Skip to content

Security and Fraud Prevention

In an increasingly digital world, safeguarding sensitive information and preventing fraudulent activities are paramount.

Whether you’re an individual concerned about personal data security or a business striving to protect your assets and customer trust, we offer the information below as a resource.

Security Red Flags

Urgency

Scammers often pressure you to act immediately. Watch out for 'limited time opportunities' or language that you 'must act now'.

Scare Tactics

Scammers will often threaten you with arrest, fines, audits, or other uncomfortable situations to trick you.

Odd Payment Methods

Asking you to pay by wire, with gift cards, or other uncommon methods can indicate a scam.

Seeking Personal Info

Banks, Financial Institutions and the IRS will never call you and ask for your personal information or passwords.

Money Up Front

Scammers will claim you need to pay money upfront to cover shipping, taxes, or other costs to receive a prize you 'won'.

Pretending to be Your Bank

If you receive a call from your bank that seems suspicious, hang up and call your bank on a known number.

Security Resources

Banks Never Ask That 

This site provided by the American Bankers Association features information on phishing scams, as well as quizzes and games to help you improve your scam spotting skills. 

Consumer Financial Protection Bureau

The CFPB ‘fraud and scams’ page contains resources to help you prevent, recognize, and report scams and fraud. 

Report Fraud With the FTC

To report fraud with the Federal Trade Commission, visit ReportFraud.ftc.gov

Annual Credit Report

Federal law allows you to get a free copy of your credit report every 12 months from each credit reporting company. Check them regularly to ensure that the information on them is correct and up to date.

 

Common Types of Scams

Phishing is a deceptive cyber-attack technique used by malicious actors to trick individuals into divulging sensitive information such as passwords, credit card numbers, or personal details.

Typically, phishing attempts are carried out through fraudulent emails, messages, or websites that appear legitimate, often mimicking trusted sources like banks, social media platforms, or online services. These messages often induce urgency or fear, compelling recipients to act quickly without verifying the authenticity of the request. Once a victim falls prey and divulges their information, it can be exploited for identity theft, financial fraud, or unauthorized access to sensitive accounts.

To combat phishing, awareness and vigilance are paramount. Individuals should scrutinize incoming emails and messages for signs of phishing, such as unfamiliar senders, unusual requests for personal information, or grammatical errors. Hovering over links before clicking to check their destination, rather than relying solely on embedded text, can also prevent falling victim to phishing links disguised as legitimate URLs.

By staying informed and cautious, you can mitigate the risks posed by phishing attacks and safeguard sensitive information effectively.

 
Smishing (a combination of “SMS” and “phishing”) refers to a cyber-attack where fraudsters use text messages (SMS) to deceive recipients into divulging sensitive information or clicking on malicious links. These messages often appear to come from legitimate sources like banks, government agencies, or well-known companies, prompting recipients to take urgent action.
 
Smishing exploits the immediacy and trust associated with text messages, tricking individuals into providing personal details such as passwords, credit card numbers, or login credentials. Sometimes, smishing messages contain links that, when clicked, lead to fake websites designed to capture sensitive information or install malware on the recipient’s device.
 
To protect against smishing, individuals should exercise caution when receiving unsolicited text messages, especially those that request immediate action or contain alarming statements. Avoid clicking on links or providing personal information unless you can verify the sender’s identity through an independent channel, such as calling the official customer service number listed on the organization’s website.
 

Additionally, installing and regularly updating antivirus software on mobile devices can help detect and mitigate potential threats from smishing attacks. Awareness and skepticism are crucial in defending against smishing tactics that exploit trust and urgency to compromise personal information and financial security.

Romance scams are a form of deception where fraudsters create fake personas on dating platforms or social media to establish romantic relationships with unsuspecting individuals. These scammers often build rapport over time, using flattering messages, emotional appeals, and promises of love or companionship to manipulate their victims.

Once trust is established, they may fabricate stories about financial hardships or emergencies, requesting money or personal details under false pretenses. Victims, driven by genuine feelings or empathy, may send money or share sensitive information, only to realize they have been duped when the scammer disappears or continues to make demands.

The emotional and financial impact of romance scams can be devastating. Beyond financial losses, victims often experience feelings of betrayal, embarrassment, and emotional distress. Scammers exploit vulnerabilities and emotional triggers to manipulate victims, preying on their desire for companionship and affection.

Prevention involves exercising caution when interacting with individuals online, verifying identities through video calls or additional means, and being skeptical of requests for money or personal information from new acquaintances. Education and awareness about the tactics used in romance scams are essential in protecting oneself and others from falling victim to these deceitful schemes.

Fraudsters often pretend to be someone else to scare you or earn your trust. They can then try to persuade you to share personal information or send them money. Imposter scams can start with a phone call, text, email, direct message online or even in person.

Fraudsters may pretend to be from the Government, IRS, police, a charity, or a well-known company whose products you use (Microsoft, Apple, etc.)

When presented with a questionable communication, it’s best to look up the organization the person claims to be from and contact them directly yourself. Any legitimate customer service employee or government agent will appreciate that you’re trying to be careful.

Scammers commonly contact you directly and say that you’ve won a prize of some sort. They could ask for your personal information (Social Security number, etc.) claiming that they need it to send you the winnings.

Likewise, they might claim that you need to send them a payment to cover additional costs (such as taxes or shipping) in order to claim your prize. They’ll ask for your bank or credit card information or ask you to wire them the money ‘So they can release your prize to you.’ Of course, there is no prize, and they take the money and run.

If you don’t remember entering a drawing or lottery, you more than likely didn’t win anything. It’s usually best to ignore messages about any sort of prizes or winnings, especially if they ask you for personal information or payment.

In today’s remote economy, fake work-from-home scams are increasingly common. The fraudster might ask you to complete an application, which is actually a ruse to collect your personal information. Likewise, you might be asked to submit a personal payment to cover office supplies or equipment, which they claim will be reimbursed in the future.

They also might send you money, claim that they accidentally sent too much,  and ask you to refund part of it. However, they’ll typically have you send them money using an irreversible payment method, and they will cancel their original payment to you.