Your Guide to Secure Banking
To receive alerts on your Debit Card purchases, log in and sign up for SMS alerts at alert.smsservicesnow.com.
What is Identity Theft?
Identity theft is the fraudulent acquisition and use of a person's private identifying information, usually for financial gain. It can happen to anyone and take many forms—opening accounts, taking out loans, or even filing taxes in someone else’s name for a refund.
Here’s What You Can Do
- Protect your Social Security number
- Fight “phishing” — don’t take the bait
- Use strong passwords and enable multi-factor authentication (learn more)
- Exercise caution on social media sites
- Use security software on your PC and mobile devices
- Review your financial and other statements regularly
- Regularly inspect your credit report
- Stop pre-approved credit offers (opt-out)
How to Protect Your Checks
Use pens with indelible black ink to make it more difficult for a criminal to “wash” your check.
Don’t leave blank spaces in the payee or amount lines.
Don’t write personal details (SSN, credit-card number, etc.) on checks.
Use mobile or online banking to access copies of your checks and ensure they are not altered. While logged in, review your bank activity and statement for errors.
- Review the images of paid items.
- Consider using e-check, ACH automatic payments, or other electronic/mobile payments.
- Follow up with the payee to confirm they received your check.
Common Scams
Online Shopping Scams
Scammers offer too-good-to-be-true deals via phishing emails or ads, taking payment and personal data without delivering the promised goods.
- Steer clear of unrealistic discounts or special coupons.
- Check the legitimacy of sites before entering payment details.
Social Media Shopping Scams
- Beware of gift-card or voucher promotions that require personal data.
- If you click an ad, verify the site’s legitimacy before sharing personal information.
Work-From-Home Scams
- Research any job offer site thoroughly—many are data-harvesting fronts.
Gift Card Scams
- During holidays, watch for requests to buy gift cards “for work” or “urgent needs.”
Charity Scams
- After disasters or year-end drives, confirm a charity’s legitimacy before donating.
- Avoid cash donations; use credit card or check for a record.
Reshipping Scams
Fraudsters buy goods with stolen cards and ship them to “reshippers” who unknowingly become money mules.
- Never accept packages from unknown senders or locations.
Tips to Avoid Being Victimized
- Check a retailer’s BBB rating (bbb.org).
- Research online reviews and complaints.
- Verify contact info on official “Contact Us” pages.
- Don’t click unsolicited email links; go directly to the site.
- Set up transaction alerts or review statements after purchases.
- Be cautious of email attachments—scan for viruses first.
- Use and update reputable antivirus software and firewalls.
- Never provide personal info via unsolicited email or calls.
Tips to Protect Yourself Against Cybercrimes
Avoid Phishing, Smishing, Vishing, and Other Scams
Criminals use fake emails, texts, and calls to trick you into revealing sensitive data. This section defines common scams so you can protect your money.
How Scammers Contact Their Victims
- If you use social media, limit personal info and only add people you know.
- Resist urgency—scammers fabricate emergencies to trick you.
- Search for info about offers and contacts; ask trusted sources if unsure.
- Never send money or personal info to unverified businesses; be wary of gift-card demands.
- Use reputable antivirus software and firewalls, and keep them updated.
- Disconnect and power down devices if you see suspicious pop-ups.
- Be cautious what you download; never open attachments from unknown senders.
Security Tip
What is Ransomware?
Ransomware is malware that encrypts files and demands payment for a decryption key. (See Protecting Against Malicious Code.)
How Does Ransomware Work?
It adds unique extensions (e.g., .locky, .cryptolocker) to encrypted files and displays ransom instructions. Paying doesn’t guarantee recovery.
How is Ransomware Delivered?
Commonly via phishing emails or “drive-by downloads” that run without your consent.
What Can I Do to Protect My Data and Networks?
- Back up files regularly and verify backups; restore from backups if infected.
- Store backups offline on external drives and disconnect after backing up.
- Provide cybersecurity awareness training and phishing simulations.
What Can I Do to Prevent Ransomware Infections?
- Keep operating systems and software fully patched. (Understanding Patches and Software Updates)
- Verify links before clicking; manually enter URLs when possible. (Using Caution with Email Attachments)
- Open attachments cautiously, especially compressed files. (Protecting Your Privacy)
- Verify email senders via trusted channels; avoid clicking links in emails.
- Stay informed about new threats; sign up for alerts from CISA and visit APWG.
- Use and update antivirus software, firewalls, and email filters. (Understanding Firewalls)
How Do I Respond to a Ransomware Infection?
- Isolate the infected system: remove it from networks and disable wireless, Bluetooth, and other connections.
- Power off and segregate infected and exposed devices to allow recovery of partially encrypted files. (Before You Connect a New Computer to the Internet)
- Secure your backups: ensure they are offline and scan with antivirus software before use.
What Do I Do if My Computer Is Infected with Ransomware?
- Home users: contact your local FBI office or U.S. Secret Service.
- Organizations: report incidents to your IT helpdesk or security office.
- All users: change all system passwords once removed. Submit files to CISA Malware Submission. (Choosing and Protecting Passwords, Supplementing Passwords)