Blog / MutualBank

Latest Financial News

Martin Shkreli faces more charges

Tuesday, May 3, 2016 11:39 am

Martin Shkreli, the ex-pharmaceutical CEO famous for hiking up the price of a life-saving drug, will soon face new charges.

MutualBank Secure Login

MutualBank Online Banking


Have suggestions or topic requests? Let us know.

  • Security Reminder / Fraud Texts & Calls

    Wednesday, February 10, 2016

    Some of our customers are receiving texts like the one pictured below or are receiving phone calls asking for their account information. If you do receive this text or any communication asking for your account information, DO NOT click on the link or provide any of your account information. Only log into your account via If you have received this text and have provided your account information, please contact us immediately (800-382-8031) so we can take measures to protect you.

    Please be aware this is not a data breach. The texts are going to all Muncie cell phone numbers in a range. So far we are aware of 765-716-xxxx 765-717-xxxx and 765-729-xxxx and 765-724-xxxx. It is going to all of the numbers, not just MutualBank customers.

  • Personal Social Media Account Security

    Wednesday, April 22, 2015

    For many of us, social media has become a part of our everyday lives and helps us conveniently keep tabs on the people and topics we care most about.

    Recently however, there has been an increase of social media account take overs by cybercriminals. As stated in the media, one contributing factor in some of the social media account takeovers has been the use of weak passwords.

    Tips for creating a stronger password:

    • Passwords should typically:
      • be at least 8 characters in length
      • contain at least 1 number
      • contain at least 1 special character (!@#$$%)
      • contain both upper and lower case characters.
    • Do not use your name, date of birth, maiden name, mother’s maiden name, address, or other easily guessable words for passwords. 
    • Another way to create a strong password is to use a series of words that do not relate to each other. For example, JumpingFastRelaxStop!#.


    Social media additional security options:

    Another way to help avoid social media account takeover is to use the additional security options available. Two-factor authentication adds an extra layer of security that drastically decreases your chances of account takeover. Two-factor authentication is essentially the using of two separate components to verify your identity, the combination of something you HAVE with something you KNOW. A good example of two-factor authentication you most likely are already used to is withdrawing cash from an ATM, for example. Having both your debit card AND knowing a pin number is required to complete the withdrawal and protect your identity.

    A popular and convenient two-factor authentication method is using a combination of both an online password and a text message verification sent to your phone. Enabling this type of authentication typically follows this process:

    1. Enter your password into Facebook or another website
    2. Immediately receive a text on your phone with a temporary pass key
    3. Enter the passkey received back on the site/app and you’re logged in

    This may seem like overkill, but enabling this two-factor authentication will drastically decrease the chances of your social accounts being hacked. And actually, the process of setting up and using this authentication is pretty simple and convenient.


    How to enable two-factor authentication:

    Many popular social networks like Facebook, Twitter, LinkedIN, and others already support two-factor authentication. To learn more about how to do so on the most popular sites on the web, be sure to check out this article:

  • Proactive Steps to Take in Light of Anthem Data Breach

    Sunday, February 15, 2015

    Chances are you are a person who has Anthem insurance coverage or you know someone who does. As a result, either you or your friend has a reason to be concerned.

    A typical data breach includes a compromise of debit card numbers or partial personal identifying information. This kind of breach, though inconvenient, can typically be ‘fixed’. An initial investigation indicates that the Anthem breach includes a compromise of name, birthday and/or social security number. This kind of information is all one needs to steal someone’s identity.

    According to Anthem this particular breach could affect up to 80 million people. Instead of trying to ignore this has happened or just being upset, it’s now time for you to be educated and try to protect yourself as best as you can. We have some tips that will help you accomplish that.

    1. Review Your Statements

    First, take a moment each month to view your eStatement or monthly statement. You can monitor your accounts throughout the month with Online Banking and the MutualBank App. Monitoring your accounts will give you the quickest opportunity to see if your accounts have been compromised. If you notice any transactions that are unfamiliar or questionable, please get in touch with your MutualBanker. Call us at 800-382-8031.

    2. Be Cautious with Any Anthem Emails You Receive

    Next, if you receive an email stating it is from Anthem, be cautious. Anthem’s website warns customers not to reply with information, click any links or open any attachments within the email. Anthem is not calling their customers and will not ask for information. Never give your credit card information, social security number, or other sensitive information to someone via email or over the phone.

    3. Consider Freezing Your Credit

    If you are a resident in Indiana, the Attorney General’s office website ( is offering and encouraging you to sign up for a free credit freeze with each of the three credit bureaus. A credit freeze places a hold on your credit where a new line of credit could not be obtained without you unfreezing your credit. This doesn’t affect already open credit lines like an existing credit card, yet helps to protect you against someone opening new lines of credit in your name.

    4. Keep in the Know

    Finally, try to keep in the loop on the Anthem Breach. The best source for current information about this breach can be found at Anthem’s Frequently Asked Questions. (

    MutualBank is here to help inform you of ways to help protect against identity theft. Thank you for trusting us.

  • A new wi-fi security risk that may affect you

    Saturday, January 24, 2015

    If you’re like most Americans, you probably access the internet most of the time from your home’s wireless network. While this is a nice convenience, having a router (the device that sends out the wi-fi connection signal) opens up some security vulnerabilities that you need to proactively protect against.

    Whether your internet service provider gives you a router to use or if you have your own, from time to time there can be different types of router-based vulnerabilities that emerge, potentially putting your browsing privacy and information at risk.

    A New Router Vulnerability: The Misfortune Cookie

     A new vulnerability has been discovered that affects a least 12 million home or small office routers called the Misfortune Cookie (CVE-2014-9222). This vulnerability can be exploited to give an intruder remote access to a home router and can be used to attack different devices that are connected to that router.

    If the attacker can exploit this Misfortune Cookie Vulnerability on your router, the attacker will now be in the middle between you and the internet. The attacker could see all information flowing in and out of that router. This could enable them to capture usernames/passwords, sensitive banking information, and many other types of highly sensitive information flowing though the router.


    What can you do about it?

    1. Check to see if your router model is on the vulnerability list:

    2. Check with the maker of your router to see if they’ve released an update that fixes the Misfortune Cookie Vulnerability.

    3. Enable a firewall
    A firewall is a software program or piece of hardware that helps screen out hackers, viruses that try to reach your computer over the Internet. Most operating systems that come with a PC or an Apple computer have firewall capabilities. Learn more here (

    4. Make sure there is an “https://” at the beginning of your browser’s address bar when visiting a site.
    This simply indicates that the site you are browsing has extra security protocols in place to protect your information shared on the site. This is especially important on sites where provide sensitive information (like your financial institution’s website or an online store).

    5. Update all of your software regularly and use an antivirus program
    Software programs also have potential to create security risks if they are not updated on a regular basis. Whenever there is an update for software you have, it’s always a best practice to install the update. The same goes for your antivirus software. Always make sure it’s up to date and running on your machine / device.

  • Six Financial Resolutions for 2015

    Tuesday, December 30, 2014

    When the New Year rolls around, we often focus our time and energy on resolutions relating to health and fitness. While these are worthy goals, taking a look at your financial habits is also something you should consider and could result in big payoffs.

    Better yet, setting and reaching financial resolutions may be easier to stick with. According to a recent study, 42% find it easier to pay down debt and save more for retirement than, say, lose weight or give up smoking. Among those who made a financial resolution last year, 29% reached their goal and 73% got at least half way there. Only 12% of resolutions having to do with things like fitness and health do not end in failure, other research shows.

    So make 2015 the year where you simplify your finances and develop healthier financial habits. Here’s 6 quick ways you can do so:

    1. Enroll for direct deposit & remote deposit

    If your employer offers direct deposit, be sure to take advantage of it. It eliminates unneeded trips to the bank and keeps your money working longer for you. Additionally, be sure to take advantage of a newer convenience, remote deposit, that allows you to deposit checks via simply taking a picture of it on your smartphone or tablet! Our mobile app offers that capability for you.

    2. Establish an automatic savings plan

    The odds are if you have money accessible and ready to spend, you will end up spending it. One way around this is to set up automatic saving from each paycheck. Regular, automatic transfers to a savings account will add up and will reduce the temptation to spend money on things you may not need.

    3. Pay bills electronically

    Eliminate the tedious task of writing checks and mailing them by utilizing electronic bill pay online! This is a great feature that financial institutions offer (including MutualBank) that allows you to designate payees, amounts to be paid, and dates payments need to be sent. With a few clicks, your bill payments will be sent in the mail, saving you the time of physically mailing a check yourself!

    4. Consolidate your financial relationships

    Dealing with one financial partner that has a complete view of your financial picture makes everything easier and comes with lots of benefits. And in our case, a unique benefit that we offer is loyalty pricing for current customers on select direct loans.

    5. Build a savings safety cushion 

    Having savings for unexpected expenses or life transitions like career switches can reduce a lot of stress and uncertainty about the future. Start to develop a financial cushion in 2015 for your peace of mind!

    6. Review your investments

    If you’re considering investing or have been for some time, it’s a good idea to meet with a financial adviser to review your strategy and investigate ways to better meet your financial goals. Be sure to consider MutualFinancial if you haven't already!

    Feel free to contact us or visit any one of our financial centers if you would want further assistance with any of these tasks!

  • 5 Easy Tips to Make Secure Online Purchases

    Monday, December 1, 2014

    Purchasing holiday gifts online curled up under a blanket and sipping hot chocolate sure beats braving the elements and shopping crowds sometimes.

    But with the added convenience of online shopping comes some increased risk of valuable information being stolen, such as credit card numbers or your account log in information for online retailers.

    With the holiday season and Cyber Monday upon us, here are 5 easy tips to keep in mind when making any online purchase:

    1. Make sure the device you are using is secure.

    Use an antivirus program that is set to automatically update. It is also a best practice to install all the latest updates of your operating system as well as updates to all programs you have installed. Apple, Microsoft, and other software providers regularly release updates to protect against all types of security risks.

    2. Make sure the wireless network you’re on is secure.

    Many public wireless networks offered by businesses, while convenient, are not always the most secure. When making a purchase online, make sure the network you are on is using some sort of security measure that requires you to enter a password to connect. The latest and most secure wireless network encryption is WPA2-CCMP. If the network is not secured, it’s best to purchase online from a secured network.

    3. Make sure the retailer’s website is secure.

    When shopping online, always look in the address bar for https:// at the beginning of a web address. The “s” used in “https” signifies an encrypted connection from your computer to the company’s webserver. This is used to pass sensitive data between the two devices and prevents criminals from snooping the contents of the information sent (credit card number, SSN, etc.).

    4. Use strong and unique passwords.

    If you’re like the majority of individuals, you probably have 2-3 passwords that you use for all of your online accounts. While these are easy to remember, this isn’t a best practice. If someone discovers your password(s), they now have access to many of your important accounts. We instead recommend using unique and strong passwords for all your online retailer accounts. Strong passwords generally contain a combination of upper and lower case letters, numbers, and special characters (!, #, *, etc.).

    5. Watch for phishing emails.

    During the holiday season, the amount of phishing emails sent out increases as many criminals seek to falsely represent retailers. If an email looks suspicious or asks for your account information, do not open it or click on any links inside of it. Additionally, the majority of retailers will never include attachments in their emails but phishing emails sometimes do so don’t open any suspicious attachments.

    Stay warm and stay safe this holiday season!

  • Interesting Facts About Computer Security

    Tuesday, August 5, 2014

    In light of the fun fact countdown we have been posting for our 125th Anniversary, our Information Security Department has put together a list of interesting facts about computer security. While they aren't "fun", they should give you an idea of how important it is to take proactive steps to protect you and your data!

    • The first recorded “hackers” were from 1878, only 2 years after the telephone was invented, a group of teenagers were running switchboards for telephones.  They were later fired because they were more interested on how the telephone system worked then making proper connections.  They tried to hack the system to see how it worked.
    • The largest data breach is history was in 2007 where at least 160 million credit and debit card numbers were stolen and a loss of around $200 million as a result.  Albert Gonzalez, one of the persons behind the data breach, was prosecuted and sentenced to 20 years in prison.

    • 3 out of 4 Americans will be a victim to cyber-crime.

    • Data breach investigations increased 54% from 2012.

    • The United States is number one in cyber-crime victims at a whopping 59%.  After that is the United Kingdom at 14%.

    • Retail is the top industry that has been compromised at 35% of all cyber-attacks.

    • The top malware hosting country is the United States at 42%.

    • The most exploited program for vulnerabilities is Java at 78% of all vulnerablities.

    • 85% of all exploits were third-party programs. 

    • The median number of days for a victim of cyber-crime to know they have been compromised is 87 days.

    • 31% of all compromises were a result of weak passwords.

    • The top 5 compromised passwords in 2013 were:

    - 123456
    - 123456789
    - 1234
    - Password
    - 12345

    • Spam still accounts for 70% of all inbound emails in 2013.

    • 58% of spam e-mail contains information about pharmaceuticals.

    • The top malicious e-mail subject line in 2013 was “Some important information is missing”.

    • The top 6 vulnerabilities

    - SQL Injection
    - Cross-Site Scripting
    - Use of Default Passwords
    - Configuration Issues
    - Weak Encryption Ciphers
    - Denial-of-Service

    • 100% of all mobile apps have had vulnerabilities in them ranging from low severity to critical severity.

    • 68% of mobile vulnerabilities create information leakage which is the highest of mobile vulnerabilities.

    • From 2008 until now, an estimated $1 trillion dollars of data was stolen around the world due to cyber-crimes.

    • In 2009 the world’s largest bot net, a large group of “zombie” computers, were run by Ukrainian gangs with a total of 1.9 million zombie computers from all around the world.

    • 5 cyber-criminals are on FBI’s most wanted list and are responsible for losses ranging from $350,000 - $100 million.

    • The United States loses around $100 billion a year due to cyber crimes.

    • More than 600,000 Facebook accounts alone are compromised every day.

    • 33.63% computers are affected by malware.

    - 78.92% are Trojans
    - 10.78% are worms
    - 7.44% are viruses
    - 2.69% are adware
    - 0.17% are other malware



  • 2014 MutualBank Summer Internships A Win, Win, Win

    Friday, June 27, 2014

    Do you remember that scene from The Office (the American version), where Michael Scott discusses conflict resolution methods and introduces the “Win-Win-Win” method? Here’s a refresher in case you need a laugh:

    Jokes aside, a win-win-win is the way we view our internship opportunities. It’s a win of course for the students who get valuable real-world work experience and build professional  relationships. It’s a win for MutualBank, as we gain access to bright, young talent that adds value to a variety of our departments. And finally, it’s a win for the college/university these students attend as internship opportunities provide a hands-on education not possible from the typical classroom.

    In the summer of 2014, that university is Ball State University. MutualBank has been privileged to enjoy a long-standing relationship with Ball State and its internship program. We’re thrilled that the opportunities we provide align with Ball State’s immersive learning initiative and to have an active, yearly role in it.

    This summer MutualBank has been pleased to welcome Alex Gorman, Nick Miles, Nick Plavchak, and Jake Sciaudone as interns. Below is a short description of each's job duties and quotes from their managers.



    • Alex Gorman - Information Security 
      Alex previously job shadowed with MutualBank earlier this year and it resulted in an internship opportunity this summer. Alex is winding down his studies and will be graduating very soon. “Alex has been a great addition to the Information Security department,” commented his direct supervisor. “His eagerness to learn and expand his knowledge base will serve him well in an IT career moving forward.“ 

    • Nick Miles - Human Resources
      Nick is a Marketing Major and a defensive end for the Ball State Football team.  He is assisting the HR department with some recruiting initiatives and internal marketing efforts.  Chase Batt, Assistant Vice President, Human Resources & Training, commented: “Nick has been a great addition to the MutualBank team this summer. He has created several internal marketing videos for our Wellness Program, Marketing department, and Human Resources department. We wouldn’t have been able to complete these videos so quickly without Nick’s assistance.”
    • Nick Plavchak - Deposits & Sales
      Nick is a Sales Major and plays offensive line for the Ball State Football team. Robin Timbrook, Vice President, Deposits and Sales, had this to say about Nick and his work:  “Nick has been a great addition and help to me personally and to our Sales Department. I have learned so much about Millennials and how they prefer to bank. Nick's been eager to learn and get involved in projects and I’m hopeful this experience will be one he can utilize in his continued professional career.”
    • Jake Sciaudone - Commercial Lending 
      Jake has extended his spring internship with us from earlier this year through this summer. Jake is a triple major in Economics, Finance, and Accounting. Reed Levitz, Senior Credit Analyst, Business Banking, who works with Jake frequently said, “Jake has enveloped himself in the mindset that it takes to be a critical thinker and produce results for the company.  He has an inquisitive mind that is essential in developing the knowledge base to be an effective commercial underwriter.”

    We very much appreciate all the hard work of our 2014 summer interns! We hope the experience has proved valuable and is a springboard to their continued growth and success. We have a hunch it will be!


  • Practices to Secure Your Android Mobile Device

    Friday, June 20, 2014

    Android-based phones currently account for 79% of the smartphone marketplace ( With that said, we wanted to share a few tips to keep your Android phone and its data secure. Just like a typical desktop computer or laptop, it’s smart to take active steps to improve its security and limit access to your important information if it’s hacked, lost, or stolen.

    Lock your phone after a few minutes of inactivity

    Using the screen lock feature on your phone is the first line of defense from a physical attack on your phone.  If your phone gets lost or stolen, the screen lock is there to slow down or stop an attacker from getting access to your data.  Typical lock choices are: 

    • Pattern  
    • Pin
    • Password


    Use device encryption 

    Do you remember those magic eye images - you know the ones you stare at trying to decipher what the image is behind the random and undecipherable pattern? Think of the process of data encryption similar to those images –  except that after data encryption, you’re the only one who can “see” the actual image beneath the surface. It essentially makes your data only readable by you. If your phone supports it, it’s a good idea to encrypt your phone’s operating system and storage to prevent unauthorized access of your data in the event your phone is lost or stolen. Remember to encrypt the external storage card also.  


    Do not jailbreak your device

    When you “jailbreak” or “root” your Android device, it means you are bypassing important security controls to gain full access to your phone’s operating system.  Rooting your phone often voids your warranty and can create additional security risks.


    Use antivirus

    Just like your personal computer, your smartphone is susceptible to virus, malware, and spyware attacks.  Antivirus products are not fool proof, but most have features that can snap photos of an attacker trying to break the screen lock, automatically scan your phone to find infections and delete them, locate your phone if lost, and much more.   Antivirus software can be downloaded in the Google Play store.  Here are a few top rated antivirus products for an Android smartphone.  Remember to enable automatic updates for your antivirus product.


    Keeping your phone up-to-date

    Keeping your apps and Android operating system up-to-date is essential to patch various vulnerabilities.  Enable automatic updates for all apps and operating system updates to stay current.


    Be cautious of connecting to open networks

    Public and other unsecured networks can be a dangerous place to connect your phone.  A cellular data connection is far more secure than an open Wi-Fi network.  


    Do not click on suspicious links and attachments

     Just like your computer, hacking/phishing attempts can be written to effect phones as well.  Only open web links and attachments from trusted sources to reduce your risk of compromise.


    Turn off unused features

    Bluetooth and NFC (near field communications) are good examples because they can dramatically increase your risk of unauthorized users in your physical vicinity gaining access to your data.  Turn features off when not in use.


    While no one tip listed above will keep your Android phone completely secure in itself, acting on all of them will give you the best chance to protect your phone and data when you need it the most (hacking attempts or a lost/stolen phone). Let us know in the comments below if you have any questions/comments about utilizing these tips! 


  • What exactly is a software vulnerability?

    Tuesday, May 20, 2014

    You may have heard recently about a major security vulnerability that was found in the Internet Explorer browser, specifically for those using it on the Windows XP operating system. This issue has since been addressed by Microsoft, but we thought we would provide you a more detailed understanding of what a vulnerability is and share some tips to protect your computer against them.

    What is a software vulnerability? 

    A software vulnerability is a flaw in an application that can be used in a certain manner by hackers to perform an unwanted action.   You may also have heard of vulnerabilities being referred to as security bugs.  These bugs are typically fixed by the software vendor in a short period of time after the vulnerability is made public by updating the affected software.  Almost all software is vulnerable at one time or another. 

    How are vulnerabilities exploited by hackers? 

    Hackers write software that takes advantage of the vulnerability making the application perform in an unwanted manner.  The hacker can deliver the malicious software to the victim by a number of mechanisms.  This is typically done by sending the victim an email that appears to be legitimate, but actually contains a link to an infected site.  If the victim clicks the malicious link in the email, their machine could become infected due to the vulnerable software on their machine. Hackers are constantly discovering and writing exploits for vulnerable software in an attempt to make money, gain notoriety, and steal confidential information.  

    Programs with Frequent Vulnerabilities 

    Java and Adobe exploits make up a large percentage of the total exploits available to hackers.  Java runs on approximately 3 billion machines worldwide. That’s a large attack footprint.  Java usually runs in the background and helps many applications function.  Adobe makes various products like Reader, Flash, Photoshop, Adobe AIR, and etc.  Most people have these programs installed on their machines.  Historically, these two companies release urgent security updates every few weeks.  

    Tips to Remember

    Two of the most important tips to remember when it comes to securing your computer are to:

    • Enable automatic updates for your operating system and applications
      Set your operating system, applications, and antivirus to check for daily updates. Below we’ve linked to some tutorials that show you how to enable automatic updates for your specific Windows operating system. Mac operating systems have automatic updates installed by default.

      From an application perspective, each program has its own settings regarding automatic updates. Most applications have updates installed by default or will alert you when an update is available, but it is best practice to ensure that all of your installed applications do have automatic updates enabled. You can do this most likely through the applications settings or preferences options.

    Automatic Update Tutorials:
    Windows XP, Windows Vista, Windows 7
    Windows 8

    • Use a good antivirus product
      We are unable to officially recommend a specific antivirus product, but Bitdefender and Avast are highly rated.  Remember that antivirus isn’t fool proof.  Typically, antivirus has about a 60-70% detection rate.  Also, Mac users should install an antivirus program as well. A common misconception is that Mac computers aren’t susceptible to viruses but that is a misnomer. They may be less likely to get viruses than PCs, but they are indeed still vulnerable.  

    It’s best to think of the security of your information in terms of layers.  Updating all your software is the first security layer.  Using an updated antivirus is the second layer of protection against an exploit. Employing this dual layered strategy will greatly reduce your risk to potential vulnerabilities.

    If you have any specific questions or thoughts, please let us know below!

MutualBank on Twitter

MutualBank on Facebook