If you ever question an email, let this chart guide you.
Phishing schemes involve people who seek to retrieve personal information from you, and whaling schemes are emails disguised as upper management wanting your account log in information. Read more about whaling and phishing.
SMiShing is a type of social engineering that uses cell phone text messages to persuade victims to provide personal information such as card number, CVV2 and PINs. The text messages may contain either a website address or more commonly, a phone number that connects to an automated voice response system, which then asks for personal information. Learn more.
If someone you don’t know wants to pay you by check but wants you to wire some of the money back, beware! It’s a scam that could cost you thousands of dollars. Read more here.
Online dating can be fun and convenient, but falling for a sweetheart swindle can be costly. Be wary of "friends" you meet online who develop a relationship with you only to con you out of hundreds or even thousands of dollars. Read more here.
For your own safety please exercise discretion when using an ATM or night depository facility. Learn more.
If you have been a victim of identity theft, you should take action immediately. Find out how.
To protect your account, we monitor your ATM and debit card transactions for potentially fraudulent activity. If we suspect fraudulent ATM or debit card use, we will call you in order to validate the legitimacy of your transactions. Read more.
New technology comes out every day. Unfortunately, fraudsters are quick to take advantage of that technology and YOU! Use emerging technologies…but protect yourself from theft, fraud and scams. Find more information.
Social engineering is the art of manipulating people so they give up confidential information. Click here to learn about different types of social engineering.
This tool is designed to assist commercial online banking customers in performing a simple information security risk assessment and controls evaluation. Click here to start the risk assessment.