Open Mon-Wed & Fridays 9:30 AM to 5:00 PM, and on Thursdays 8:30 AM to 6:30PM

Rocky Credit Union Rates

Heloc As Low As Prime
5 Year Economy Mortgage 3.34%
5 Year Everyday Value Mortgage 3.40%
4 Year Closed Mortgage 3.04% 
Prime 3.45%
For more rates click here.  

Call 403-845-2861 to get all the benefits of our mortgages.
Posted Rates Effective January 18, 2018. Rates are subject to change without notice.


Practice safe social networking

Social networking sites like Facebook and Twitter are a great way to stay in touch with family, reconnect with friends, share news and photos and broadcast what's on your mind.

They're also a great way for cyber criminals to find out information about you. After all, most people provide a lot of personal details like where they work, who they're related to, when they're on holiday, their address and so on without giving it much thought – making it easy for just about anyone to learn what they want to know about you. 

Tips to keep your private information private

Fortunately, it's just as easy for you to protect yourself and enjoy the experience by keeping these social networking safety tips in mind:

  • Check out the privacy and security settings of your social network and use them to control who sees what. Most have default settings which likely provide more access than you'd like. You can adjust settings to the highest possible level to protect your information and control who can see personal details (rather than "everyone" or "friends of friends").
  • Read the privacy policy carefully. Sometimes the wording can be confusing and you may allow the site to use your information without realizing it.
  • Never include your phone numbers, email address, home address, work details, your child's school or any other personal information on your profile page.
  • If someone you don't know tries to "friend" you, ignore it. There's no way to be sure they are who they say they are.
  • Before you post pictures, think about whether or not they're appropriate or give away too much information about you. For example, does that shot of the family barbeque show your street name in the background? Can you see your car's licence plate in the photo of you beside it?
  • Avoid geotagging photos. Most smartphones and many digital cameras automatically attach the exact location where a photo was taken – and when you share it online, the geotag can give away your address or let criminals know that you're on vacation, which could make your home a target for break-in. Check the manual of your device to turn off geotagging, and remove geotags from older photos with photo editing software.
  • Remember the more personal information you provide, the easier it is for a hacker to access it and potentially steal your identity (or for other criminals, like stalkers or sexual predators, to learn more about you). It's always a good idea to be discreet.
  • Ignore links that look suspicious, even if they're from friends. Your friend may not be aware of it, which means the link could be part of a phishing scam or contain malicious software.
  • About those suspicious links – don't be fooled by links that say things like, "You have to see this!" Chances are it's a hoax and you'll probably spam your entire friend list.
  • Don't mention things like going away on vacation, big purchases or events that include your address in your status updates. You may also want to delete messages from friends who mention these things to avoid the possibility of someone robbing your home while you're away.
  • Always log out at the end of a session, close your browser and clear your cache. Here are examples of how to do this:
    • In Firefox, go to Tools > Clear Recent History
    • In Internet Explorer, Go to Tools > Delete Browsing History
    • In Chrome, go to the wrench icon in the top right hand corner. Under the Bonnet > Clear Browsing Data
  • Never include banking information – not even the name of your bank.
  • The only one who should know your username and password is you. Once you give them to someone, they have total control of your account and can say and do things that could impact you.
  • Set up a separate email address just for your social networks, and use unique passwords.

Kinds of scams on social networks

New scams pop up on social networking sites every day, promising easy money, freedom from a 9 to 5 job, and amazing boosts to your social status. While they look tempting, many of these offers turn out to be schemes to spread viruses and spyware. The best advice? Click with caution.

Here are some of the most popular scams to be aware of:

  • Clickjacking – using catchy headlines like "find out who's looking at your profile" to get you to cut and paste a link into your browser, which then infects your computer and spreads spam to your contact list.
  • Fake polls – links that take you to a page outside of the social network and often ask for your mobile number. These are probably scams. (Check your bill for racked up charges!).
  • Phishing – attempts to get your username and password and may even set up fake pages to get you to sign in.
  • Phony message – often messages from the social network that say "urgent".
  • Money transfer – requests to wire money to someone you may or may not know.
  • Fake friend request – accounts that are set up just to send out spam.
  • Fake page – sometimes set up as a front for clickjacking and phishing, offering prizes for forwarding to friends.
  • Fake apps – often a cover for phishing, malware, clickjacking or money transfer schemes. When you "Allow", spam is spread through your network.
  • Popular scams – contain a link with a fake software update that downloads malware that infects your computer, hijacks your online profile and spams your friends. Lottery scams and "Nigerian 419" are popular examples.

While all of these scams exist, it doesn't mean you have to be nervous about social networking. The most important thing is that you think things through and use your intuition when it comes to anything suspicious.

Tags: n/a

What is the IoT?

Many devices you use daily are connected to the internet. Not just smartphones and computers, but home appliances and systems, vehicles, TVs, portable electronics, and even wearable technology.

How the IoT affects your personal security

Many things connected to the internet send information about their use back to the manufacturer. They can also be hacked by outside parties. It's important to understand how to use the IoT without compromising your privacy or security.

Types of IoT technology

IoT in your home

Your entertainment, heating and cooling, and security systems (including baby monitors and toys) can be part of the IoT. But so can “smart” appliances in the kitchen, etc.

IoT on the move

It's not just smart phones. Wearable technology, like smart watches and fitness trackers, are common IoT wearables. Connected clothing, shoes, eyeglasses, and more may be coming soon.

Some cars and other vehicles are now connected to the internet. As well, cameras, gaming systems, pet trackers, and more.

How to recognize IoT devices

Many connected devices and appliances need to be set up using your phone or computer, and connected through Wi-Fi or Bluetooth.

Electronics that send you notifications for software updates are connected to the internet. As is anything that you can track or control through your smartphone or computer.

How to safely use the IoT

  • Understand what personal information is being collected and why it's needed before you buy IoT devices or download apps. 
  • Put IoT devices offline when not in use, particularly anything with a camera or microphone
  • If you can, set the privacy controls so you aren't sharing information you don't want to
  • Change the default username & password of your smart devices to secure your home network.

Learn to #ConnectSmarter with the IoT at

Tags: n/a

Banking and Finance


A lot of people now choose to skip bank lines and opt for the convenience of banking online. After all, you can pay bills, check payments and transfer funds from anywhere – even on your mobile phone.

While the benefits outweigh the risks, you can never be too safe when it comes to your financial information and protecting everything you've worked hard for.

How cyber criminals get your information

The most likely place a cyber criminal can get your financial information is from you. That's right – you may hand it right to an identity thief without even knowing it.

Cyber criminals know banks go to extreme measures to protect your financial information, and their chances of getting into these systems are slim. So they phish, spy and hack their way into your information from other sources, piecing together what they need to access your financial accounts. Once they're in, they can take out a loan, buy a car and even get a mortgage on a house.

How to ensure safe Internet banking and investing

Keep an eye on your accounts without worrying that anyone else is with these Internet banking safety tips:

  • Your first course of action is to choose strong passwords for your banking and online investing accounts and keep them private.
  • Look for the lock symbol on the website or "https://" at the beginning of the website address (the "s" means "secure") to be sure the site is encrypted.
  • Never allow "auto fill" or "auto-remember" of your password or personal information.
  • Double check that your anti-virus protection and web browser are both the latest versions. If your software offers the option of automatic updates, take it. It's the best way to keep up to date.
  • Use a firewall and make sure it's set to "on". For example, Windows Firewall is on by default on the latest version of Windows, but make sure it isn't turned off: open Windows Firewall by clicking the Start button then the Control Panel; in the search box type "firewall" then click Windows Firewall; in the left pane, click Turn Windows Firewall on or off.
  • As soon as you're done banking, close the browser window, clear the cache (delete your browser history) and disconnect from the Internet. Here are examples of how to do this:
    • In Firefox, go to Tools > Clear Recent History
    • In Internet Explorer, Go to Tools > Delete Browsing History
    • In Chrome, go to the wrench icon in the top right hand corner. Under the Bonnet > Clear Browsing Data
  • When you're banking online, never use public Wi-Fi or public computers
  • Remember that legitimate banks and businesses will never ask for your personal information in an email, so be suspicious if you get this request.
  • Beware of "packet sniffing" – if more than one browser tab is open at a time, packet sniffer programs can see all of the information passing over the network and can potentially monitor:
    • Which websites you visit;
    • What you look at on the site;
    • Who you send e-mail to;
    • What's in the e-mail you send;
    • What you download from a site;
    • What streaming events you use, such as audio, video and Internet telephony; and,
    • Who visits your site (if you have a website)
  • Always enter the website address in the browser yourself – never use a link.
  • Review your account activity regularly and get in touch with your financial institution right away if you notice anything strange.
  • Don't believe everything you read in online newsletters, investing blogs, or bulletin boards. Fraud artists often float false information and "hot tips" as part of their efforts to rip-off investors or manipulate the market for a particular security.
  • When in doubt, call your bank about suspicious messages. Some spammers use variations on a bank's name, so it may look legitimate even when it's not. Verify by phone and don't reply to a suspicious message or click on a link that's in it.
  • Read the Internet security guides offered by banks to stay up to date
  • Find out about phishing and be aware of the latest scams.
  • Always log out completely.
  • When disposing of an old computer or other device, be sure to erase all personal data.
  • Download software and erase the hard drive yourself or hire a professional to wipe the hard drive clean.

Things to keep in mind while banking on the go

Using your mobile phone to do your banking can be a convenient way to manage your finances from anywhere. Most banks now provide an app that makes it easy to access your information and complete transactions, but before you log on make certain of the following:

  • Is your wireless network secure? If you're picking up a wireless signal at a hotel for instance, you may not want to send sensitive information.
  • Is your mobile banking application actually from your bank? Be sure it's the real thing and not a copycat.
  • Have you installed anti-theft technology on your mobile device, and backed up your data?
  • Does your device automatically lock after a period of time? If not, it's a good idea to set this feature and use a strong password for your mobile device.
  • Have you stored your passwords and banking information (branch #, bank address) on your mobile device? If you lose your phone, this information would go with it.
  • Are all of your apps and device software current? Consider verifying an app's authenticity with your bank in person or on the phone.
Tags: n/a

Most Canadian Internet users feel vulnerable to online threats. And yet many people take risks online, such as opening email from an unknown source or not protecting personal information stored on a computer.

Take the time this October, during Cyber Security Awareness Month, to review your online safety practices. Cyber security matters to everyone, every day. You can do your part to make cyber space safer by taking the following simple steps.

1. Protect your identity

Use different usernames and passwords for different accounts. Make passwords harder to guess by combining letters and numbers, and change them regularly.

2. Turn on your firewall

Firewalls are the first line of defence: they block connections to unknown or phony sites and prevent viruses and hackers from accessing your computer. Your computer operating system has a firewall that can be turned on very easily.

3. Use anti-virus software

Install anti-virus software to prevent viruses from infecting your computer. This software should be updated regularly.

4. Block spyware attacks

Install anti-spyware software to prevent spyware from installing itself on your computer. This software should be updated regularly.

5. Install the latest operating system updates

Make sure that your applications and operating system (Windows, Macintosh, LINUX) are up to date.

6. Back up your files

Protect important files from viruses and physical damage such as flood and fire by regularly backing up your files on an external drive or removable media. Store it in a safe place.

7. Protect your wireless network

Wireless (Wi-Fi) networks are vulnerable to intruders if they are not protected once installed. Do this yourself, or ask an expert for assistance when you purchase a wireless router.

8. Delete emails from unknown senders

Never open emails or attachments from people you don’t know, and never follow any links to Web sites included in these emails. They might infect your computer with a virus or spyware. Delete such emails immediately.

9. Surf the Web safely

Be careful when sharing personal information such as your name, address, telephone number and financial information online. Check that Web sites are secure (such as when making online purchases) and that the privacy settings are turned on (such as when accessing or using social networking sites).

10. Get expert help

Call local police if you discover suspicious content online (such as child exploitation) or if you suspect computer crime, identity theft or a scam. If you need help maintaining or installing software on your computer, call a computer expert or a local supplier.

These tips are provided by Public Safety Canada.  Visit their website HERE for more info.



Tags: n/a

With the equifax breach that happened last week, here are some links for further information.

Tags: n/a

Fraud Facts 2017 pdf
 The Ultimate prevention against Fraud is knowledgeable cardholders;

• Sign up for MemberDirect Alerts.

• Keep your PIN confidential.

• Be aware of sticky terminals (shimmers & skimmers).

• Notify your Branch when travelling internationally.

Check out these Fraud Facts for 2017.$file/FraudFacts2017-Eng.pdf




“Shimmers” are the new “Skimmers”. Fraudsters have developed a smaller card reader that is installed quickly and discreetly while pretending to make a purchase or withdrawal. Once installed, the microchips on the shimmer records information from the chip cards, including the PIN. The information is then used to make fake cards. Your only clue may be a sticky card in the terminal. Watch this video clip for the full news story



Here are some best practices for protecting your information online. 

Internet Security

Through the use of various techniques and technologies, fraudsters trick unsuspecting
internet users into divulging personal and financial information.

Protecting Your Computer and Web-Enabled Devices
Internet banking provides convenient access to information and the ability to perform
transactions from home, work or other locations. Users must be aware that when you
communicate via the internet, other people and software can also communicate with your
device. An inadequately protected device can be accessed by an unknown party or malicious
software (malware) in a very short period of time, and without your knowledge.
To help reduce risk from damaging malware, we recommend diligent use of the following
security practices:

Computer, Laptop, and Tablet

Use a Firewall
When connected to the internet, users are particularly vulnerable to computer intrusions
and attacks because the internet connection provides "always-on" connection capability. The
likelihood of a malicious individual accessing your computer increases significantly the
longer your computer is on and connected to the internet. Remember – you can work offline
and only access the internet when you need it.
 Ensure your computing system has an up-to-date firewall to prevent others from
accessing your computer and your information through the internet.
 Always ensure your firewall is enabled and up-to-date.

Install Security Patches
Malware programs commonly target security gaps in operating systems such as Windows
and Android, and secondary software such as Oracle Java, Adobe Acrobat/Flash, and
Internet Explorer. Installing security patches is an important layer of security in addition to
the steps below.
 Configure operating system and secondary software to regularly install security
patches as soon as they become available, and consider removing secondary
software programs that you do not use.

Use Anti-Virus Software
Anti-virus software can protect you from "trojan horses" or other types of viruses, which are
programs that allow others to gain control of your computer system remotely without your
knowledge or consent. These programs are used to capture and transmit your personal
 Ensure your anti-virus software is enabled and configured to run daily updates and
regular virus scans.

Use Anti-Spyware
Spyware monitors internet surfing habits and collects personal information from the
computer. Typically, spyware is secretly installed and can be difficult to detect.
 Anti-spyware software can remove and detect spyware, but is most effective when
combined with a firewall and anti-virus software. Ensure your anti-spyware is
enabled and configured to run daily updates and regular spam scans.

Choose Unique Passwords
Choose passwords that are a minimum of eight characters long and include a combination of
letters, numbers, and special characters.
 Use a unique password for each login ID.
 Disable the web browser auto-complete function of your login IDs or passwords to
prevent others using your computer from having instant access.
 Keep your passwords confidential.
 Change your password regularly, especially if you might suspect it has been guessed
or seen by someone else.

Mobile Phones

Protect Your Password
Protect your data from theft - enable the auto-lock function of your mobile phone to ensure
that it locks after a short period of dormancy.
 Do not continue using the default factory password – customize your password
immediately using a minimum of eight characters including a combination of letters,
numbers, and special characters.

Update Your Operating System
Your operating system (OS) is specific to your device, with BlackBerry, Android, iPhone, and
Windows Mobile as examples of various OS. Check your mobile provider’s website regularly
for OS security updates specific to your device make and model, install security patches as
soon as they become available.
 Do not ‘jailbreak’ your device by trying to remove limitations imposed by the
manufacturer. This practice will disable or bypass security measures of your mobile
OS, making you vulnerable to malware and prevent your mobile from receiving
future OS upgrades.

Use Anti-Virus, Anti-Spyware, and Firewall Software
If available for your make and model, install this software on your mobile.
 Configure to run automatic updates and virus scans.

Download Apps Only from Trusted Sources
Apps that seem legitimate can contain malware or be used to collect your personal data for
gain. Beware of apps that provide little company, contact, or website information.
 Research app customer reviews and requested permissions carefully before installing
– if the data requested does not align with app functionality, do not install.

Avoid Connecting to Unknown or Non-Password Protected Wi-Fi Networks
Wi-Fi predators scan public networks for unsecured devices to target and infiltrate through
hacking and malware. Only connect to public Wi-Fi you know and trust, and are confident is
secure and password protected.
 Disable settings that automatically search for Wi-Fi networks.

Avoid Activating Bluetooth in Crowded or Public Areas
The moment you set your Bluetooth to discoverable, hackers within range can ‘see’ and
possibly hack your device - mobile viruses can also be spread through Bluetooth technology.
 Never connect to unknown, untrusted or suspicious Bluetooth sources and strangers,
and never accept files from these devices.
 Immediately delete lost/stolen Bluetooth device pairings from your remaining
Bluetooth devices to prevent data compromise.

Online User Tips
 Do not click links in unsolicited email – the link may take you to a counterfeit website
that will solicit your sensitive data, known as ‘phishing’ and cause malware infection.
 Never open MMS attachments from unknown or untrusted sources - even if they
purport to be coming from your credit union or mobile provider.
 Delete unsolicited email or text messages without opening.
 Be aware of ‘evil twin’ Wi-Fi hotspots that bait unsuspecting users by impersonating
legitimate networks - always confirm you are connecting to the correct network.
 Store only data that your require on your mobile and erase everything else.
 Watch for signs of mobile infection: sudden unexplained increase in your phone bill;
unexplained messages in your email and social network ‘sent' folders, unexplained
user interface change you didn't initiate. Contact your device manufacturer or service
provider for instructions to remove malware if you suspect your mobile is infected.
 Verify the legitimacy of free apps, software, tools, online services before you use
them – research in your search engine and scan the results.
 Do not click on pop-ups windows that say “you're a winner if you click here" – these
can lead to spyware and malware downloads.
 Be wary of ‘freeware’ or free services online – even innocent looking screen savers,
fun cursors and Internet pets can be contain hidden malware.
 Do not forget to log off.

Tags: n/a

Cheque Cashing/Online Classifieds/Money Transfer Job Scams

Scenario 1

When you try to sell services or products online, or after seeing your resume posted online, fraudsters may contact you. They will offer you the asking price for your services or products but when you receive the cheque, it is more than the agreed amount. The "buyer" says it's a mistake and asks you to return the balance using a money transfer service.

Scenario 2

If fraudsters contact you to offer you the opportunity to work as a "secret shopper", the job might be to test the services of a cheque-cashing or a money transfer company. The offer usually contains a cheque along with instructions for you to cash the cheque and transfer a portion of the sum over a money transfer service.


  • Beware if you find yourself in either scenario. If you cash the cheque and it turns out to be fraudulent, you could be held accountable for the entire monetary loss by your bank.


  • When you receive the cheque for the services and products, return it and simply ask the "buyer" to send another one with the correct amount.
  • The Bureau is unaware of any legitimate organizations using the said technique of employment. Beware when being approached to transfer money.
Tags: n/a

Emergency scams target grandparents and play upon their emotions to rob them of their money.
In the typical scenario of an emergency scam, a grandparent receives a phone call from a scammer claiming to be one of his or her grandchildren. Callers go on to say that they are in some kind of trouble and need money immediately. They claim to have been in a car accident, are having trouble returning from a foreign country or they need bail money.
You may get a call from two people, one pretending to be your grandchild and the other pretending to be either a police officer or a lawyer. Your “grandchild” asks you questions during the call, getting you to volunteer personal information.
Callers say that they don’t want other family members to find out what has happened. You will be asked to wire some money through a money transfer company. Often, victims don’t verify the story until after the money has been sent.
In some cases, scammers pretend to be your old neighbour or a friend of the family, but for the most part, the emergency scam is directed at grandparents.
Protect Yourself
Scammers are counting on the fact that you will want to act quickly to help your loved ones in an emergency.
Never send money to anyone you don’t know and trust. Verify the person’s identity before you take any steps to help.
Don’t give out any personal information to the caller.
Does the caller’s story make sense?
Tags: n/a

Contact Rocky Credit Union

5035 49 Street
Rocky Mountain House AB  T4T 1C1

P    403 845 2861
F    403 845 7295

Connect With Us

Watch us on Youtube Find us on Facebook

RCU Wealth Management Services : Trust, respect, honesty, great service, helpful, good advice.

Rocky Credit Union: mortgages, loans, financial, plan, lending, invest, investment, rates, interest, deposit, saving