Protecting your personal information can help reduce your risk of identity theft. There are four main ways to do it: know who you share information with; store and dispose of your personal information securely, especially your Social Security number; ask questions before deciding to share your personal information; and maintain appropriate security on your computers and other electronic devices. Click here to learn more.
Phishing is when someone uses fake emails or texts – even phone calls – to get you to share valuable personal information, like account numbers, Social Security numbers, or your login IDs and passwords. Scammers use this information to steal your money, your identity, or both. They may also try to get access to your computer or network. If you click on a link in one of these emails or texts, they can install ransomware or other programs that lock you out of your data and let them steal your personal information. Learn to identify phishing scams by clicking here.
Probably not. At least, not from the real SSA. But how many of you have gotten calls from someone who said they were the Social Security Administration? And maybe showed the real SSA phone number (1-800-772-1213) or a number close to it on your caller ID? Learn what to do in case you get one of these calls by clicking here.
When in need of tech support most people will search online for help. Your search online can lead you straight to scammers who will scare you into thinking your computer requires repair far beyond what is needed and sell you costly security sfotware. Learn how to avoid tech support scammers by clicking here.
There is a growing scam where people pretend to be from the Social Security Administration and try to get your Social Security Number or your money. Find out what one sounds like and how to protect yourself here.
Nearly every day scammers are finding ways to take your money. Learn how to protect yourself by knowing what to look out for by clicking here.
In the wake of the devastation caused by the recent hurricane activity this year, many websites have popped up offering to accept donations on behalf of the victims. Some of these websites claim that part of the donations go to certain groups or invoke the names of other well-known charities. Click on this link to learn how to ensure your money goes where you expect it to go.
Fake check scams have been around for years, yet they still continue to rob people of their money. Learn how a fake check scams work, and learn to protect yourself from becoming a victim by clicking this link.
Wi-Fi hotspots are popping up everywhere now but are often not secure. Protect your information by following the advice in this Federal Trade Commission article.
Are scammers using your devices as their virtual ATM? Protect yourself from having others use your devices to "mine" for cryptocurrency by following the advice from the Federal Trade Commission here.
If you ever question an email, let this chart guide you.
Phishing schemes involve people who seek to retrieve personal information from you, and whaling schemes are emails disguised as upper management wanting your account log in information. Read more about whaling and phishing.
SMiShing is a type of social engineering that uses cell phone text messages to persuade victims to provide personal information such as card number, CVV2 and PINs. The text messages may contain either a website address or more commonly, a phone number that connects to an automated voice response system, which then asks for personal information. Learn more.
Online dating can be fun and convenient, but falling for a sweetheart swindle can be costly. Be wary of "friends" you meet online who develop a relationship with you only to con you out of hundreds or even thousands of dollars. Read more here.
For your own safety please exercise discretion when using an ATM or night depository facility. Learn more.
If you have been a victim of identity theft, you should take action immediately. Find out how.
To protect your account, we monitor your ATM and debit card transactions for potentially fraudulent activity. If we suspect fraudulent ATM or debit card use, we will call you in order to validate the legitimacy of your transactions. Read more.
New technology comes out every day. Unfortunately, fraudsters are quick to take advantage of that technology and YOU! Use emerging technologies…but protect yourself from theft, fraud and scams. Find more information.
This tool is designed to assist commercial online banking customers in performing a simple information security risk assessment and controls evaluation. Click here to start the risk assessment.