Latest Financial News

Want a big screen TV for the Super Bowl? Buy now!

Wednesday, January 28, 2015 10:48 am

If you're looking to buy a big screen TV for the Super Bowl, there's no time like the present. Prices are now as low as they'll be in quite some time.

MutualBank Secure Login

MutualBank Online Banking


Have suggestions or topic requests? Let us know.

  • Interesting Facts About Computer Security

    Tuesday, August 5, 2014

    In light of the fun fact countdown we have been posting for our 125th Anniversary, our Information Security Department has put together a list of interesting facts about computer security. While they aren't "fun", they should give you an idea of how important it is to take proactive steps to protect you and your data!

    • The first recorded “hackers” were from 1878, only 2 years after the telephone was invented, a group of teenagers were running switchboards for telephones.  They were later fired because they were more interested on how the telephone system worked then making proper connections.  They tried to hack the system to see how it worked.
    • The largest data breach is history was in 2007 where at least 160 million credit and debit card numbers were stolen and a loss of around $200 million as a result.  Albert Gonzalez, one of the persons behind the data breach, was prosecuted and sentenced to 20 years in prison.

    • 3 out of 4 Americans will be a victim to cyber-crime.

    • Data breach investigations increased 54% from 2012.

    • The United States is number one in cyber-crime victims at a whopping 59%.  After that is the United Kingdom at 14%.

    • Retail is the top industry that has been compromised at 35% of all cyber-attacks.

    • The top malware hosting country is the United States at 42%.

    • The most exploited program for vulnerabilities is Java at 78% of all vulnerablities.

    • 85% of all exploits were third-party programs. 

    • The median number of days for a victim of cyber-crime to know they have been compromised is 87 days.

    • 31% of all compromises were a result of weak passwords.

    • The top 5 compromised passwords in 2013 were:

    - 123456
    - 123456789
    - 1234
    - Password
    - 12345

    • Spam still accounts for 70% of all inbound emails in 2013.

    • 58% of spam e-mail contains information about pharmaceuticals.

    • The top malicious e-mail subject line in 2013 was “Some important information is missing”.

    • The top 6 vulnerabilities

    - SQL Injection
    - Cross-Site Scripting
    - Use of Default Passwords
    - Configuration Issues
    - Weak Encryption Ciphers
    - Denial-of-Service

    • 100% of all mobile apps have had vulnerabilities in them ranging from low severity to critical severity.

    • 68% of mobile vulnerabilities create information leakage which is the highest of mobile vulnerabilities.

    • From 2008 until now, an estimated $1 trillion dollars of data was stolen around the world due to cyber-crimes.

    • In 2009 the world’s largest bot net, a large group of “zombie” computers, were run by Ukrainian gangs with a total of 1.9 million zombie computers from all around the world.

    • 5 cyber-criminals are on FBI’s most wanted list and are responsible for losses ranging from $350,000 - $100 million.

    • The United States loses around $100 billion a year due to cyber crimes.

    • More than 600,000 Facebook accounts alone are compromised every day.

    • 33.63% computers are affected by malware.

    - 78.92% are Trojans
    - 10.78% are worms
    - 7.44% are viruses
    - 2.69% are adware
    - 0.17% are other malware



  • 2014 MutualBank Summer Internships A Win, Win, Win

    Friday, June 27, 2014

    Do you remember that scene from The Office (the American version), where Michael Scott discusses conflict resolution methods and introduces the “Win-Win-Win” method? Here’s a refresher in case you need a laugh:

    Jokes aside, a win-win-win is the way we view our internship opportunities. It’s a win of course for the students who get valuable real-world work experience and build professional  relationships. It’s a win for MutualBank, as we gain access to bright, young talent that adds value to a variety of our departments. And finally, it’s a win for the college/university these students attend as internship opportunities provide a hands-on education not possible from the typical classroom.

    In the summer of 2014, that university is Ball State University. MutualBank has been privileged to enjoy a long-standing relationship with Ball State and its internship program. We’re thrilled that the opportunities we provide align with Ball State’s immersive learning initiative and to have an active, yearly role in it.

    This summer MutualBank has been pleased to welcome Alex Gorman, Nick Miles, Nick Plavchak, and Jake Sciaudone as interns. Below is a short description of each's job duties and quotes from their managers.



    • Alex Gorman - Information Security 
      Alex previously job shadowed with MutualBank earlier this year and it resulted in an internship opportunity this summer. Alex is winding down his studies and will be graduating very soon. “Alex has been a great addition to the Information Security department,” commented his direct supervisor. “His eagerness to learn and expand his knowledge base will serve him well in an IT career moving forward.“ 

    • Nick Miles - Human Resources
      Nick is a Marketing Major and a defensive end for the Ball State Football team.  He is assisting the HR department with some recruiting initiatives and internal marketing efforts.  Chase Batt, Assistant Vice President, Human Resources & Training, commented: “Nick has been a great addition to the MutualBank team this summer. He has created several internal marketing videos for our Wellness Program, Marketing department, and Human Resources department. We wouldn’t have been able to complete these videos so quickly without Nick’s assistance.”
    • Nick Plavchak - Deposits & Sales
      Nick is a Sales Major and plays offensive line for the Ball State Football team. Robin Timbrook, Vice President, Deposits and Sales, had this to say about Nick and his work:  “Nick has been a great addition and help to me personally and to our Sales Department. I have learned so much about Millennials and how they prefer to bank. Nick's been eager to learn and get involved in projects and I’m hopeful this experience will be one he can utilize in his continued professional career.”
    • Jake Sciaudone - Commercial Lending 
      Jake has extended his spring internship with us from earlier this year through this summer. Jake is a triple major in Economics, Finance, and Accounting. Reed Levitz, Senior Credit Analyst, Business Banking, who works with Jake frequently said, “Jake has enveloped himself in the mindset that it takes to be a critical thinker and produce results for the company.  He has an inquisitive mind that is essential in developing the knowledge base to be an effective commercial underwriter.”

    We very much appreciate all the hard work of our 2014 summer interns! We hope the experience has proved valuable and is a springboard to their continued growth and success. We have a hunch it will be!


  • Practices to Secure Your Android Mobile Device

    Friday, June 20, 2014

    Android-based phones currently account for 79% of the smartphone marketplace ( With that said, we wanted to share a few tips to keep your Android phone and its data secure. Just like a typical desktop computer or laptop, it’s smart to take active steps to improve its security and limit access to your important information if it’s hacked, lost, or stolen.

    Lock your phone after a few minutes of inactivity

    Using the screen lock feature on your phone is the first line of defense from a physical attack on your phone.  If your phone gets lost or stolen, the screen lock is there to slow down or stop an attacker from getting access to your data.  Typical lock choices are: 

    • Pattern  
    • Pin
    • Password


    Use device encryption 

    Do you remember those magic eye images - you know the ones you stare at trying to decipher what the image is behind the random and undecipherable pattern? Think of the process of data encryption similar to those images –  except that after data encryption, you’re the only one who can “see” the actual image beneath the surface. It essentially makes your data only readable by you. If your phone supports it, it’s a good idea to encrypt your phone’s operating system and storage to prevent unauthorized access of your data in the event your phone is lost or stolen. Remember to encrypt the external storage card also.  


    Do not jailbreak your device

    When you “jailbreak” or “root” your Android device, it means you are bypassing important security controls to gain full access to your phone’s operating system.  Rooting your phone often voids your warranty and can create additional security risks.


    Use antivirus

    Just like your personal computer, your smartphone is susceptible to virus, malware, and spyware attacks.  Antivirus products are not fool proof, but most have features that can snap photos of an attacker trying to break the screen lock, automatically scan your phone to find infections and delete them, locate your phone if lost, and much more.   Antivirus software can be downloaded in the Google Play store.  Here are a few top rated antivirus products for an Android smartphone.  Remember to enable automatic updates for your antivirus product.


    Keeping your phone up-to-date

    Keeping your apps and Android operating system up-to-date is essential to patch various vulnerabilities.  Enable automatic updates for all apps and operating system updates to stay current.


    Be cautious of connecting to open networks

    Public and other unsecured networks can be a dangerous place to connect your phone.  A cellular data connection is far more secure than an open Wi-Fi network.  


    Do not click on suspicious links and attachments

     Just like your computer, hacking/phishing attempts can be written to effect phones as well.  Only open web links and attachments from trusted sources to reduce your risk of compromise.


    Turn off unused features

    Bluetooth and NFC (near field communications) are good examples because they can dramatically increase your risk of unauthorized users in your physical vicinity gaining access to your data.  Turn features off when not in use.


    While no one tip listed above will keep your Android phone completely secure in itself, acting on all of them will give you the best chance to protect your phone and data when you need it the most (hacking attempts or a lost/stolen phone). Let us know in the comments below if you have any questions/comments about utilizing these tips! 


MutualBank on Twitter

MutualBank on Facebook