Skip Navigation Documents in Portable Document Format (PDF) require Adobe Acrobat Reader 5.0 or higher to view,download Adobe® Acrobat Reader.
FDIC-Insured - Backed by the full faith and credit of the U.S. Government
FDIC-Insured - Backed by the full faith and credit of the U.S. Government
Hide Search
Hide Search

Resources/Guides

Information at your fingertips.
We take great pride in ensuring our customers make informed financial decisions. Here, you will find a wealth of information available to support you in your financial endeavors. Not finding what you're looking for? Call us and we'll be happy to assist you with your needs.


Click individual documents below to access a PDF download. For questions regarding individual documents—or to submit documents—please contact your nearest branch.

For more information about FDIC Deposit Insurance Coverage, click here.

Learn tips to manage & budget your money with the Money Smart Program from the FDIC. 

Stay Alert to Fraud

First National Bank is dedicated to the safety of our customers' information. Yet, every year criminals find new ways to trick consumers through scams, fraud, and ploys for information or cash. Always remember that FNB will never call or text a customer to ask for their account number, personal identification number (PIN), social security number, name, address, or password via phone, email, or text message. If you receive a suspicious communication, do not respond. Instead, contact FNB via a known, published number to report the communication and ensure your account remains secure.

Cyber Crime

Avoiding cyber crime requires a multi-layered approach. Below are tips from the Federal Bureau of Investigation (FBI).

Internet-enabled crimes and cyber intrusions are becoming increasingly sophisticated and preventing them requires each user of a connected device to be aware and on guard. 

  • Keep systems and software up to date and install a strong, reputable anti-virus program.
  • Be careful when connecting to a public Wi-Fi network and do not conduct any sensitive transactions, including purchases, when on a public network.
  • Create a strong and unique passphrase for each online account and change those passphrases regularly.
  • Set up multi-factor authentication on all accounts that allow it.
  • Examine the email address in all correspondence and scrutinize website URLs before responding to a message or visiting a site
  • Don’t click on anything in unsolicited emails or text messages.
  • Be cautious about the information you share in online profiles and social media accounts. Sharing things like pet names, schools, and family members can give scammers the hints they need to guess your passwords or the answers to your account security questions.
  • Don't send payments to unknown people or organizations that are seeking monetary support and urge immediate action.
The FBI monitors scams and frauds and publishes details about the most common ones on its site. Click here to learn more.

Check Fraud  

Be aware of the following red flags that could point to check fraud activity.
  • Is the check from an item you sold on the Internet, such as a car, boat, jewelry, etc, more than the item’s selling price?
  • Did you receive the check via overnight delivery?
  • Is the check connected to communicating with someone by email?
  • Is the check drawn on a business or individual account that is different from the person buying your item or product?
  • Have you been informed that you were the winner of a lottery, such as Canadian, Australia, El Gordo, or El Mundo that you did not enter?
  • Have you been instructed to "wire", "send" or "ship money", as soon as possible, either within the U.S. or outside the country?
  • Have you been asked to pay money to receive a deposit from another country?
  • Are you receiving pay of a commission for facilitating money transfers through your account?
  • Did you respond to an email requesting you to confirm, update, or provide your account number?

Identity Theft

Identity theft continues to be one of the fastest growing crimes in the United States, and has ranked as one of the top consumer concerns for the past several years. The Federal Trade Commission (FTC) has resources to help consumers protect themselves from identity fraud. The site provides steps consumers should take to secure their information and protect themselves from identity theft, as well as actions consumers should take if they become a victim of identity theft. 

Personal Computer Security

Q: Am I safe from threats if I stay away from shady websites?
A: Your PC could be infected from a number of sources. Viruses can be transferred from PC to PC through the use of a shared USB Flash Drive. There are many instances where a nationally recognized company’s website has been compromised and visitors to their site have been infected with malware. The best way to protect yourself is to protect your PC.

Q: Do I have to buy expensive software to clean viruses from my computer?
A: There are reputable programs available for free on the internet that may meet your needs. Be sure to do your homework prior to installing any software. Verify the software’s reputation using software review websites such as Cnet.com, prior to installing the software. Some examples of free anti-virus protection and malware removal are:
Note: We cannot endorse or recommend any of the above programs. They are listed here only to show examples of what is available.

Q: How do I know if my PC is infected?
A: Infected PCs may exhibit suspicious behavior, such as running more slowly than normal, locking up often, crashing and restarting frequently, or displaying unusual error messages. Or they may exhibit no symptoms at all. Also, the suspicious behavior often shown by infected PCs may be caused by a number of other factors. So while a poorly performing computer should make you suspect that it may be infected, you won’t know for sure unless you frequently scan your PC with an antivirus tool.

Q: Is one anti-virus software program better than another?
A: Marketing hype aside, all reputable antivirus software does pretty much the same job. Some may be better than others in regards to a particular feature, but any one of them is better than no antivirus software at all. However, there are a number of disreputable antivirus programs that actually do more harm than good. Be wary of any antivirus software that advertises itself via unsolicited email (spam) or pop-up windows.

Q: What do I need to do to protect my PC?
A: While there is no silver bullet that will protect you from every risk, if you take the following precautions, you can significantly reduce your exposure:

  • Install an antivirus program and configure it to update its virus definitions daily.
  • Configure your computer and connection to the internet properly. Some computer systems come with a lot of security enabled by default, but have someone who knows what they're doing check the configuration of your computer and other communications equipment —wireless routers, DSL or cable modems, etc.
  • Turn on automatic software updates. This is a feature of some software which allows it to patch itself with very little effort from you. Make sure it's turned on for your operating system, security software, and any applications that have the option.
  • Be aware of your Internet surroundings. Learn to tell scams from real email, and when not to follow links or open a document. It takes time and practice to develop Internet “street smarts.”
  • Perform regular backups. If your system becomes infected with a virus, you may have to reinstall your complete system. Backups ensure you don't lose your data if that becomes necessary.

Tips for enabling cookies via IE

Q: Can I customize settings in Internet Explorer to use persistent cookies? 
A: Yes. Follow the instructions below. 
  • In Internet Explorer, click on the Tools menu, then click on Internet Options, and then click the Privacy tab.
  • Click the Advanced button.
  • Under Cookies, check off Override automatic cookie handling, then under First-party Cookies select Accept, and under Third-party Cookies select Accept, click OK, and then click OK.

Service Service Fee
Research $30 hr. / $1 per copy
Telephone Transfer $3.00 per item
Zipper Bag (non-locking) $10/ea
Zipper Bag Key Replacement
$10
Statement Reconciliation/Research $30 hr. / $1 per copy
NSF Returned Item Fee $26 per item (applies to overdrafts created by check, in person withdrawal, re-presented item or other electronic means as applicable)
Overdraft Paid Item Fee $26 per item (applies to overdrafts created by check, in person withdrawal, re-presented item or other electronic means as applicable)
Chargeback Checks $4.50 (applicable on business accounts or accounts being used for business purposes)
Stop Payment $26 per item
Temporary Checks $1 per book
Fax-Incoming $2.50 first 5 pages / $.25 each additional
Tax Levy/Garnishment $50 each
Fax-Outgoing $4 first page / $.25 each additional
Cashier's Check $5 each
International Wire $50 per wire
Wire Transfer  Outgoing - $15 per wire
ATM / Debit Card Replacement Fee $10 per card
Debit Card Expedited Fee $60 per card
Collection Item $20 each
Escheat Fee (assessed prior to submitting funds to state) $50
Please take advantage of the free resource we offer for the benefit of your financial literacy. The following link includes articles, coaches, and calculators in order to better excel your education in finance as it relates to everyday life: https://fnbla.teachbanzai.com/wellness.

Business email compromise (BEC) — also known as email account compromise (EAC)—is one of the most financially damaging online crimes. It exploits the fact that so many of us rely on email to conduct business—both personal and professional.

In a BEC scam, criminals send an email message that appears to come from a known source making a legitimate request, like in these examples:

  • A vendor your company regularly deals with sends an invoice with an updated mailing address.
  • A company CEO asks her assistant to purchase dozens of gift cards to send out as employee rewards. She asks for the serial numbers so she can email them out right away.
  • A homebuyer receives a message from his title company with instructions on how to wire his down payment.

Versions of these scenarios happened to real victims. All the messages were fake. And in each case, thousands—or even hundreds of thousands—of dollars were sent to criminals instead.

How Criminals Carry Out BEC Scams 

A scammer might:

  • Spoof an email account or website. Slight variations on legitimate addresses (john.kelly@examplecompany.com vs. john.kelley@examplecompany.com) fool victims into thinking fake accounts are authentic.
  • Send spearphishing emails. These messages look like they’re from a trusted sender to trick victims into revealing confidential information. That information lets criminals access company accounts, calendars, and data that gives them the details they need to carry out the BEC schemes.
  • Use malware. Malicious software can infiltrate company networks and gain access to legitimate email threads about billing and invoices. That information is used to time requests or send messages so accountants or financial officers don’t question payment requests. Malware also lets criminals gain undetected access to a victim’s data, including passwords and financial account information.


  • How to Report 

    If you or your company fall victim to a BEC scam, it’s important to act quickly:

    • Contact your financial institution immediately and request that they contact the financial institution where the transfer was sent.
    • Next, contact your local FBI field office to report the crime.
    • Also file a complaint with the FBI’s Internet Crime Complaint Center (IC3).

    How to Protect Yourself 

    • Be careful with what information you share online or on social media. By openly sharing things like pet names, schools you attended, links to family members, and your birthday, you can give a scammer all the information they need to guess your password or answer your security questions.
    • Don’t click on anything in an unsolicited email or text message asking you to update or verify account information. Look up the company’s phone number on your own (don’t use the one a potential scammer is providing), and call the company to ask if the request is legitimate.
    • Carefully examine the email address, URL, and spelling used in any correspondence. Scammers use slight differences to trick your eye and gain your trust.
    • Be careful what you download. Never open an email attachment from someone you don't know, and be wary of email attachments forwarded to you.
    • Set up two-factor (or multi-factor) authentication on any account that allows it, and never disable it.
    • Verify payment and purchase requests in person if possible or by calling the person to make sure it is legitimate. You should verify any change in account number or payment procedures with the person making the request.
    • Be especially wary if the requestor is pressing you to act quickly.


    Information provided by the Federal Bureau of Information. Reach out to your FNB banker for more information about how to secure your accounts. 

life preserver
OVERDRAFT PROTECTION
Protect your checking account from insufficient funds with our overdraft protection options.
lightbulb with a dollar sign
MONEY SMART
Learn tips to manage & budget your money with the Money Smart Program.
business briefcase

Ready to take your business to the next level? Our lending experts are here to help your business continue to grow.