Skip to main content
_FB_2018-Icons-finalized-cleaned-up_new_FB_2018-Icons-finalized-cleaned-up_newGroup 9
Back
Scroll to top

Fending Off Fraud Articles

Financial fraud protection requires diligence — know the red flags to look for.

Learn About Fending Off Fraud

Read these articles to learn about the latest scams and safety measures to protect your accounts from financial fraud.

All Budgeting and Goals Credit: Score and More Family Finances Fending Off Fraud Invest, Invest, Invest Paying Off Debt Personal Finance 101 Homeownership Retirement Filing Your Taxes Student Loans For Teens
Image for tile. How To Avoid Scams After Weather Emergencies and Natural Disasters Potential Scam Scenarios Scammers use a variety of tactics to exploit people during the aftermath of disasters. Here are some of the most common scams to watch out for: 1. Imposter Scams Scammers often pose as safety inspectors, government officials, or aid workers, claiming they are there to help. They may ask for sensitive information or upfront payments for services, such as inspections or applications, that are usually provided for free by legitimate organizations. 2. FEMA Impersonators One common scam involves individuals impersonating FEMA (Federal Emergency Management Agency) representatives. They may offer to help you with your FEMA application but will charge an upfront fee, which is not a part of any legitimate FEMA process. FEMA does not charge for applications or assistance. 3. Home Improvement and Debris Removal Scams After a natural disaster, many people need repairs to their homes or businesses. Scammers may pose as contractors offering quick debris removal or repairs but will often demand large sums of money upfront or perform subpar work, leaving victims with little recourse. They may also disappear after taking payment, leaving your property in worse condition. Recognize the Signs of a Scam While scammers can be clever, there are warning signs that can help you spot fraudulent behavior. Keep an eye out for these red flags: No Licensing Required: Scammers may claim they don’t need a license to do the work, which is false. Legitimate contractors should always have a valid license and insurance. Pressure to Sign a Contract Immediately: Scammers often offer a “discount” or say they can only fit you in if you sign a contract on the spot. This tactic is meant to pressure you into making a decision without careful consideration. Signing Over Your Insurance Check: If a contractor asks you to sign over your insurance claim check, beware. This can leave you vulnerable if the work is incomplete or of poor quality. Full Payment Upfront: Asking for full payment before any work is completed is a big red flag. Reputable contractors typically ask for a partial deposit, with the balance due upon completion of the work. Unusual Payment Methods: If someone asks you to pay by wire transfer, gift card, or cryptocurrency, it’s likely a scam. These payment methods are difficult to trace and recover if the contractor disappears. Ways to Avoid a Scam Protecting yourself after a natural disaster requires both awareness and due diligence. Here are steps you can take to reduce the risk of being scammed: 1. Know that FEMA Doesn’t Charge Application Fees FEMA provides disaster assistance for free, and they never charge for processing your application. If someone asks for money to help you qualify for FEMA funds, it’s a scam. Always verify through FEMA’s official website or hotline to ensure you’re dealing with legitimate representatives. 2. Verify Your Insurance Coverage Don’t rely on a contractor to tell you what your insurance covers. Always contact your insurance company directly for details about your policy. Additionally, never sign over your insurance check to a contractor. You want to maintain control over how your funds are spent to ensure the work is completed properly. 3. Be Skeptical of Immediate Offers for Repairs or Clean-Up In the rush to clean up or make repairs, it can be tempting to accept the first offer that comes along. However, unlicensed contractors and scammers often show up in disaster-affected areas promising fast fixes. Be cautious of anyone who demands cash upfront or won’t provide copies of their license, insurance, or a written contract. If they refuse to give you any of these, walk away. 4. Get a Written Contract and Read it Carefully Contract requirements vary by state, but even if your state doesn’t mandate a written agreement, always request one. A contract should outline the scope of work, materials to be used, payment schedules, timelines, and any guarantees. This provides you with legal protection if the contractor fails to deliver on their promises. Take Action: Protect Yourself and Your Community As we work together to rebuild after disasters, staying informed is the best defense against scams. Share this information with friends, family, and neighbors so that everyone in your community is aware of these fraudulent schemes. If you suspect you’ve encountered a scam or have been the victim of fraud, report it to local law enforcement, the Federal Trade Commission (FTC), or FEMA’s Disaster Fraud Hotline. Recovering from a natural disaster is hard enough without having to deal with the fallout from scammers. By recognizing the signs and taking the proper precautions, you can help ensure that your recovery is smooth, safe, and scam-free. Additional Resources: Hurricane Helene: Recovery Scams How to Avoid Imposter Scams How To Avoid Scams After Natural Disasters Picking Up the Pieces After a Disaster Stay safe, stay informed, and protect yourself from those who might try to take advantage during these challenging times. 5 min read
Image for tile. Money Mule Scams: How Criminals Convert Fraud into Profit What is a Money Mule? Money mules are individuals who unknowingly or knowingly assist criminals in laundering money, often by transferring illegally sourced funds between accounts or across borders. The source of the money comes from fraudulent scams or other illegal activities like drug trafficking. Criminals use their mule’s identity and layer the illegal transactions in an attempt to hide the illegal funds from law enforcement. Once properly hidden, the criminals are able to access their funds and cash out on their illegal activity. Common Money Mule Scams There are a number of ways that criminals will try to hide their money from law enforcement. Money mules are a form of money laundering, where criminals attempt to make their illegally sourced funds seem legitimate. Here are a few common ways people can unknowingly fall victim to money mule scams. 1- Deceptive Job Offers Money mule scammers will act as employers offering high-paying, remote positions. Common job titles could be payment processor, financial coordinator, or international fund liaison. While these job opportunities seem legitimate, their primary function is to receive and transfer illegal funds. The criminal will wire a large sum of funds to the mule, then instruct them to keep a percentage and transfer the remainder of the money to a different account or purchase a certain amount of cryptocurrency. The criminal hides behind their mule’s identity and is able to more easily access their funds. 2 – Romance Scams This type of mule scam exploits a victim’s emotions and trust. Scammers will find their victims on social media sites, dating sites or other online chat channels. They will deceive their victims with made up personas often using stolen photos and fake details. Over time, the scammer will attempt to build an emotional connection by sending affectionate messages or personal stories. Once they feel they have earned the victim’s trust, they will fabricate a story requiring financial assistance. These are oftentimes medical emergencies or travel issues that need quick funding into an account. Once the scammer has convinced their victim to oblige, they will continue to exploit their trust to launder their illegal funds. 3 – Lottery, Prize, and Investment Scams If something seems too good to be true – it probably is. These scams typically start via an unsolicited message or phone call informing you that you’ve won a prize. They instruct their victims to take a number of steps before they can claim their prize, and that is where the danger lies. These steps could include gathering your personal details, wiring a “prize tax” or fraudulent fee, accepting a large sum of money, and/or transferring a portion of the winning funds to another account. Similarly, investment scammers typically promise their mule victims “return” for their illegal money transfers – sometimes in the form of cryptocurrency or percentages of the money they wire. What are the Consequences? Large overdraft balances are most often the first consequence to the money mule. Once the criminal has access to their mule’s account, they typically push a large lump sum out of the account. This amount oftentimes will exceed the typical balance in the mule’s account, leaving them with a substantial negative balance to dig out from. Acting as a money mule is illegal, whether the crime is knowing or unknowingly committed. The punishment for these crimes include imprisonment and federal charges. Additionally, your identity and personal information could be stolen from the criminals involved in the money mule scheme. Internet Crime Complaint Center (IC3): The IC3 is run by the FBI and accepts online internet crime complaints from the victim at www.ic3.gov How to Protect Yourself As with most methods of protecting yourself against fraud – remain cautious whenever someone requests your personal information or banking information. Only share those details with people or organizations that you trust. If you receive a job offer from an online business, do your due diligence to confirm they are a legitimate company. Additionally, a legitimate employer will not ask you to form a company or open a new bank account on their behalf. Always be cautious if anyone asks you to wire or transfer money on their behalf. Be weary if something seems too good to be true, like you’ve won an unsolicited prize or been chosen to participate in a giveaway. Scammers act on urgency. If someone is pressuring you to do something that you’re uncomfortable with, walk away. If you or someone you know is afraid they are involved in a money mule scheme, it’s not too late to stop.  Stop communicating with the person giving the directions. Tell your financial institution and consider changing accounts. Report suspicious communications or activity to law enforcement. The Internet Crime Complaint Center (IC3) is the Nation’s central hub for reporting cyber crime and run by the FBI.  Visit www.ic3.gov for resources and more information about how to file a report. Maintain receipts, contact information and communications (emails, text messages, voicemails) so that information can be passed to law enforcement, if needed.   5 min read
Mature woman at home looking at the bills and taxes and trying to calculate and pay them. Ways to protect yourself against check fraud Check fraud is on the rise. Here’s what you can do. These days fraud is everywhere, and fraudster methods are always evolving. A growing number of methods are targeting your checkbook. Did you know that checks are now one of the least secure forms of payment? Criminals are combining old-school methods of theft with readily available technology to steal checks, impersonate account holders, and sell to the black market. Arm yourself with the knowledge to protect your identity and checking account. How is check fraud committed? Lifting ink: Lifting ink from a check, or “check washing”, can be done using chemicals as readily available as nail polish remover. Criminals can remove your intended payee’s information and replace it with theirs while also increasing the dollar amount. They then deposit the fraudulent check into their account. Targeting mailboxes: Once mail is stolen from a residential mailbox or a USPS blue box, criminals sift in search of checks that can be washed and forged. The frequency of mail theft is directly correlated to the spike in check fraud. Selling check images on the dark web: There is a growing network of darknets and encrypted communication platforms that criminals use to sell check images. Criminals can use the personal information from your check and your banking information to commit identity theft scams.   Consider these check-writing alternatives and services. If you can, try to avoid placing checks in the mail. First Bank offers a number of alternative options for mailing checks like BillPay, Zelle, External Transfer services, and more. Bill Pay: This free service lets you avoid the hassle of writing checks or visiting multiple websites to stay on top of your payments. See how convenient it is to manage your payments from one place. External Transfers: For those who support their kids in college or if you’re constantly writing checks between your First Bank account and one at another bank, First Bank’s External Transfer option makes it quick and easy to securely transfer funds. If you own both accounts, learn how to set up a transfer here. Zelle®1 : In your First Bank mobile app, you have access to Zelle®, a fast, safe, and easy method to send money directly from your bank 4 min read
Image for tile. 3 Steps to Creating a Strong and Unique Password In today’s world, passwords have become an important part of our daily lives. We use them for everything from social media accounts to digital banking, and endless apps in between. Although it is easy to choose the same short and memorable passphrase for everything, it can leave you wide open for risk if one of those platforms is compromised. Step One: Change It Up The first step to protecting yourself from data breaches is defining secure phrases for your different accounts in order to alleviate risk. The consider the following tips to remember when selecting a password: Make sure your password is at least 12 characters Include upper-case and lower-case letters throughout Avoid keyboard paths like 45678 or asdfg Add punctuation marks within the password not just at the end Step Two: Make it Meaningful While there is strength in a lengthy password, trying to remember an array of random letters, symbols, and numbers such as YP&3U6?@DM2$ may be difficult; therefore, it is beneficial to use phrases meaningful to you, but ambiguous to others. Instead of using easily predictable passwords containing information shared online such as birthdays, anniversaries, or family names, try relating it to your favorite hobby, food, or movie in order to better protect yourself. For example, creating a password that combines your favorite movie and the last 4 digits of your best friend’s phone number like PreTTyWoM@N2849! ensures that cybercriminals cannot effortlessly hack your account. Here is a chart designed to help you better understand how easily a cybercriminal can guess your password and the time it would take for you to be hacked. Step Three: Keep It Secret, Keep It Safe The more complex your passwords, the easier it is to forget a character and get locked out. So, what’s the best solution to keep everything straight and safe? Online: Storing passphrases on your phone or computer or sending them through email or text often seems like a convenient hassle-free solution, but it creates the opportunity for hackers to obtain private information. Offline: Writing down your passwords can be the safest way to store your information, but it is still crucial to not record them word for word. Sadly, fraud often times comes from internal sources 4 min read
Cropped shot of a businesswoman sitting alone and typing on her laptop during the day at home Learn the Cybercrime Warning Signs The number of cybercrimes continues to increase day by day. This can sometimes make it hard for you to completely protect yourself from these threats. But the more you know about these scams, the better chance you’ll have at identifying and avoiding them. What is a cybercrime? Cybercriminals aim to exploit your information for their own personal gain, causing harm to financial stability and exposing secure information. Cybercrimes are those criminal activities where a computer or the internet is used as a tool for fraudulent claims, to gain personal or business information, or to infect networks and devices. *First Bank will always take the appropriate measures to keep your personal information safe. In this article, we have outlined some common cyber scams, so that you can understand what to look out for. Some common scams/fraud includes: Phishing Email Scams Perhaps the most common type of scam is phishing, usually done via email and designed to look like they are coming from someone at your company, someone you know, or a notable figure. Because these emails look like they can come from anyone, it is easy to be caught in this form of scam. It may be hard to fully protect yourself from them, but it is always best to double check who is requesting your information. Payroll Scams In Protecting Against Fraud from Nacha, a payroll scam is when, “fraudsters target individual employees by directing the employees to update or confirm their payroll information via a fake payroll platform that spoofs their employer’s actual payroll platform. In some cases, the fraudster may claim the employee must do one of these: view a confidential email from human resources or the payroll department, view changes to the employee’s account, or confirm that the account should not be deleted.” Cybercriminals will use the stolen credentials to change payment information within the business’s payment platform. This type of scam can be extremely dangerous to an individual and a company because it exposes both user and business information. Romance Scams According to fbi.gov, romance scams, or online dating scams, “occur when a criminal adopts a fake online identity to gain a victim’s affection and trust. The scammer then uses the illusion of a romantic or 7 min read
Image for tile. Learn How to Be A Phishing Attack Detective With a number of people relying heavily on online services and communication for work and personal life, cybercriminals have increased their volume of attempts to acquire personal information. One of the most common ways they may try to gain access to this secure information is through phishing attacks. This causes problems for both individuals and companies when they are trying to keep information safe. What is phishing? As described by phishing.org, “Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. The information is then used to access important accounts and can result in identity theft and financial loss.” These attempts may look like someone posing as a coworker, asking for input, including links or attachments, among other things. Scammers attempt to gain access to user information every day, but when you know what to look for you don’t have to become a victim. Take a look at our playlist for a few tips to help you become a phishing email detective and use them in your everyday life. It is always a good idea to double check information before opening anything from unknown senders. In episode 1, you see Gil Ubble attempting to open an email from an external source. Upon further investigation, the domain name does not match and the email is not from someone at the company. Often times people are caught in these attacks because they aren’t paying close enough attention to who the email came from. If the email in question looks similar to something that provider would send, do not click on links or attachments. Instead, go directly to that company site or give them a call to make sure the information is accurate. If the email comes from someone who seems to work at your company, but you do not know the person, check to see if they actually work there. Even if the person’s email shows that they work at your company, check the email for other signs of false information. Scammers may go to extra lengths to spoof email addresses 4 min read
Image for tile. Lock It Up: Protect Your Login Info These days an increasing number of people are online creating accounts for shopping, streaming services, or to stay connected with other people. Of course, with all those accounts on various websites, who wants to create a different username and password every time? Well, it turns out the extra effort is worth it. Having different logins for your online shopping or subscription accounts can reduce your risk of fraud. Here’s why: if you use the same username and password across multiple sites and one of them is compromised, access to the other sites is automatically at risk. Fraudsters will then use the stolen credentials on those other sites to see if they can gain access and attempt various forms of fraud or other data mining activity. Please note: First Bank has several protective measures in place to ensure that your information is secure and that your account is safe from this type of fraud. But your other online accounts may not be so well guarded. Here are some tips to help you make each of your log-ins stronger and more secure: Use different login information. Not surprisingly, this is the best thing you can do to keep fraudsters out of your retail or subscription accounts. This means you will need to resist using your favorite username or password over and over again because it is the easiest to remember. Create strong/unique usernames and passwords. When using different usernames and passwords, use information that is not easily identifiable, but something you can remember. The more complex, the less likely it is to be guessed. One more tip: use numbers, capital letters, and special characters throughout your username or password, not just at the beginning or end. Enable two-factor/multi-factor authentication where available. By enabling this feature, a user is provided a second form of identification to verify a log in attempt. Think of it as a second layer of protection against potential attackers. This can be as simple as receiving a code via text or email, or clicking a link to confirm a log in from an unfamiliar device. Keep second factor information confidential. Never give out your second factor code to anyone – even if they say they are from a favorite 3 min read
Get In Touch
First Bank has the resources you need, when you need them. Our personal banking services are there for you at the right time, every time.