Skip Navigation Documents in Portable Document Format (PDF) require Adobe Acrobat Reader 5.0 or higher to view,download Adobe® Acrobat Reader.
Lake Bank


We are proactively addressing concerns surrounding the coronavirus (Covid-19).  At The Lake Bank, the health and safety of our employees and our customers is our top priority.  Pandemics of this nature are unpredictable, and we have taken precautionary steps to reduce the spread of illness at our locations.

In the event that the pandemic worsens, The Lake Bank is prepared to execute our business continuity and pandemic response plans.  These plans ensure that essential bank operations and services remain functional and that we can continue to serve our customers and provide them access to their funds in the midst of a disaster or pandemic.
Our suite of online banking services allows customers to view their account information, deposit checks, transfer funds, pay bills, and perform other banking functions from their own homes or mobile devices 24 hours a day and 7 days a week.  If you're not already using our online banking services, we encourage you to enroll today.

Password Security Tips:

Choose a password that is unique to you. Don't use common words, your children's names or birthdates. Keep your passwords in a secure place and never share them!
Keeping your information secure is our number one priority! The Lake Bank will never email you requesting any of your personal information such as your Social Security Number, passwords, pins, account numbers, etc. We strongly suggest that you keep that information to yourself and not to share with anyone.

Be Aware of Phishing Scams

First and foremost you should utilize a spam filter (this service is should be provided by your email provider), keep all of your systems patched and your anti-virus software up to date.

The second line of defense against phishing is you. If you are vigilant, and watch for telltale signs of a phishing email, you can minimize your risk of falling for one.

Telltale signs of a potential phishing email or message include messages from companies you don’t have accounts with, spelling mistakes, messages from the wrong email address (e.g. instead of, generic greetings (e.g. “Dear user” instead of your name), and unexpected messages with a sense of urgency designed to prompt you into responding quickly, without checking the facts. “Resume” and “Unpaid Invoice” are popular attachments used in phishing campaigns.

Here are some scenarios you may encounter:

  • An email appearing to be from the “fraud department” of a well-known company that asks you to verify your information because they suspect you may be a victim of identity theft.
  • An email that references a current event, such as a major data breach, with a malicious link to setup your “free credit reporting.”
  • An email claiming to be from a state lottery commission requests your banking information to deposit the “winnings” into your account.
  • An email with a link asking you to provide your login credentials to a website from which you receive legitimate services, such as a bank, credit card company, or even your employer.
  • A text message that asks you to call a number to confirm a “suspicious purchase” on your credit card. When you call, the operator will know your name and account information and ask you to confirm your ATM PIN. (This is a form of SMSishing.)

  • Be suspicious of unsolicited emails, text messages, and phone callers. Use discretion when providing information to unsolicited phone callers, and never provide sensitive personal information via email.
  • If you want to verify a suspicious email, contact the organization directly with a known phone number. Do not call the number provided in the email. Or, have the company send you something through the US mail (which scammers won’t do).
  • Only open an email attachment if you are expecting it and know what it contains. Be cautious about container files, such as .zip files, as malicious content could be packed inside.
  • Visit websites by typing the address into the address bar. Do not follow links embedded in an unsolicited email.
  • Use discretion when posting personal information on social media. This information is a treasure-trove to spear phishers who will use it to feign trustworthiness.
  • Keep all of your software patched and up-to-date. Home users should have the auto update feature enabled.
  • Keep your antivirus software up-to-date to detect and disable malicious programs, such as spyware or backdoor Trojans, which may be included in phishing emails.