First Minnetonka City Bank

Report Debit Card Fraud 24 Hours a Day: (800) 472-3272

Contact Us (952) 935-8663

Mobile App Code: GoMobile0896

Toll Free (888) 935-8191


Security Tips |

  • Fraud Alert! Beware of Common Tax Scams
  • Tax season is upon us, a time of year when the scammers go into overdrive. Be extra careful while online, and avoid activities that could put your identity and finances at risk. It doesn’t matter whether you owe money to the IRS or are expecting a refund, as the scammers will target you regardless of your situation.
    > Read full article

  • 2021 Cyber Hot Topics – Ransomware
  • In response to the pandemic, many end-users are now working from home instead of commuting to their business locations. Homes are being used as business offices, and computers and networks are being shared by family members. Families are taking classes, doing homework, and surfing the web in addition to performing business functions.
    > Read full article

  • 10 Cybersecurity Shopping Tips for the Holiday Season
  • It’s that time of year again -- holiday shopping is in full swing! Even though the shopping insanity of Black Friday, Small Business Saturday, and Cyber Monday have come and gone, holiday shopping is still at the forefront of many consumers’ minds.
    > Read full article

  • Cleaning Out Your Old Data and Devices
  • Over the years, many of us have accumulated a mountain of CDs, hard drives, devices, online accounts, and other mediums that store information that are out there and unused.
    > Read full article

  • Staying Cyber-safe on a Summer Vacation
  • Reminders about 10 simple things bank customers can do to help protect their computers and their money from online criminals
    > Read full article

  • A Cybersecurity Checklist
  • Reminders about 10 simple things bank customers can do to help protect their computers and their money from online criminals
    > Read full article

  • Security and Privacy in the Connected Home
  • Did you ever wonder what it would be like to have smart home? You could remotely change the temperature in your house, you could tell your lights to come on, or ask your refrigerator if you need to get milk at the grocery store, all from your smart home device or smartphone. You could play video games and access all your streaming services from one device, or know who is at your door from your connected doorbell.
    > Read full article

  • Advanced Deception with BEC Fraud Attacks
  • Business Email Compromise (BEC) email fraud, also known as "CEO Fraud" or "Whaling", has become a major financial cyber threat, affecting businesses of all sizes globally. In such attacks a fraudster impersonates an executive of an organization to trick individuals in the organization into sending money or sensitive information.
    > Read full article

  • Want to keep your data? Back it up!
  • We all know it happens – computers crash, malware infects them, or somebody downloads that cool, new program that crashes everything! While there are many tips and tricks of great value for preventing your devices and data from being compromised, it is important to also have a backup of your information in case something goes wrong!
    > Read full article

  • Five Ways to be Cyber Secure at Work
  • Businesses face significant financial loss when a cyber attack occurs. Cybercriminals often rely on human error – from employees failing to install software patches to clicking on malicious links – to gain access to systems. From the top leadership to the newest employee, cybersecurity requires the vigilance of every employee to keep data, customers, and capital safe and secure.
    > Read full article

  • Reducing your Information Footprint
  • While spring cleaning your home and, if you’re like me, the top of your desk, consider also cleaning up your information footprint.
    > Read full article

  • Identifying and Reporting Common Scams
  • On July 6, 2017, the Federal Trade Commission (FTC) issued an alert on scammers posing as FTC officials who contact individuals and claim they have won prizes from a charity contest. The scammers ask for money to cover taxes or insurance costs associated with the prize. While this is a new malicious campaign, scammers use these basic tactics time and time again with slightly different wording to take advantage of unsuspecting individuals. It may seem like a day doesn't go by without scammers contacting you online or by phone seeking money and/or personal information. Since this is so commonplace, it is worth exploring how to identify these schemes, and how to go about reporting them in the event that scammers target you.
    > Read full article

  • Sun, Sand and Cybersecurity
  • School's out and the beach and mountains are calling. It is that time of the year when so many of us pack our bags and hit the open road or head to the airport for a well-earned vacation. We may be ready to take a break from our normal lives, but we still need to be cyber secure while we are enjoying our time off! In this month's edition, we will explore some ways to be safe and smart with our devices, Internet usage, and social media while out travelling on vacation.
    > Read full article

  • New Device? Check Your CyberSecurity!
  • In this month’s issue, we’ll focus on another aspect of the holiday season: that new device you get or give during the holidays. Whether it’s a smartphone, laptop, desktop, tablet, or another device, check out the below tips to help you protect your new technology and secure your personal data.
    > Read full article

  • Beware of Malware: Think Before You Click!
  • Malicious software — or “malware” for short — is a broad class of software built with malicious intent. “You may have heard of malware being referred to as a ‘computer bug’ or ‘virus’ because most malware is designed to spread like a contagious illness, infecting other computers it comes into contact with,” said Michael Benardo, manager of the FDIC’s Cyber Fraud and Financial Crimes Section.
    > Read full article

  • Protect Your “Cyber Home” With a Solid Foundation
  • Your home has locks on the doors and windows to protect your family and prevent thieves from stealing cash, electronics, jewelry and other physical possessions.  But do you have deterrents to prevent the loss or theft of your electronic assets, including bank account and other information in your personal computers, at home and when banking or shopping remotely online?
    > Read full article

  • Protecting Against Cybercrime
  • Below are some key practices you can use to help minimize your risk of being a victim:
    > Read full article

  • Follow these tips for securing your new computer or device
  • Below are some tips for protecting your new technology, securing your personal data
    > Read full article

  • Hacked! Now What?
  • If your computer system has indeed been compromised and infected with a virus or other malware, you need to take action to protect your data and prevent your computer from being used to attack others. > Read full article

  • Tax Identity Theft Protection
  • Tax identity theft happens when someone files a phony tax return using your personal information — like your Social Security number — to get a tax refund from the IRS. It also can happen when someone uses your Social Security number to get a job or claims your child as a dependent on a tax return.
    > Read full article

  • Important Customer Alert Regarding Recent “Heartbleed” Computer Vulnerability
  • Recently, there have been news reports about an OpenSSL vulnerability called “Heartbleed,” that could potentially compromise personal information. > Read full article

  • 2014 Cyber Security Outlook
  • As we look ahead toward the cyber threats facing us this year, some key challenges will result from the advancements in technology that are becoming part of our daily lives. Ranging from the Internet of Things to online currencies, devices and systems have never been more interconnected. Before we adopt these new technologies, we need to ensure we understand the security implications, and have appropriate layers of defense in place.
    > Read full article

  • Cyber Hygiene with the Top 20 Critical Security Controls
  • In this digital age, we rely on our computers and devices for so many aspects of our lives that the need to be proactive and vigilant to protect against cyber threats has never been greater. However, in order to be as secure as possible, we need to use good cyber hygiene – that is, making sure we are protecting and maintaining systems and devices appropriately and using cyber security best practices.
    > Read full article

  • FAQ on Security for Social Media
  • Social media websites allow people to collaborate and connect to share information and ideas. Essentially, these sites allow people to socialize in cyberspace.  Some are tailored to government and military employees. Facebook and Twitter are the most popular social media sites in the United States.
    > Read full article

  • Cyber Monday and Online Shopping Season: What You Need to Know to Protect Yourself
  • Online holiday shopping continues to grow in popularity. According to American Express, for the first time, more people are expected to shop online on Cyber Monday than visit brick and mortar stores on Black Friday.
    > Read full article

  • FDIC Consumer Newsletter Features Financial Tips for Seniors
  • Consumers face financial issues in their retirement years ranging from how to maintain their lifestyle and pay for medical expenses on a fixed income to avoiding scams that target the elderly. To help older adults make informed decisions and protect their assets, the Summer 2013 issue of FDIC Consumer News features a collection of articles entitled "Financial Tips for Seniors."
    > Read full article

  • Java Exploits
  • Java is a computer language that allows programmers and application developers to write software that can run on many different operating systems.  Many applications and websites require end-users to have Java installed.  Websites incorporate Java applets (small applications) to enhance the usability and functionality of a website.  In general, when a user visits one of these websites, depending on their browser’s security settings, they may have no idea that the Java applet is automatically running.
    > Read full article

  • Using Wi-Fi: Connect with Care
  • Whether you’re entertaining the kids by streaming a video on a tablet, downloading new travel apps on your smartphone or even taking your tablet poolside, there are precautions you should take to make sure your personal information is safe.
    > Read full article

  • Safe Mobile Banking: Our Latest Tips for Protecting Yourself
  • Using a smartphone, "tablet" computer or other mobile device to manage your finances can be convenient and help you monitor your money from practically anywhere. At the same time, it's important to take steps to protect your account information.
    > Read full article

  • Avoiding Scams: Sticking to the Basics Can Go a Long Way
  • There is plenty of information available to consumers to help avoid being a fraud or theft victim. "But some people complain that there is too much to remember and that being vigilant can be a daunting task," said Millie Spencer, a financial crimes specialist with the FDIC. Here's a short list of simple ways to avoid many financial crimes.
    > Read full article

  • Fraud artists may use the names of the FDIC and other government agencies
  • The Federal Deposit Insurance Corporation (FDIC) is reminding us that fraudulent correspondence claiming to be from the FDIC continues to be mailed, faxed and e-mailed in the United States and other countries.
    > Read full article

  • Remember to protect your personal information when shopping online.
  • Although the most common identity theft or account fraud comes from someone you know, online shoppers need to also be cautious about giving out personal information or leaving it where someone has access to it. By following some simple precautions, you can have a better online shopping experience and not place your personal information in jeopardy...
    > Read full article

  • Avoid Getting Hooked by a Phishing Scam
  • According to the Federal Trade Commission (FTC), the nation’s consumer protection agency, the upheaval in the financial marketplace may spur scam artists to phish for your personal information.
    > Read full article

  • ICBA and First Minnetonka City Bank Offer Tips for Travelers
  • Planning Ahead Can Help You Keep Your Money Safe

    With the kick off of summer many Americans are planning to hit the road or the skies for their much-anticipated summer vacation. The Independent Community Bankers of America (ICBA) and First Minnetonka City Bank want consumers to have the information they need before they leave home so they can keep their money safe.
    > Read full article


Learn More | Contact Our Personal Banking Specialists

Glen Lake: (952) 935-8663

14550 Excelsior Blvd.
Minnetonka, MN 55345
Hours & Directions

Country Village: (952) 935-5995

11500 Highway 7
Minnetonka, MN 55305
Hours & Directions


Report unauthorized activity

To report unauthorized activity or a lost or stolen Visa Debit Card, call (952) 935-5995 or (952) 935-8663 during our business hours. After hours, call (800) 472-3272.

Consumer Education


These tips are available so you can learn more about ways to save money, send your children to college, save for retirement, and more.

Learn more
Security Tips

Security Tips

Our security tips provide valuable resources to protect your personal identity, your banking account and more.

Learn more
For all life's moments, bank among friends.

Want to learn more?
Contact a banker or visit one of our convenient locations today!
(952) 935-8663

Yes Confirm
The Fair Housing Act prohibits discrimination in housing because of:

Enforce the Fair Housing Act and other civil rights laws to ensure the right of equal housing opportunity and free and fair housing choice without discrimination based on race, color, religion, sex, national origin, disability or family composition.

Major Goals

1. Reduce discrimination in housing by doubling the Title VIII case load by the end of 2000 through aggressive enforcement of civil rights and fair housing laws;

2. Promote geographic mobility for low-income and minority households;

3. Integrate fair housing plans into HUD's Consolidated Plans;

4. Further fair housing in other relevant programs of the Federal government; and

5. Promote substantial equivalency among state, local and community organizations involved in providing housing.