Due to scheduled maintenance, ComputerLine and the Mobile app may experience intermittent outages between 5 a.m. and 9:30 a.m. on Sunday, August 25. We apologize for any inconvenience.

Your Wallet

It looks like your wallet is currently empty.
You may be interested in...

Totally Green Checking
Totally Green Checking
Classic Checking
Classic Checking
Open Your Wallet
Routing Number: 272479663 Swift Code: MSUCUS44
Open Your Wallet
Icon ImageIcon Image

Security News

We are dedicated to providing the highest caliber of security and data protection to our members and employees and diligently monitor and test our systems and processes for potential threats. We also follow security and privacy concerns happening in the industry and in the world, learning from them while remaining focused on our goal: protect sensitive information and minimize disruption to members.

Icon Image
MSUFCU has recently discovered new malware attempts that have been targeting members of financial institutions worldwide. As we approach the holiday season, malware threats become more common as the number of online purchase increases. To protect yourself, it is important to use and update antivirus software often.

Malware can be exploited if access to a computer is established. This happens through email attachments, links, pop-up advertisements, and other malicious add-ons. If exploited, these vulnerabilities could allow hackers unauthorized access to stored information, including usernames, passwords, and other sensitive information.

Members and employees can help defend against the vulnerabilities by being vigilant when clicking links in emails and pop-up advertisements on their personal devices.

What is Malware?
"Malware" is short for "malicious software" - computer programs designed to infiltrate and damage computers without the user's consent. "Malware" is the general term covering all of the different types of threats to your computer security such as viruses, spyware, worms, trojans, rootkits, and so on.

It has a wide-range of capabilities that include:
• Disrupting computer operation
• Gathering sensitive information
• Impersonating a user to send spam or fake messages
• Gaining access to private computer systems

Click here for an example of what Malware looks like.