Identity Theft
Identity theft is one of the fastest-growing crimes. You can help protect yourself by following a few important steps.
- Never give your personal information over the phone, through the mail or over the internet. Only do so if you have initiated the contact or are certain you know who you are dealing with.
- Change passwords often and always choose a strong password. Strong passwords are typically long (12 characters is the current recommendation) and contain both numbers and symbols. They should not reference common words or use a string of keys on the keyboard.
- Use a different username and password combinations on different websites, especially those that provide access to financial or other confidential personal information.
- If you are not sure that a contact is valid, contact the company yourself - either by phone, in person or online. Visit the company's website by typing in the web address yourself. Be cautious when using search engines to find a web page. Double-check the address of where you are being directed.
- Do not have your Personal Identification Numbers (PINs) on hand - memorize them and keep them in a safe, secure location.
- Make sure all online purchases are from a credible store. Check reviews and monitor your account. Also, for better protection - pay with a credit card.
- Review account statements routinely to make certain that all charges are legitimate. If your statement is delayed in arriving, call your financial institute to find out why. Take advantage of Online Banking to review activity online and identify any suspicious activity. Also, sign up for
- Account Alerts through online banking.
- Review your credit report on an annual basis.
- Tear or shred all personal financial documents that you no longer need.
- Keep your Social Security card in a safe place and only give out the number when necessary.
- Never leave your laptop, tablet PC, or cell phone unattended.
- Make sure to use a password for startup on your computer, tablet, cell phone and other like devices.
- Encrypt sensitive data on your devices to help prevent data theft if the device is lost or stolen.
|
Social Engineering Scams
Social engineering scams can be done over the phone, text, email, paper or even done face-to-face. To protect yourself, stay aware of what type of scams are out there and keep personal information private.
- Account Takeover - Criminals can gain control of a victim's bank account by stealing the victim's online banking credentials, most commonly through malware.
- Baiting - This is when something of value is used to entice a victim to click a web link, which may then infect the user’s system with malware.
- Email Account Takeover - Scammers can hack into accounts and take over your email account. If you receive an email that seems out of place or suspicious, contact the account's owner through a different form of communication to confirm it is them or to make them aware of the takeover.
- Fake Checks - Scammers search newspapers and online advertisements for items for sale or needing employment. The scammers then send the victim a fraudulent check over the listed price. This check is either from an account that is not their own or a check that is no good and then requests for the victim to send them a check for the difference. Just because a check has funds available does not mean that the check has cleared.
- Fraudulent Emails - These emails are intended to look like they are coming from people or places you know when they are either fake contacts or contacts you have whose accounts have been taken over.
- Malware - Malicious software like viruses, spyware, and Trojans, intended to steal your personal information or obtain access to your system.
- Phishing - When an email directs a customer to click a web link and tries to deceive the user into submitting login credentials or other personal information.
- SMSishing - Scammer takes on a false identity through texting in an attempt to scam the user into surrendering private information that will be used for identity theft. The text will usually request the user to call a number or click to access a web page.
- Spam - Junk mail that can have links or attachments that can deliver malware, phishing or other threats.
- Spoofing - When false information is given to you to look like something else (ex: caller ID looks like a contact other than who it is or a link that directs you somewhere other than intended).
- Vishing - Scammers take on a false identity on the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
|
ATM Skimming
ATM skimmers are essentially card readers that grab the data off of the card's magnetic stripe. These skimmers are attached to the real ATMs so criminals can gather data from cards used at that terminal. Most ATM skimmers are small and fit over the existing card reader. Many times a hidden camera is also placed somewhere in the vicinity with a view of the number pad to record PINs. To protect yourself from ATM Skimming you should:
- Check for tampering of the machine -Are there multiple materials and colors? Do things look out of place? A card reader placed over a legitimate card reader may obscure lights, arrows or other visual indicators. If the keyboard feels too thick, a PIN-snatching overlay may be installed.
- Be cautious when using an ATM - Make sure that you are covering the PIN-pad with your free hand when entering your PIN.
- Look for anything on the machine that is loose or out of place.
If something does not feel right about the machine, do not use it and contact the bank or local authorities. If you think that you have been a victim of an ATM skimmer, report it to the bank immediately.
|
Trending Scams
- Be cautious of work-at-home scams, sudden riches, rental schemes, overpayments, romance scams, scammers pretending to be distressed family members and foreign business offers.
- Do not let pressure from a scammer influence you into making a hasty decision.
|
Check Fraud
- Check fraud can involve counterfeit checks, altered checks, and interception of incoming or outgoing checks.
- Internal employees may also engage in check fraud.
|
How to Report Fraud
- Keep records of fraudulent transactions.
- Notify creditors and financial institutions in writing and by phone.
- Report the crime to your local police and the FTC.
- Contact the credit bureaus to place a fraud alert on your credit report.
- For further assistance, please contact us at (414) 475-1690.
|
Online Security Terms
- Altered Checks: Legitimate checks that have been tampered with to change the recipient or the amount, making them fraudulent.
- ATM Skimming: A method where criminals install devices on ATMs to capture data from the magnetic stripe of bank cards, often accompanied by hidden cameras to record PINs.
- Baiting: A social engineering technique where scammers use enticing offers to trick victims into taking actions that lead to malware infection.
- Check Fraud: The act of using fraudulent checks, which can be counterfeit (fabricated), altered (modifying details on a legitimate check), or obtained through illegal means, to defraud individuals or organizations.
- Counterfeit Checks: Checks created to resemble legitimate ones, often used for fraudulent financial transactions.
- Foreign Business Offers: Scammers pose as businesspeople or government officials, promising large sums of money for participation in questionable business ventures.
- Fraud Alert: A notification placed on a credit report to alert creditors and financial institutions to potential fraudulent activity, prompting them to take extra precautions when verifying identity.
- Identity Theft: The fraudulent acquisition and use of an individual's personal information, such as name, Social Security number, or financial account details, typically for financial gain.
- Malware: Malicious software designed to harm or gain unauthorized access to a computer system. Types include viruses, spyware, and Trojans.
- Overpayments: Scammers send excessive payments, often in the form of checks, and request victims to send back the overpaid amount, which is usually a ruse.
- Phishing: A deceptive practice where cybercriminals attempt to trick individuals into revealing personal information or login credentials by posing as a trustworthy entity in emails or messages.
- Rental Schemes: Fraudulent schemes involving rental properties where scammers ask for money under false pretenses.
- Romance Scams: Scams where individuals are deceived into online romantic relationships, which are then exploited for financial gain.
- SMSishing: A form of phishing carried out via text messages, where scammers attempt to deceive individuals into providing personal information or clicking on links that lead to malicious websites.
- Spam: Unsolicited and often irrelevant or inappropriate messages sent over the internet, typically for advertising purposes but can also contain malicious content.
- Spoofing: The act of altering information or disguising one's identity to appear as something or someone else. For example, email spoofing may make an email look like it comes from a known contact.
- Spyware: Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- Sudden Riches: Scammers claim individuals have won a foreign lottery or sweepstakes to trick them into sending money or personal information.
- Trojans: A type of malicious code or software that can take control of your computer. It is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network.
- Vishing: A voice phishing scam that involves scammers impersonating trusted entities over the phone to obtain sensitive information.
- Work-at-Home Scams: Deceptive schemes that promise easy income for remote work, often requiring upfront payments or revealing personal information.
|
|