Today is
Sign up for Email Updates

   

Click Here For Information Regarding The Recent Target Breach

Our Top Priority

At Capitol View Credit Union, our top priority is your security. That is why we invest in multiple security features that protect your account and the transactions you make. One of the security features we invest in is VeriSign SSL technology.

VeriSign provides Secure Sockets Layer (SSL) Certificates and more in a single solution. The first Certificate Authority to provide SSL in 1995, VeriSign remains the leading provider of the most trusted solution for online security and helps assure you that you are safe from search to browse to buy and sign-in. When you see the VeriSign Trust™ Seal, you know you can trust the link, trust the site, and trust the transaction.


Avoiding Online Scams: (Provided by OnGuardOnline.gov)

  • Don't send money to someone you don't know.
  • Don't respond to messages that ask for your personal or financial information. Capitol View will never request such information using email.
  • Don't play a foreign lottery.
  • Keep in mind that wiring money is like sending cash: once it's gone, you can't get it back.
  • Don't agree to deposit a check from someone you don't know and then wire money back.
  • Read your bills and monthly statements regularly-on paper and online.
  • In the wake of a natural disaster or another crisis, give to established charities rather than one that seems to have sprung up overnight.
  • Talk to your doctor before buying health products or signing up for medical treatments.
  • When considering an investment, remember that there's no such thing as a sure thing.
  • Know where an offer comes from and who you're dealing with.

Protecting Your Identity

  • Always keep sensitive personal and account information in a safe place.
  • Never share personal or account information over email or online. The credit union will never request such information using email or the internet.
  • Setup a "Password" on your Capitol View accounts so that the credit union can verify your identity without using your SSN.
  • Update email and online account passwords regularly. Avoid using common phrases or sequences when creating a password.
  • Do not carry your Social Security Card on your person. Keep it in a secure place at all times.
  • Never share your debit or MasterCard PIN with anyone. Not even the credit union has access to your PIN.
  • When you are suspicious of activity on your debit or MasterCardTM contact the phone number on the back of your card to notify Card Services
  • Use MasterCard SecureCodeTM and protect your account when making online purchases

Explore OnGuardOnline.gov to learn the most up-to-date security advisories and tips!



Travel Safely

  • Plan ahead.Contact Capitol View with your travel plans. We will make a note when monitoring for suspicious activity.
  • Try to keep only small denominations of cash when traveling.
  • Using prepaid ATIRA Gift Cards offer a risk free way of spending on vacation. They can each be loaded with up to $750 and have no trace back to your Capitol View accounts if lost or stolen.


Creating a Cyber-Secure Environment at Home

Most workplaces have cyber-security policies, processes, and technologies. You can create a more cyber-secure environment at home by implementing similar strategies.

Policies
At home, you should determine:

  • A central location for your computer. This allows you to monitor your children’s activities online.
  • Whether you allow access to certain websites. You may choose to use parental control settings to block access to inappropriate websites.
  • Acceptable online behavior and expectations. Clearly explain the rules and expectations regarding online behavior. Include issues such as cyber-bullying, keeping personal information private (not posting it online), and treating people met online as strangers.
  • Your monitoring strategy.  You may choose to monitor your family’s online activities and let them know their activity is being monitored.

Processes
To create a more cyber-secure environment at home, you should implement and maintain the following processes:

  • Develop strong passwords and change them every 60 to 90 days. Passwords should be changed periodically to reduce the risk of disclosure. Have different passwords for each account for which you provide personal information.
  • Back up your information. Determine what needs to be saved, how frequently it needs to be saved, how to perform the backups, how to save the backups so you can restore information when needed, and how to test the backups to make sure they work properly.
  • Get support. Before your computer crashes or is infected with a computer virus, determine who is going to provide your support.
  • Erase your hard drive. When it is time to dispose of your computer or mobile device, make sure you have the tools and processes to completely erase your information from it or physically destroy the hard drive. Properly erasing your hard drive thwarts efforts to steal your identity.

Technologies
Use the following technologies and tools to help keep your family and computers, tablets, smartphones, and other mobile devices secure. To help select the right tools, check product ratings and reviews from well-known personal computer (PC) and consumer magazines.

  • Parental control software. As mentioned previously, you may choose to use parental control software. These programs can prevent access to inappropriate websites, limit the amount of time spent online, set a schedule for what time of day Internet use is permitted, limit access to games based on Entertainment Software Rating Board (ESRB) ratings, and monitor instant messaging conversations. Most programs are hardened to prevent them from being disabled.
  • Automatic updates. Set your computer to automatically update the latest security patches for operating systems and application software. This will minimize risk from hackers taking advantage of software vulnerabilities or bugs.
  • Security software. Ensure all computers have up-to-date security software on them. At a minimum, the security software should include anti-virus, anti-spyware, and a firewall. Newer products include functions to block downloads and access to and from malicious websites. Some browsers have safeguards built in, such as Internet Explorer®’s SmartScreen Filter that detects phishing websites and protects against downloading malicious software. For mobile devices — like tablets and smartphones — look for security software that allows you to locate a lost or stolen device and remotely erase it.
  • Wireless network. Configure your wireless network for security. Change the default password for your router to a secure password to prevent anyone from gaining access to it and disabling your security settings. You should also use a minimum of 128-bit encryption to make your network more secure. Choose WiFi Protected Access (WPA) 2 encryption over older encryption, like Wired Equivalent Privacy (WEP) or WPA. Lastly, change the service set identifier (SSID) from its default to something unique. Use a name you can remember to identify your network, but choose a name that does not identify you or your family. For example: Do not make your SSID “Smith’s home network.” Check your router vendor and Internet service provider (ISP) for secure configuration instructions.

Questions
Frequently Asked Questions
Locations & Hours
Contact Us

Phone
Local: 515-725-2167
Toll Free: 1-800-383-3595
24/7 Voice Response: 1-800-879-8350
Fax: 515-725-2196

Main Office
1000 East Grand Avenue
Des Moines, IA 50319

Capitol View Credit Union
Routing Number: 273074135

CAPVIEW.com
Newsletter
Current Rates
Site Map
Policies
Notices

Home Banking
Log In
Privacy Policy
Enroll for Home Banking

Apply
JOIN US
Savings & Checking Application
Apply For A Credit Card
Apply For A Loan