.

Digital Wallet: 
An electronic device or an online service that enables individuals or businesses to make transactions electronically, often in the form of electronic credit and debit cards.

E

Encryption: 
The transformation of data into a form that conceals the data’s original meaning to prevent unauthorized access.

F

Firewall: 
A part of a computer system designed to block unauthorized access while permitting outward communication. Its functions as a barrier between a trusted internal network and untrusted external networks.

Fraudster:
A person or group who acquires money through deception.

G

H

Hacker: 
An unauthorized user who attempts to or gains access to an information system.

HTTPS:
Hyper Text Transfer Protocol Secure. A standard and secure method for communication that adds a layer of security to data exchanged between a user's web browser and a web server.

I

Identity Theft:
The unauthorized use of someone else's personal information to commit fraud.

Incident Response Plan:
A documented strategy outlining the procedures to follow when a cybersecurity incident occurs.

J

K

L

M

Malware: 
Software that is intentionally included or inserted in a system for a harmful purpose.

Multi-Factor Authentication (MFA): 
Login authentication requiring two or more factors to achieve authentication.

N

O

P

Phishing: 
A technique used to acquire sensitive data via email or on a website, usually done while masquerading as a legitimate source.

PIN: 
Personal Identification Number, a secret number a cardholder memorizes and uses to authenticate their identity during a transaction.

Q

Quishing: 
A cyberattack that uses QR codes via email, text, websites, social media or posted in public places to trick people into visiting malicious websites or downloading harmful content.

R

Ransomware:
Malicious software that encrypts a victim's files or locks them out of their system, rendering their data inaccessible.

S

Social Engineering: 
A manipulation technique that relies on human emotion to deceive individuals into revealing sensitive information.

Spoofing: 
Faking the sending address of a transmission to gain illegal entry into a secure system. This could include a fake email or website domain that is very similar to a legitimate address.

Spyware: 
Malicious software designed to track a user's computer activity and send details back to the fraudster. This can track things such as applications used, usernames and passwords entered, and more.

Synthetic Identity Fraud:
The creation of a new identity using a combination of real and fictitious information to defraud financial institutions.

T

Trojan Horse:
A type of malicious software that disguises itself as a legitimate program or file to deceive users. This software evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.

U

Unsecured Website: 

A site that lacks proper security measures (like HTTPS), making it vulnerable to data breaches and information theft. This doesn't necessarily mean the site itself was created with malicious intent, but its lack of security makes it vulnerable to bad actors.

V

Vishing:
Voice phishing, where fraudsters use phone calls to trick individuals into revealing sensitive information by masquerading as a legitimate entity, such as a government agency or a family member urgently requesting funds.

W

White Hat Hacker: 
An ethical hacker who uses their skills to find and fix security vulnerabilities in systems and networks.

X

Y

Z