Grove Bank & Trust’s Mobile App puts card control in the palm of your hand. It is an added layer of security that allows you to monitor and manage your Grove Bank & Trust debit card anytime, anywhere so you can stay on top of your finances at all times.
Turn your card on or off instantly with a single swipe.
Lost your card? No problem. Just log into the App, and select Card Management from the Accounts Menu. Select Report card Lost/Stolen and click on the LOST option. This will allow you to easily turn it back on once you find your card. To permanently deactivate the card, select “Stolen”.
Get instant alerts when your card is used.
With the “Alerts and Protections” feature, you can:
- Set Alerts. Define alerts by merchant type, spend limit, location, or transaction type.
- Restrict usage. Set spending limits and restrict usage or transaction by type of merchant (gas stations, department stores, restaurants, etc.).
- Enable or disable transactions based on location. Simply enable or disable transactions by geographic location including out of state and international transactions.
- Set spending alerts and spending limits. Set spending alerts so you'll be notified when a card transaction takes place above a specified limit. You can also set spending limits so you can't spend more than budgeted.
To obtain a new Debit Card please contact our Client Service Center is available Monday through Friday from 9 AM until 5 PM at 305.858.6666. From outside the U.S., call collect 305.808.4010.
Download the mobile app.
- Educate your employees. You and your employees are the first line of defense against corporate account takeover. A strong security program paired with employee education about the warning signs, safe practices and responses to a suspected takeover are essential to protecting your company and its clients.
- Protect your online environment. It is important to protect your cyber environment just as you would your cash and physical location. Do not use unprotected internet connections. Encrypt sensitive data and keep updated virus protection on your computer. Use complex passwords and change them periodically.
- Partner with your bank to prevent unauthorized transactions. Talk to your banker about programs that safeguard you from unauthorized transactions. Positive Pay and other services offer call backs, device authentication, multi-person approval processes and batch limits to help protect you from fraud.
- Pay attention to suspicious activity and react quickly. Look out for unexplained account or network activity, pop ups and suspicious emails. If detected, immediately contact your financial institution, stop all online activity and remove any systems that may have been compromised. Keep records of what happened.
- Understand your responsibilities and liabilities. The account agreement with your bank will detail what commercially reasonable security measures are required in your business. It is critical that you understand and implement the security safeguards in the agreement. If you don't, you could be liable for losses resulting from a takeover.
Talk to your banker if you have any questions about your responsibilities.
Identity theft continues to be one of the fastest growing crimes in the United States. We recommend following these tips to keep your information - and your money - safe.
- Don't share your secrets. Don't provide your Social Security Number or account information to anyone who contacts you online or over the phone. Protect your PINs and passwords and do not share them with anyone. Use a combination of letters and numbers for your passwords and change them periodically. Do not reveal sensitive or personal information on social networking sites.
- Shred sensitive papers. Shred receipts, bank statements and unused credit card offers before throwing them away.
- Keep an eye out for missing mail. Fraudsters look for monthly bank or credit card statements or other mail containing financial information. Consider enrolling in online banking to reduce the likelihood of paper statements being stolen. Also, don't mail bills from your own mailbox with the flag up.
- Use online banking to protect yourself. Monitor your accounts regularly for fraudulent transactions. Sign up for text or email alerts from your bank.
- Monitor your credit report. Order a free copy of your credit report every four months from one of the three credit reporting agencies at https://www.annualcreditreport.com
- Protect your computer. Make sure the virus protection software on your computer is active and up to date. When conducting business online, make sure your browser's padlock or key icon is active. Also, look for an "s" after the "http" to be sure the website is secure.
- Protect your mobile device. Use the passcode lock on your smart phone and other devices. This will make it more difficult for thieves to access your information if your device is lost or stolen.
What is ransomware?
Ransomware is the digital version of extortion. It's as simple as that. It uses age-old tactics to carry out a modern day crime, but the elements behind it are as old as human criminal activity itself.
8 simple tips to protect your company from ransomware.
- Backup your files regularly.
The only way to ensure that you can immediately handle a ransomware attack is to implement a regular backup schedule so that your company can get access to the files it needs without dealing with cybercriminals. Your backup should have certain restrictions such as read/write permissions without an opportunity to modify or delete files. - Check your backups.
There are times when something can damage your files. Be sure to check regularly that your backups are in good shape. - Protect against phishing attacks.
Cybercriminals often distribute fake email messages that look like an official message from a vendor or bank, luring a user to click on the malicious link and download malware. Teach employees that they must never open attachments from an unknown sender or even suspicious attachments from a friend in case they have been hacked. - Trust but verify.
Malicious links can be sent by your friends or your colleagues whose accounts have been hacked. Let employees know that if they receive something out of the ordinary from a friend, they should call that person directly to verify that they sent it and find out if their accounts have been compromised. - Enable 'show file extensions' option in the windows setting.
This will make it much easier to distinguish potentially malicious files. Because Trojans are programs, employees should be warned to stay away from file extensions like "exe", "vbs" and "scr". Scammers could use several extensions to masquerade a malicious file as a video, photo or document. - Regularly update your operating system.
Cybercriminals tend to exploit vulnerabilities in software to compromise systems. With the right assessment and management tools, you can rest assured that your system will be scanned and that patches will be distributed regularly in order to keep your system updated. - Use a robust antivirus program.
Protect your system from ransomware by using a multi-layered system of defense that checks malware from many different angles to ensure that it does not corrupt your system. - If ransomware hits, cut off your internet connection immediately.
If you discover ransomware, shut off your internet connection right away. If the ransomware did not manage to erase the encryption key from the computers in question, then there is still a chance you can restore your files.
Mobile devices are a convenient way to take information and databases anywhere you go. Unfortunately, their portability makes them a popular target for thieves. Sensitive information is often maintained within mobile devices such as laptops, mobile phones and handhelds (e.g.: iPhones, iPads, PCs and Macs). The following tips will assist you in safeguarding mobile devices, as well as the sensitive and proprietary information they may contain
Do’s
- Back up your data regularly and keep a current copy in a separate location.
- Keep mobile devices out of sight and secure whenever possible.
- Know what you have stored on your devices and periodically inventory their content.
- Require passwords for all access to your mobile devices.
- Don't store sensitive information (e.g.: your password, credit card or telephone card data) in devices. Such devices often have limited security and are usually unable to withstand a determined attack.
- Don't leave a mobile device unattended. Mobile devices are easily lost or stolen. When traveling, carry the device as hand luggage and be cautious in public places (e.g.: airports or hotels).
- Don't discuss or view sensitive or proprietary information where others may be able to hear or view the information.

