Mobile Banking with Mobile Money
Powerful mobile banking features delivered to your fingertips. You're too busy to run to the bank all the time; now manage your money with virtually any mobile device. Manage your accounts without affecting your schedule. View account balances, transaction history, transfer funds between accounts, pay your bills . . .anytime, anywhere!
Please be advised that by clicking on the links above, you are leaving Two Rivers Bank & Trust's website. Two Rivers Bank & Trust does not endorse or control the content of third party websites.
- Mobile banking from virtually any mobile device
- Available 24/7
- Safe and secure
- Check balances
- Mobile bill pay
- Text banking
- Locate a nearby ATM and branch
- View transaction details
- Transfer money between accounts
No personal or account information is stored on your mobile phone.
Contact us for more information about limitations and fees.
- Security & Tips
Mobile banking with Mobile Money delivers the highest level of security available with multiple layers of identity authentication. 128-bit encryption plus a personal password and phone activation code ensures the privacy and security of your information. No personal or account information is stored on your mobile phone.
Mobile Apps: How to Use Them Safely
The use of mobile applications (apps) is increasing in parallel with the use of mobile devices. According to the information technology (IT) research company Gartner®, "Worldwide mobile application store revenue is projected to surpass $15.1 billion in 2011 … and by 2014, over 185 billion applications will have been downloaded from mobile app stores."
The continued growth of mobile apps requires a spotlight on security. The risks include access to information, such as physical location or contacts lists, as well as the ability for apps to download malware, such as keyloggers or programs that eavesdrop on telephone calls and text messages.
Hackers are quickly learning how to harvest legitimate applications and repackage them with malicious code before selling/offering them on various channels. The Institute of Electrical and Electronics Engineers (IEEE), a global technical professional association, predicts that 2012 will see an upsurge in cellphone hacking through the use of mobile applications on smartphones.
What steps can users take to minimize risk when it comes to using mobile device apps? Here are a few tips:
- Make sure you actually need an app -- Every time you download an app, you open yourself to potential vulnerabilities. Only download those apps you deem necessary with the understanding of the risks involved.
- Be careful about which app store you use -- If you do decide to download an app, be aware of which app store you use. App stores have different standards for which apps they will offer to the public. Some app stores require apps to be put through rigorous testing first, while other stores accept all apps.
- Password-protect your mobile device -- Your mobile device should be protected with a strong password. Make sure that the passwords are not stored in your device. Do not enable the apps to remember your password for your device, and set your device to auto-lock after a few minutes.
- Learn how to remotely wipe your mobile device -- If your device has a remote wipe feature, you should enable it. If the device is lost or stolen, this will allow you to remotely remove all of your personal data and restore it to its factory settings.
- Do not use public Wi-Fi when performing financial transactions -- Most mobile devices can use both wireless Internet and a mobile provider's 3G or 4G network. Use only 3G or 4G networks for any secure transactions, such as banking.
- Be alert to changes in your mobile device's performance -- If you download an app and your device starts performing differently (for example: responding slowly to commands or draining its battery faster), this could be a sign that malicious code is present on the device.
- Update apps -- Update all apps when notified.
- Disable Bluetooth settings on your mobile device whenever it is not in use -- If left on, someone could potentially pair to your device and obtain information or take over your device.
- Follow your organization's policies -- If your mobile device is provided as part of your job, be sure to follow the rules and procedures established by your organization.
Resources for More Information
- Multi-State Information Sharing and Analysis Center
- Tips for safe use of geo-location apps
- National Cyber Security Alliance
If you have questions about the content of this newsletter or any general security-related questions, please contact Jeremiah Bristow, Director of Corporate and Information Security, at (800) 537-5427, ext. 4124, or email@example.com.
Security Tips provided by SHAZAM®
- Terms and Conditions
For your reference, please find our complete Terms and Conditions.
|Smartphone Apps |
iPhone, Android, Blackberry
|Mobile Web |
Web browser based features
|Mobile Text |
For all text enabled phones