May 15, 2017A message from our Assistant Vice President of IT

Using the most recent versions of Internet browsers and Operating Systems (OS) will ensure that your device is more secure and that you’ll be able to use the latest products and services from RSI Bank.
The 5 most popular browsers are Internet Explorer, Microsoft Edge, Google Chrome, Mozilla Firefox, and Apple Safari.  The most recent versions of these are as follows:

  1. Internet Explorer version 11.0.9600.18617
  2. Microsoft Edge Windows 10 build 16170
  3. Google Chrome version 57.0.2987.133
  4. Mozilla Firefox version 52.0.2
  5. Apple Safari version 10.0.1

 It is also important to note that Microsoft is no longer supporting Internet Explorer versions older than 11. 
The 2 most popular Operating Systems are Microsoft Windows and Apple macOS.  The minimum supported version of Windows is Windows 7.  Microsoft does not support anything older than Windows 7 (i.e. Windows XP).  The latest version of Apple macOS is OS X Sierra 10.12.4. 
The 2 most popular mobile devices and Apple iPhones and Google Android phones.  The latest Operating System for the iPhone is iOS 10 and for Androids is 7.0 Nougat.
If you’re unsure of the version of your Operating System, you should contact the provider (i.e. Microsoft, Apple or Google) to make sure your version is still supported.
Using outdated browsers and Operating Systems can increase your risk to hacking and malicious software.  When possible, automatic updates are easily the best way to ensure you always have the latest updates, which are generally released once a month.  It’s a good practice to check your update status from time to time so you can be sure your device is fully patched.


Not securing your own computer, or not updating it properly, can be a recipe for disaster. We encourage you to implement several security tips when you use our Online Banking services:

  • Always access your online banking account on the homepage. Never click on a link sent to you in an email.
  • Never give out your personal information through an email or over the phone. RSI Bank will never request that information in this manner.
  • Choose your User ID and password carefully – They should not be easy for others to guess (like your name or birthday, or your children's names and birthdays). Make sure to change your passwords on a regular basis.
  • Use a combination of letters, numbers, and symbols when creating a password.
  • Never reveal your password to anyone or leave your password in a place where someone else can obtain and use it.
  • Make sure you have a firewall in place when conducting your financial transactions.
  • Log out completely - Do not simply close your browser or use the back button to exit the site. Use the Exit button to end each Online Banking session and then close your browser.
  • Never leave an open session unattended. Your online banking session should be your only open internet window or tab.
  • Change your session timeout in User Options to a time that meets your needs.
  • Install an antivirus app on both your personal computer and your mobile device and keep it updated.
  • Always keep your computer and/or smartphone up to date.
  • Never access your Online Banking account from a public or shared computer.
  • Avoid installing Android apps from third-party websites or unreliable sources.
  • Read the permissions requested by every application before installing.
  • Perform regular backups of data stores on your smartphone.
  • Protect devices with passwords.
  • Don't view or share personal information over a public Wi-Fi network.
  • Balance your account and statements on a regular basis. Online Banking makes it easy!

RSI Bank strongly encourages our commercial customers to perform their own risk assessments and controls evaluations.

  1. Make a list of the risks related to online transactions that your business faces including: passwords being written down and left out in the open; the use of old or inadequate passwords; the possibility of internal fraud or theft; delays in terminating the rights of former employees; the lack of dual control or other checks and balances over individual access to online transaction capabilities.
  2. An evaluation of controls your business uses may include: Using password protected software to house passwords in; conducting employee background checks; initiating a policy and process to terminate access to former employees; segregating duties among two or more people so no one person has too much access or control; conducting internal or third party audits of controls; using firewalls to protect from outside intrusion or hackers.