• Home
  • Site Map
  • Calculators
  • Kids
  • Teens
  • Privacy
  • Contact Us
  • Login to Online Banking
  • Register for Personal Banking
  • Business Banking Login
  • Check Reorder
  • Customer Requests
  • ACNB Corporation
  • Trust & Investments
  • Insurance Services
  • Career Opportunities
  • Community Spirit
  • Community Events
  • Resources
  • Security


ACNB Bank recommends the following precautions for Business Customers to help in reasonably securing your computer environment.

1. Regularly update your operating system with patches. Your computers operating system needs continual maintenance for your protection. Without the latest patches, you are vulnerable to attacks on the Internet. Keep it up to date and frequently check it.

    For Microsoft® operating systems, go to:

    For Apple® operating systems, go to:

2. Use a firewall. A firewall helps “hide” your computer from Internet attacks. Most current operating systems such as Windows 7 and 8 both come with one already installed. Make sure it is on and configured. Consult your computer vendor for assistance. There are also firewall software packages you can purchase along with anti-virus software. Free firewall software packages are available as well.

3. Use Anti-Virus (AV) software and keep it up to date. There are good free AV products, but our advice is to purchase a commercial AV product and maintain a current subscription to keep the anti-virus signatures up to date. Many times people initially purchase anti-virus software and never update it, thinking they are safe when in fact, their subscription ran out and their software is now out of date.

4. Use Anti-Spyware software and keep it up to date. Often, commercially available anti-virus software also includes anti-spyware, anti-phishing and a firewall.

5. Physically secure the computer(s) used to access ACNB Bank Online Banking.

    a. A best practice is to secure the computer you intend to use for accessing Internet Banking from use by others. If others are going to use the same computer, be vigilant of their activities.

    b. Never leave a computer unattended while using Online Banking.

    c. Consider using a dedicated Online Banking computer—one that is ONLY used to access your Online Banking accounts and is not used for email or browsing any other Internet sites. Connect to the Internet to get security updates and software patches prior to using Online Banking and disconnect from the Internet afterwards.

6. Safeguard your User IDs and Passwords. 

    a. Do not store passwords on a file located on your computer.

    b. Do not share passwords with anyone or write them down and post near your computer.

    c. Prohibit the use of “Shared” User IDs and Passwords.

7. Use strong, complex passwords containing at least one of the following: 

    a. Use a minimum 8 characters.

    b. Use an upper and lower case letter.

    c. Use a number.

    d. Use a special character: ~!@#$%^&*()_+<>?.

    e. Change your password frequently.

    f. Do not reuse passwords or use the same password used for Online Banking at any other websites.

    g. NEVER use dictionary words!

8. Do Not use an automatic login feature that saves User IDs and passwords.

9. Use multifactor authentication – take advantage of the availability of one time user access codes delivered by phone call or text message to a device other than your computer. Do not use email delivery of temporary access codes.

10. Manage your users:

    a. Control access to accounts and system capabilities based on the job functions of employees.

    b. Disable and delete employees immediately when their employment has terminated.

11. Use multiple approvals for monetary transactions and setup separate entry and approval users.

12. Take advantage of transaction limits:

    a. Establish transaction dollar limits for employees who initiate and approve online transactions.

    b. Establish limits for monetary transactions at multiple levels: per transaction, daily, weekly or monthly limits.

13. Use automatic email, text message and phone notification alerts to notify you of security events such as failed login attempts or User ID profile changes.

14. Properly log off when you have finished your online banking transactions to break the connection with ACNB Bank’s servers. Completely close your browser after logging off Online Banking.

15. Review account balances and detail transactions regularly (preferably daily) to confirm payment and other transactional data and immediately report any suspicious transactions to ACNB Bank.

16. Beware of PHISHING attempts:

    a. Do not respond to emails, text messages or phone calls requesting personal information such as passwords, account numbers, social security numbers, etc.

    b. REMEMBER: ACNB Bank will NEVER call, email or text you asking for your online banking passwords, User IDs, PIN numbers or challenge question answers.

17. Encourage your computer users to be especially cautious of clicking on links or opening attachments in unsolicited emails. Some links and attachments contain malware that can compromise the security of your computer systems.

18. Beware of pop-ups. Be on the alert for sudden pop-up windows asking for personal information or warning of a virus. This is called “Scare ware” because it frightens people into providing information or encourages them to download malicious software.

19. Do not use public computers or public “Wi-Fi Hot Spots” to access your accounts. You cannot trust them. If you must use a public access point, as an added precaution, change your Internet Banking password as soon as you can from a known safe computer or contact the customer contact center immediately after you are done and ask for a password change.

20. If you suspect your computer has been compromised, contact us immediately so we can take precautions to protect your financial assets. Call 1.888.334.ACNB (2262) or locally at 717.334.3161.

21. Other Recommendations for Businesses:

    a. Conduct a Risk Assessment to identify vulnerabilities and threats to the information resources used by your organization in achieving its business objectives, and then decide what countermeasures, if any to take in reducing the risk to an acceptable level, based on the value of the information resources to your organization. The Risk Assessment should examine the following:

                 i. Security Policy

                 ii. Asset management

                 iii. Access Controls – including User ID and Password standards

                 iv. Communications and operational controls

                 v. Computer Systems acquisition and management – including operating system and software updates/patches

                 vi. Incident response procedures – what to do if your system is compromised

                 vii. Business Continuity – how do you recover if your system fails or is destroyed

    b. Periodically have your computer systems evaluated by having a vulnerability test completed by a professional security consultant.


Member FDIC