Security Center

Privacy Statement
Online Banking Security
Designed and tested with and by industry experts, Chain Bridge Bank’s online banking state-of-the-art technologies will protect your information. Government regulators oversee all of our banking operations including online banking. In addition to these security measures, government agencies regularly audit our operations to ensure we comply with best business practices and the law.
About Security
At Chain Bridge Bank, we recognize security concerns and we are serious about security issues. In addition to our high security standards offline, we incorporate many security tiers into Chain Bridge Bank’s internet banking system. Every possible effort is made to ensure that your account information is protected from unauthorized access.
Multifactor Authentication
Multifactor authentication derives its name from the concept that a client can be identified by three factors: something he/she knows, something he/she has and something he/she is. Multifactor authentication uses these factors to identify the client when conducting financial transactions online. Multifactor Authentication is another innovative solution that enables banks to proactively protect their clients from Internet fraud and the related financial losses, and comply with the related regulatory requirements.
SSL and Firewalls
Chain Bridge Bank’s online banking is accessed through a Secure Socket Layer (or SSL). This means all data transmitted to or from our computer systems are encrypted using the most sophisticated security available to protect your money and privacy. Several firewalls exist to prevent unauthorized access to the system and to ensure your information is accessible only by using a correct Internet Banking ID and Internet Banking password.
Security Software on Processing System
Chain Bridge Bank’s online banking is a secure area. No one can view, obtain, or intercept information from this secure area without a proper Internet Banking ID and Internet Banking password. The "https" indicates that a secure connection has been made with the server.
Netscape Navigator: Upon entering www.chainbridgebank.com, users with older versions of Netscape will find a key in the lower left corner switching from broken to a complete key indicating a secure connection. On newer versions of Netscape a lock in the lower right corner will switch from open to closed. The key will remain complete or the lock will remain closed as long as you remain in Chain Bridge Bank’s website or if you log into your online banking with your user ID and user password.
Microsoft Internet Explorer: Upon entering www.chainbridgebank.com, users will find a completely closed lock in the lower right corner indicating a secure connection. The lock will remain closed as long as you remain in Chain Bridge Bank’s website or if you log into online banking using your user ID and user password.
Note: You may receive a message to change your browser settings when requesting a document from a secure area. Follow your browser instructions.
Protecting Information Online
It is very important that only you know your User ID and Password. This is the only way your account may be accessed. Three (3) unsuccessful attempts will lock out the User from accessing their account. If a user becomes locked out, a call must be placed to a Personal Banker at our McLean location.
Email Solicitation
Chain Bridge Bank does not solicit information (Social Security Number, account numbers, credit card numbers, passwords, etc) by means of email. If you receive an email requesting confidential information from someone claiming to represent Chain Bridge Bank, do not respond to the email. Please call any one of our representative to report any solicitation of this kind that you receive.
Automatic Log Off
After a ten-minute period of inactivity, the system will automatically log you off and force you to re-enter your User ID and Password.
Your Role in Security
- Choose a good password!
- You should carefully select a password that is hard to guess and never use a word that can be found in the dictionary.
- Memorize your password! Even the best password is worthless if it's written on a note attached to your computer or an entry in your checkbook.
- Don't share your Internet Banking password with anyone else. Your password is designed to protect the privacy of your banking information, but it will only work if you keep it to yourself. If you think your password has been compromised, change it immediately online and immediately contact the Bank. Call us at 703-748-2005 or send us a note using the tab labeled "Contact Us" near the bottom of our web page.
- Change your Login ID and password as often as you wish. (We recommend changing your password at least once each month.)
- Don't leave your computer unattended during a online banking session - click on "exit" to end your session.
- Once you have finished conducting your banking on the Internet, always sign off before visiting other Internet sites.
- If anyone else has access to your computer, clear your browser's cache in order to eliminate copies of Web pages that have been stored on your hard drive.
- Avoid using public Internet access terminals when conducting your Internet banking.
Important Note: While we continue to do everything possible to ensure the security of our system, we are not responsible for any breach of security that is outside of our control.
Email Solicitation
Lost or Stolen Card
How We Collect Your Information and Use Cookies
We or our service providers and other companies we work with may deploy and use cookies, web beacons, local shared objects and other tracking technologies for various purposes, such as fraud prevention and monitoring our advertising and marketing campaign performance. Some of these tracking tools may detect characteristics or settings of the specific device you use to access our online Services.
To help provide our Services, enhance your experience and collect information about mobile activity, we may place small data files on your computer or mobile device. These data files may be in the form of cookies, pixel tags, local shared objects or other similar technologies. Cookies and similar technologies enable us to personalize our application and Services for you. These technologies may allow us to store and manage your preferences and settings, measure and analyze how you use our Website and the effectiveness of our communications, offer services and help us improve our services and security.
- “Cookies” are small amounts of data a website can send to a visitor’s web browser. They are often stored on the device you are using to help track your areas of interest. Cookies may also enable us or our service providers and other companies we work with to relate your use of our online Services over time to customize your experience. Most web browsers allow you to adjust your browser settings to decline or delete cookies, but doing so may degrade your experience with our online Services.
- Clear GIFs, pixel tags or web beacons—which are typically one-pixel, transparent images located on a web page or in an email or other message—or similar technologies may be used on our Website and in some of our digital communications, such as email or other marketing messages. They may also be used when you are served advertisements or you otherwise interact with advertisements outside of our online Services. These are principally used to help recognize users, assess traffic patterns and measure Website or campaign engagement.
- Local shared objects, sometimes referred to as “flash cookies,” may be stored on your hard drive using a media player or other software installed on your device. Local shared objects are similar to cookies in terms of their operation but may not be managed in your browser in the same way. For more information on managing local shared objects, click here: https://helpx.adobe.com/flash-player/kb/disable-local-shared-objects-flash.html
- Most browsers provide you with the ability to block, delete or disable these technologies. If you choose to reject cookies or similar technologies, some Services may not be available or some functionality may be limited or unavailable. Please review your mobile device help pages for assistance with changing your settings.
Your IP Address is a number that is automatically assigned to the device that you are using by your Internet Service Provider (ISP). An IP Address is identified and logged automatically in our server log files whenever you visit our Website, along with the time of the visit and the page(s) that were visited. We use IP Addresses for purposes such as calculating Website usage levels, helping diagnose server problems, to personalize/tailor your experience while engaging with us online and offline, for compliance and security purposes, for advertising, and administering the Website.
IMPORTANT NOTICES ABOUT WIRE FRAUD - DON'T BECOME A VICTIM!
For Commercial Clients
This practice is referred to as Business Email Compromise. As a prospective or current commercial banking client, we want to raise your awareness of tactics fraudsters use and share
steps you can take to minimize your risk of becoming a victim. If you send a wire to a fraudulent party, recovering the wire is almost impossible. YOUR MONEY WILL BE LOST.
Impersonation of a high-level executive or owner of the business.
Email domains that are similar or an exact match to the real email address.
The email conveys a sense of urgency for the transfer.
The email references an unavailability for verbal confirmation or last-minute changes to original instructions.
Use two-factor authentication for fund transfers. Verify changes in vendor payment location by adding a secondary sign-off by company personnel.
Contact Chain Bridge Bank immediately upon discovering the fraudulent transfer: 703-748-2005.
Contact your local FBI office.
File a complaint at www.IC3.gov, the Internet Crime Complaint Center.
For Mortgage Applicants
stealing email addresses and sending fraudulent wire instructions to home buyers and
refinancers. As a prospective mortgage client, we want to raise your awareness of tactics
fraudsters use and share steps you can take to minimize your risk of becoming a victim. If you
send a wire to a fraudulent party, recovering the wire is almost impossible. YOUR MONEY WILL BE LOST.
Wire fraud emails are generally characterized by:
Email domains that are similar or an exact match to the real email address.
The email conveys a sense of urgency for the transfer.
The email references an unavailability for verbal confirmation or last-minute changes to original instructions.
Please follow these steps prior to processing any wire requests to either the title company, attorney, real estate broker or lender you are working with:
You will need to confirm the ABA/routing number, swift code and the account number.
Confirm requests for transfers of funds by calling the person that is requesting the wire. DO NOT use the phone number provided in the email request. Use the number you have on file or obtain the phone number from an independent third party source. Phone numbers can be found by searching the entity’s website or from your real estate agent.
Contact the wire department of the bank sending the wire to confirm the request.
What to do if you are a victim:
Contact Chain Bridge Bank immediately upon discovering the fraudulent transfer: 703-748-2005.
Contact your local FBI office.
File a complaint at www.IC3.gov, the Internet Crime Complaint Center.