Update Browser for the full First Western experience.

It looks like you may be using Internet Explorer. For the best experience on our site, we recommend using the most recent version of Google Chrome, FireFox, or Microsoft Edge.

2020 Financial Markets Update

March Madness and Cyber Attacks

March 19, 2024

March Madness is an exciting time that brings diehards and casual fans together for a common goal: filling in the […]

Tips on Protecting Yourself from Frauds and Scams

February 27, 2024

Millions fall prey to fraud and scams each year, typically initiated through deceptive emails, text messages, or phone calls posing […]

Cyber Security Awareness During Tax Season

January 18, 2024

Cyber security awareness is essential in our day-to-day on-line activities however this time of year, as tax season is about […]

Online Shopping Safety

November 15, 2023

Since Covid, in-person shopping has significantly transitioned into online shopping. The risk of online scams has risen steadily year over […]

Illuminated you have mail icon stock photo

What Is Vendor Email Compromise (VEC)?

June 8, 2023

A new cyber threat that impacts individuals and organizations has developed, with financial transactions completed on digital platforms or by […]

Close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept

Protecting Yourself From Identity Theft

May 13, 2023

Identity (ID) theft is when someone uses your private information to commit fraud, typically for financial gain, without your permission. […]

African Woman Writing Check - Check Fraud Blog Article

Preventing Check Fraud

May 4, 2023

Check fraud is a rampant problem for financial institutions, businesses, and people that use checks. Checks often fall into the […]

Cyber Attackers Aimed at Customers

January 30, 2023

According to Akamai, a leading U.S. cybersecurity and cloud service provider, more than 80% of attackers are aiming their attacks […]

Blog photo for article titled

Tips to Keep Your Data Private Using Strong Passwords

December 29, 2022

Did you know that hackers utilize password dictionaries? These dictionaries contain commonly used weak passwords: is your password on this […]

Blog Photo for article titled

Using Checks in a Digital Age

December 10, 2022

Credit cards and other digital payment methods are so prevalent today that checks may seem like a relic of history. […]