Your Guide to Secure Banking

Discover essential advice on identity theft, scam avoidance, and account safety to help you bank confidently and securely.

To receive alerts on your Debit Card purchases, log in and sign up for SMS alerts at alert.smsservicesnow.com.

What is Identity Theft?

Identity theft is the fraudulent acquisition and use of a person's private identifying information, usually for financial gain. It can happen to anyone and take many forms—opening accounts, taking out loans, or even filing taxes in someone else’s name for a refund.

Here’s What You Can Do

  • Protect your Social Security number
  • Fight “phishing” — don’t take the bait
  • Use strong passwords and enable multi-factor authentication (learn more)
  • Exercise caution on social media sites
  • Use security software on your PC and mobile devices
  • Review your financial and other statements regularly
  • Regularly inspect your credit report
  • Stop pre-approved credit offers (opt-out)

How to Protect Your Checks

Use pens with indelible black ink to make it more difficult for a criminal to “wash” your check.

Don’t leave blank spaces in the payee or amount lines.

Don’t write personal details (SSN, credit-card number, etc.) on checks.

Use mobile or online banking to access copies of your checks and ensure they are not altered. While logged in, review your bank activity and statement for errors.

  • Review the images of paid items.
  • Consider using e-check, ACH automatic payments, or other electronic/mobile payments.
  • Follow up with the payee to confirm they received your check.

Common Scams

Online Shopping Scams

Scammers offer too-good-to-be-true deals via phishing emails or ads, taking payment and personal data without delivering the promised goods.

  • Steer clear of unrealistic discounts or special coupons.
  • Check the legitimacy of sites before entering payment details.

Social Media Shopping Scams

  • Beware of gift-card or voucher promotions that require personal data.
  • If you click an ad, verify the site’s legitimacy before sharing personal information.

Work-From-Home Scams

  • Research any job offer site thoroughly—many are data-harvesting fronts.

Gift Card Scams

  • During holidays, watch for requests to buy gift cards “for work” or “urgent needs.”

Charity Scams

  • After disasters or year-end drives, confirm a charity’s legitimacy before donating.
  • Avoid cash donations; use credit card or check for a record.

Reshipping Scams

Fraudsters buy goods with stolen cards and ship them to “reshippers” who unknowingly become money mules.

  • Never accept packages from unknown senders or locations.

Tips to Avoid Being Victimized

  • Check a retailer’s BBB rating (bbb.org).
  • Research online reviews and complaints.
  • Verify contact info on official “Contact Us” pages.
  • Don’t click unsolicited email links; go directly to the site.
  • Set up transaction alerts or review statements after purchases.
  • Be cautious of email attachments—scan for viruses first.
  • Use and update reputable antivirus software and firewalls.
  • Never provide personal info via unsolicited email or calls.

Tips to Protect Yourself Against Cybercrimes

Avoid Phishing, Smishing, Vishing, and Other Scams

Criminals use fake emails, texts, and calls to trick you into revealing sensitive data. This section defines common scams so you can protect your money.

How Scammers Contact Their Victims

  • If you use social media, limit personal info and only add people you know.
  • Resist urgency—scammers fabricate emergencies to trick you.
  • Search for info about offers and contacts; ask trusted sources if unsure.
  • Never send money or personal info to unverified businesses; be wary of gift-card demands.
  • Use reputable antivirus software and firewalls, and keep them updated.
  • Disconnect and power down devices if you see suspicious pop-ups.
  • Be cautious what you download; never open attachments from unknown senders.

Security Tip

What is Ransomware?

Ransomware is malware that encrypts files and demands payment for a decryption key. (See Protecting Against Malicious Code.)

How Does Ransomware Work?

It adds unique extensions (e.g., .locky, .cryptolocker) to encrypted files and displays ransom instructions. Paying doesn’t guarantee recovery.

How is Ransomware Delivered?

Commonly via phishing emails or “drive-by downloads” that run without your consent.

What Can I Do to Protect My Data and Networks?

  • Back up files regularly and verify backups; restore from backups if infected.
  • Store backups offline on external drives and disconnect after backing up.
  • Provide cybersecurity awareness training and phishing simulations.

What Can I Do to Prevent Ransomware Infections?

How Do I Respond to a Ransomware Infection?

  • Isolate the infected system: remove it from networks and disable wireless, Bluetooth, and other connections.
  • Power off and segregate infected and exposed devices to allow recovery of partially encrypted files. (Before You Connect a New Computer to the Internet)
  • Secure your backups: ensure they are offline and scan with antivirus software before use.

What Do I Do if My Computer Is Infected with Ransomware?