Tradition Capital Bank will be closing at 2:00pm on December 24th in observance of Christmas Eve. Please note the impacted processing cutoff times for December 24th - ACH Origination and Wire Origination is 12:00pm CST; Remote Deposits is 1:00pm CST. The bank is closed on Christmas Day. 

You are about to leave the Tradition Capital Bank website.

Please read the following and click on the OK button to proceed.

  • Tradition Capital Bank is not endorsing or guaranteeing the products, information or recommendations provided by the linked websites.
  • Tradition Capital Bank is not liable for any failure of products or services advertised on linked websites.
  • Tradition Capital Bank is not an affiliate of this entity.
  • Each third-party website may have a privacy policy different from the Tradition Capital Bank website.
  • The linked third-party website(s) may provide less security than the Tradition Capital Bank website.
OK

Additional information

Terms of Use

Use of this website is at your own risk. Tradition Capital Bank is not liable for any damages that arise from use or access to this site. While we’ve done our best to provide accurate and complete information, we make no warranties about the accuracy of information contained on the site. Unauthorized use of this site and any of its features is prohibited and misuse constitutes criminal activity that is punishable by law.

Privacy Statement

View PDF

For any questions regarding this policy, contact us:
Tradition Capital Bank  |  Attn: Privacy
7601 France Ave S, Suite 140  |  Edina, MN 55435
Or email us at: privacystatement@tradition.bank
Phone (952) 806-6600  |  Fax (952) 806-6699

Credit Bureau Opt-Out

The Fair Credit Reporting Act (FCRA) provides consumers the opportunity to “opt out,” which prevents the four major credit bureaus (TransUnion, Experian, Equifax and Innovis) from providing information about you to companies for the purpose of providing you with pre-approved offers of credit or insurance.

 

If you do not want to receive such offers, you may opt out by visiting www.optoutprescreen.com. You will have the option of opting out for five years, permanently, or the option to opt back in again.

 

You will be informed that it can take up to five business days to become effective. You will also be warned that companies may have already received your information and have mailed their offer, and it may take several months to stop receiving these types of offers.

Business Account Requirements

Important information about opening a new business account. Effective May 11, 2018.

View PDF

Cyber Security Tips

Criminals are constantly trying to steal consumers’ personal data using fake emails, websites, phone calls, and even text messages. They use a variety of ways to try to trick people into providing Social Security numbers, bank account numbers, and other valuable information. In many cases, their goal is to steal money from you. This article defines some terms used for different online scams and how they work, so you can protect your money.

 

How do scammers contact their victims?

 

Phishing is a term for scams commonly used when a criminal uses email to ask you to provide personal financial information. The sender pretends to be from a bank, a retail store, or government agency and makes the email appear legitimate. Criminals often try to threaten, even frighten people by stating “you’re a victim of fraud” or some other urgent-sounding message to trick you into providing information without thinking. Don’t do it.

Smishing is similar to phishing, but instead of using email, the criminal uses text messaging to reach you. Same idea, they pretend they are from an organization you might know and trust (such as a bank or the IRS) and try to get your personal information.

Vishing, similar to phishing and smishing, is when scammers use phone services such as a live phone call, a “robocall,” or a voicemail to try to trick you into providing personal information by sounding like a legitimate business or government official.

 

What are the different types of scams?

 

Government Impostor Scams are when fraudsters pretend to be an employee of the FDIC or other government agency, sometimes even using the names of real people. The March 2020 FDIC Consumer News issue has more on how to avoid being scammed by government impostors.

Remember, the FDIC does not send unsolicited correspondence asking for money or sensitive personal information, and we’ll never threaten you. Also, no government agency will ever demand that you pay by gift card, wiring money, or digital currency. The FDIC would never contact you asking for personal details, such as bank account information, credit and debit card numbers, social security numbers, or passwords.

Lotteries and Sudden Riches Scams are when you are told that you won a lottery, perhaps in a foreign country, or that you are entitled to receive an inheritance. You are told that in order to “claim” the lottery winnings or inheritance, you must pay “taxes and fees.” A fake cashier’s check might be sent to you, which the scammer asks you to cash and then wire back the funds to cover the taxes and fees. They disappear with your funds and you get nothing but taken advantage of by the criminal when the check is found to be fraudulent and your bank holds you responsible for the loss.

Online Auctions, Classified Listing Sites, and Overpayment Scams involve an online auction or classified listing site. The scammer offers to buy an item for sale, pay for a service in advance, or rent an apartment. The clue that it is a scam is that they send you a cashier’s check for an amount that is higher than your asking price. When you bring this to their attention, they will apologize for the oversight and ask you to quickly return the extra funds. The scammer’s motive is to get you to cash or deposit the check and send back legitimate money before you or your bank realize that the check you deposited is fake.

Grandparent Scams happen when a fraudster hacks into someone’s email account and sends out fake emails to friends and relatives, perhaps claiming that the real account owner is stranded abroad and might need your credit card information to return home. If you receive such an email, make sure you contact the sender through other means before sending any money or personal information.

Secret or Mystery Shopper Employment Scams involve fake advertisements for job opportunities that claim to be “hiring” people to work from home. As the potential new “employee,” you might receive an official check as a starting bonus, and are asked to cover the cost of “account activation.” The scammer hopes to receive these funds before the official check clears and you realize you have been scammed. Another scenario involves an offer to work from home as a secret shopper to “assess the quality” of local money transfer businesses. You are sent a cashier’s check and instructed to deposit it into your bank account and withdraw the amount in cash. You are then instructed to use a local money transfer business to send the funds back to the “employer” and “evaluate” the service provided by the money transfer business.

Be sure to read the FDIC Consumer News on check fraud to learn more about scams involving checks. FDIC Consumer News: Beware of Fake Checks.

 

How can I avoid scams?

 

Be suspicious if someone contacts you unexpectedly online and asks for your personal information. It doesn’t matter how legitimate the email or website may look. Only open emails, respond to text messages, voice mails, or callers that are from people or organizations you know, and even then, be cautious if they look questionable.

If you think an email, text message, or pop-up box might be legitimate, you should still verify it before providing personal information. If you want to check something out, independently contact the supposed source (perhaps a bank or organization) by using an email address or telephone number that you know is valid, such as from their website or a bank statement.

Be especially wary of emails or websites that have typos or other obvious mistakes.

 

Additional Resources:

 

FDIC Video: FDICExplains: Phishing

Federal Trade Commission (FTC)
FTC: How to Recognize and Report Spam Text Messages
FTC: How to Recognize and Avoid Phishing Scams
FTC: How to Spot, Avoid and Report Fake Check Scams
FTC: Grandparent scams in the age of Coronavirus

Consumer Financial Protection Bureau (CFPB): Impostor Scams

Online Banking Security Tips

Internet threats have changed significantly over the past several years. At Tradition Capital Bank, we have security measures in place to protect your account information. These security measures can’t be effective without your help and cooperation. Here are some precautions you can take to help safeguard your personal information from identity theft and account fraud.

  • Passwords – Choose a password only you would know, and use a combination of letters, numbers, and special characters. Avoid using passwords that are easily guessed such as birthdays or home addresses. Change your password every 90 days.
  • Anti-Virus Protection – Make sure you have anti-virus software on your computer and that it is current.
  • Logging Out – Do not “×” out of the website or close the page. Follow our exit procedures, by clicking on “Logoff ” located in the upper left of the page.
  • Monitor Your Account(s) on a Regular Basis – Let us know immediately if you encounter anything that does not seem right.
  • Email Security – Generally email is not encrypted, so do not send any sensitive information such as account numbers or other personal information. Tradition Capital Bank will not email you and ask for your personal information or other account information. If you receive an email claiming to be from our bank, take precautions and call us immediately.

Additional Tips for Business Online Banking

  • Do not share usernames, passwords, or tokens with other coworkers.
  • Contact us immediately when an individual with online access is no longer employed at your business.
  • Use firewalls to protect from outside intrusion or hackers.
  • Segregate duties among two or more people, so no one person has too much access and control.
  • Conduct internal or third-party audits of controls.

You are important to us and it is our goal to help prevent identity theft and account fraud from happening to you. If you experience any security-related events or notice suspicious activity within your accounts at our bank, contact us immediately. We will assist you in the investigation and guide you in necessary steps to handle these types of issues.

Business Email Fraud

Cyber thieves are getting bolder every day and the level of sophistication has drastically increased. Business email compromise (BEC), also known as email account compromise (EAC) is one of the most common scams affecting businesses, and one of the most financially damaging online crimes.

Carried out by transnational criminal organizations that employ lawyers, linguists, hackers, and social engineers, BEC can take a variety of forms. But in just about every case, the scammers target employees with access to company finances and trick them into making Electronic Funds Transfers (EFT’s) to bank accounts thought to belong to trusted partners—except the money ends up in accounts controlled by the criminals. The perpetrators are so practiced at their craft that the deception is often difficult to uncover until it is too late.

 

How Criminals Carry Out BEC Scams

  • Spoofing email accounts and websites: Slight variations on legitimate addresses (john.kelly@examplecompany.com vs. john.kelley@examplecompany.com) fool victims into thinking fake accounts are authentic.
  • Spear-phishing: These messages look like they’re from a trusted sender to trick victims into revealing confidential information. That information lets criminals access company accounts, calendars, and data that gives them the details they need to carry out the BEC schemes.
  • Malware: Malicious software can infiltrate company networks and gain access to legitimate email threads about billing and invoices. That information is used to time requests or send messages, so accountants or financial officers don’t question payment requests. Malware also lets criminals gain undetected access to a victim’s data, including passwords and financial account information.

How to Protect Yourself

  • Verify payment and purchase requests in person if possible or by calling the person to make sure it is legitimate. You should verify any change in account number or payment procedures with a known contact by placing a call to them.
  • Be careful with what information you share online or on social media. By openly sharing things like pet names, schools you attended, links to family members, and your birthday, you can give a scammer all the information they need to guess your password or answer your security questions.
  • Don’t click on anything in an unsolicited email or text message asking you to update or verify account information. Look up the company’s phone number on your own (don’t use the one a potential scammer is providing) and call the company to ask if the request is legitimate.
  • Carefully examine the email address, URL, and spelling used in any correspondence. Scammers use slight differences to trick your eye and gain your trust.
  • Be careful what you download. Never open an email attachment from someone you don’t know, and be wary of email attachments forwarded to you.
  • Set up two-factor (or multi-factor) authentication on any account that allows it, and never disable it.
  • Verify payment and purchase requests in person if possible or by calling the person to make sure it is legitimate. You should verify any change in account number or payment procedures with the person making the request.
  • Be especially wary if the requestor is pressing you to act quickly.

For further information and additional resources on BEC, visit www.FBI.gov.

Protecting Mobile Devices

What are the risk associated with mobile device apps?

 

Applications (apps) on your smartphone or other mobile devices can be convenient tools to access the news, get directions, pick up a ride share, or play games. But these tools can also put your privacy at risk. When you download an app, it may ask for permission to access personal information—such as email contacts, calendar inputs, call logs, and location data—from your device. Apps may gather this information for legitimate purposes—for example, a ride-share app will need your location data in order to pick you up. However, you should be aware that app developers will have access to this information and may share it with third parties, such as companies who develop targeted ads based on your location and interests.

 

How can you avoid malicious apps and limit the information apps collect about you?

  • Avoid potentially harmful apps (PHAs). Reduce the risk of downloading PHAs by limiting your download sources to official app stores, such as your device’s manufacturer or operating system app store. Do not download from unknown sources or install untrusted enterprise certificates. Additionally—because malicious apps have been known to slip through the security of even reputable app stores—always read the reviews and research the developer before downloading and installing an app.
  • Be savvy with your apps. Before downloading an app, make sure you understand what information the app will access. Read the permissions the app is requesting and determine whether the data it is asking to access is related to the purpose of the app. Read the app’s privacy policy to see if, or how, your data will be shared. Consider foregoing the app if the policy is vague regarding with whom it shares your data or if the permissions request seems excessive.
  • Review app permissions. Review the permissions each app has. Ensure your installed apps only have access to the information they need, and remove unnecessary permissions from each app. Consider removing apps with excessive permissions. Pay special attention to apps that have access to your contact list, camera, storage, location, and microphone.
  • Limit location permissions. Some apps have access to the mobile device’s location services and thus have access to the user’s approximate physical location. For apps that require access to location data to function, consider limiting this access to when the app is in use only.
  • Keep app software up to date. Apps with out-of-date software may be at risk of exploitation of known vulnerabilities. Protect your mobile device from malware by installing app updates as they are released.
  • Delete apps you do not need. To avoid unnecessary data collection, uninstall apps you no longer use.
  • Be cautious with signing into apps with social network accounts. Some apps are integrated with social network sites—in these cases, the app can collect information from your social network account and vice versa. Ensure you are comfortable with this type of information sharing before you sign into an app via your social network account. Alternatively, use your email address and a unique password to sign in.

What additional steps can you take to secure data on your mobile devices?

  • Limit activities on public Wi-Fi networks. Public Wi-Fi networks at places such as airports and coffee shops present an opportunity for attackers to intercept sensitive information. When using a public or unsecured wireless connection, avoid using apps and websites that require personal information, e.g., a username and password. Additionally, turn off the Bluetooth setting on your devices when not in use. (See Cybersecurity for Electronic Devices.)
  • Be cautious when charging. Avoid connecting your smartphone to any computer or charging station that you do not control, such as a charging station at an airport terminal or a shared computer at a library. Connecting a mobile device to a computer using a USB cable can allow software running on that computer to interact with the phone in ways you may not anticipate. For example, a malicious computer could gain access to your sensitive data or install new software. (See Holiday Traveling with Personal Internet-Enabled Devices.)
  • Protect your device from theft. Having physical access to a device makes it easier for an attacker to extract or corrupt information. Do not leave your device unattended in public or in easily accessible areas.
  • Protect your data if your device is stolen. Ensure your device requires a password or biometric identifier to access it, so if is stolen, thieves will have limited access to its data. (See Choosing and Protecting Passwords.) If your device is stolen, immediately contact your service provider to protect your data. (See the Federal Communications Commission’s Consumer Guide: Protect Your Smart Device.)

For further information please visit www.cisa.gov