Skip to main content
_FB_2018-Icons-finalized-cleaned-up_new_FB_2018-Icons-finalized-cleaned-up_newGroup 9
Back
Scroll to top

Fending Off Fraud

Financial fraud protection requires diligence — know the red flags to look for.

Learn How to Fend Off Fraud

Read these articles to learn about the latest scams and safety measures to protect your accounts from financial fraud.

All Budgeting and Goals Credit: Score and More Family Finances Fending Off Fraud Paying Off Debt Personal Finance 101 Homeownership Retirement
Image for tile. How to Spot Fraud: Four Signs That it’s a Scam 1. Scammers Pretend to Be From an Organization You Know One of the most common tactics scammers use is posing as a trusted organization, such as a government agency, utility provider, or even your bank. They might claim to be from the IRS, Social Security Administration, or a local business you’re familiar with. Using technology to spoof phone numbers, they can make it look like the call is coming from a legitimate source. What You Can Do: Always verify the source independently. Look up the organization’s official contact number and call them directly. Be wary of unsolicited communications, especially if they request sensitive information. Don’t trust caller ID alone; it can be easily manipulated. First Bank Customers:  NEVER share your secure access codes. If you receive a suspicious call, email, or text from someone claiming to be a First Bank representative asking for a code that was sent to your phone or email, STOP all communication. First Bank will NEVER ask for that information. Please STOP all communication with that person and call First Bank customer support at 1-866-792-4357. 2. Scammers Say There’s a Problem or a Prize Scammers often appeal to fear or excitement. They might claim you owe money to the government, that there’s an issue with one of your accounts, or that you’ve won a prize. The catch? You’ll need to provide personal information or pay a fee to resolve the issue or claim your reward. What You Can Do: Pause and think. Legitimate organizations don’t ask for immediate payments or sensitive information over the phone or via email. Be cautious of high-pressure tactics; they’re designed to make you act without thinking. If it seems too good to be true, it probably is. 3. Scammers Pressure You to Act Immediately A sense of urgency is a hallmark of scam attempts. Fraudsters don’t want to give you time to think, verify their claims, or consult someone else. They might threaten legal action, suspension of accounts, or worse to coerce you into acting quickly. What You Can Do: Take your time. Legitimate organizations will not rush you or threaten you into making hasty decisions. Hang up if a caller refuses to let you disconnect or tries to intimidate you. Reach out to a trusted advisor or your bank for guidance if you’re unsure. 4. Scammers Tell You to Pay in a Specific Way Another red flag is when scammers demand payment via unconventional methods like cryptocurrency, payment apps, wire transfers, or gift cards. They might also send a fake check and ask you to deposit it before transferring money back to them. What You Can Do: Be suspicious of requests for payment via gift cards or cryptocurrency; these methods are often untraceable. Never send money or provide financial information based on a request from an unsolicited call, email, or message. If you receive a check, wait for your bank to verify its authenticity before using the funds. Final Tips for Staying Safe Educate Yourself and Others: Share these tips with family and friends to help them avoid scams. Trust Your Instincts: If something feels off, it probably is. Always err on the side of caution. Report Suspicious Activity: If you suspect fraud, contact your bank immediately and report the incident to local authorities or organizations like the FTC. By staying vigilant and informed, you can protect yourself from scammers and safeguard your financial well-being. Remember: Your bank is here to help. If you ever have questions or concerns, don’t hesitate to reach out. First Bank is Here to Help If you feel that you have fallen victim to a scam, what should you do next? At First Bank, we recommend calling us immediately. You may reach us at 1‑866‑792‑4357 between the hours of 7:00 a.m. to 8:00 p.m. Monday through Friday or 9:00 a.m. to 4:00 p.m. on Saturday. Or you may submit an e‑mail message to fraud@localfirstbank.com. Our associates are trained in fraud response and will advise you on your next steps. Stop by your nearest First Bank branch to talk through any questions or concerns you might have about your account security or how our different banking policies work to keep you safe. If you can’t make it to one of our branches, call our customer support center at 1-866-792-4357. 4 min read
Image for tile. How to Avoid a Scam: 5 Essential Steps to Protect Yourself 1. Block Unwanted Calls and Text Messages One of the most common tactics scammers use is impersonation. They may claim to represent government agencies like the IRS, Social Security Administration, or Medicare, or pose as trusted businesses, charities, or utilities. These fraudsters often manipulate caller ID to display fake names and numbers, making it seem legitimate. To minimize risk: Use tools provided by your phone carrier or third-party apps to block unwanted calls and messages. Be cautious of unsolicited communication, even if it seems familiar. 2. Protect Personal and Financial Information Scammers thrive on obtaining sensitive information through deception. Whether they claim you owe money, have won a prize, or face an urgent issue, their goal is the same: to access your details. Here’s how to avoid their traps: Never share personal or financial information in response to an unexpected request. Verify the legitimacy of any claims by contacting the organization directly using official channels. 3. Resist the Pressure to Act Immediately Scammers rely on urgency to cloud your judgment. They might demand immediate action, threaten legal consequences, or warn of impending disaster. This pressure is designed to prevent you from thinking critically. Stay safe by: Taking a moment to breathe and assess the situation. Refusing to make hasty decisions, no matter how alarming their claims may seem. 4. Recognize Suspicious Payment Requests Fraudsters often demand payment through unconventional and hard-to-trace methods like cryptocurrency, gift cards, or wire transfers. These requests are major red flags. Protect yourself by: Questioning any payment request that feels unusual or overly complicated. Refusing to share gift card numbers or send money through untraceable means. 5. Talk to Someone You Trust Scammers count on their victims feeling isolated and uncertain. Breaking their spell is often as simple as confiding in someone you trust. Here’s why it helps: Explaining the situation out loud can help you see inconsistencies in their story. Friends, family, or neighbors can provide valuable advice or reassurance. Empower Yourself Against Scams Scammers prey on fear and confusion, but with the right knowledge and habits, you can protect yourself and your finances. By blocking unwanted calls, safeguarding your personal information, resisting high-pressure tactics, recognizing suspicious payment methods, and seeking trusted advice, you can stay one step ahead. Your security matters, and we’re here to help. If you ever suspect fraudulent activity, don’t hesitate to reach out to the First Bank customer support center at 1-866-792-4357. Together, we can ensure your financial safety. 3 min read
Image for tile. Fraud Protection Best Practices: When to use a Credit Card vs. a Debit Card Key Fraud-Related Differences Between Credit Cards and Debit Cards A credit card allows you to borrow money from a lender up to a set limit, with the expectation of paying it back later, often with interest if not paid in full. A debit card, on the other hand, directly withdraws funds from your bank account when you make a purchase, limiting spending to the amount in your account. Balancing credit and debit card use can enhance both security and financial stability. If someone steals your credit card information, they are effectively stealing the credit card issuer’s money, not directly accessing your bank account. This separation provides a crucial security buffer, giving you time to dispute charges without risking essential funds like rent or grocery money. In contrast, debit card fraud affects your checking account immediately, which can cause financial disruptions until the issue is resolved. Instances Where a Credit Card can Offer Increased Fraud Protection Online Purchases Credit cards are generally safer for online transactions. They offer robust fraud protection, and most credit card companies monitor for suspicious activity, often reimbursing fraudulent charges quickly. Travel and International Transactions When traveling, especially abroad, use a credit card. Credit cards typically offer better fraud monitoring and reduced liability if your card information is compromised. Big-Ticket Purchases Use a credit card for expensive items like electronics or home appliances. Many credit cards come with purchase protection, extended warranties, and easier dispute resolution if something goes wrong. Recurring Payments or Subscriptions Credit cards provide better protection if you need to dispute unauthorized subscription charges, helping avoid interruptions to your service while the issue is resolved. Best Practices for Card Security Monitor Transactions: Regularly check both credit and debit accounts for unauthorized activity. Use Secure Websites: Look for “https://” in website URLs when shopping online. Enable Alerts: Sign up for transaction alerts for immediate fraud detection. Report Issues Promptly: The sooner you report suspicious activity, the better your chances of minimizing loss. Responsible Credit Card Use To maximize fraud protection while maintaining financial health, use credit cards responsibly by: Paying the Balance in Full: Avoid interest charges by clearing the balance each month. Staying Within Limits: Use only a portion of your credit limit to maintain a healthy credit score. Making Timely Payments: Pay on time to avoid late fees and credit score damage. 2 min read
Image for tile. How To Avoid Scams After Weather Emergencies and Natural Disasters Potential Scam Scenarios Scammers use a variety of tactics to exploit people during the aftermath of disasters. Here are some of the most common scams to watch out for: 1. Imposter Scams Scammers often pose as safety inspectors, government officials, or aid workers, claiming they are there to help. They may ask for sensitive information or upfront payments for services, such as inspections or applications, that are usually provided for free by legitimate organizations. 2. FEMA Impersonators One common scam involves individuals impersonating FEMA (Federal Emergency Management Agency) representatives. They may offer to help you with your FEMA application but will charge an upfront fee, which is not a part of any legitimate FEMA process. FEMA does not charge for applications or assistance. 3. Home Improvement and Debris Removal Scams After a natural disaster, many people need repairs to their homes or businesses. Scammers may pose as contractors offering quick debris removal or repairs but will often demand large sums of money upfront or perform subpar work, leaving victims with little recourse. They may also disappear after taking payment, leaving your property in worse condition. Recognize the Signs of a Scam While scammers can be clever, there are warning signs that can help you spot fraudulent behavior. Keep an eye out for these red flags: No Licensing Required: Scammers may claim they don’t need a license to do the work, which is false. Legitimate contractors should always have a valid license and insurance. Pressure to Sign a Contract Immediately: Scammers often offer a “discount” or say they can only fit you in if you sign a contract on the spot. This tactic is meant to pressure you into making a decision without careful consideration. Signing Over Your Insurance Check: If a contractor asks you to sign over your insurance claim check, beware. This can leave you vulnerable if the work is incomplete or of poor quality. Full Payment Upfront: Asking for full payment before any work is completed is a big red flag. Reputable contractors typically ask for a partial deposit, with the balance due upon completion of the work. Unusual Payment Methods: If someone asks you to pay by wire transfer, gift card, or cryptocurrency, it’s likely a scam. These payment methods are difficult to trace and recover if the contractor disappears. Ways to Avoid a Scam Protecting yourself after a natural disaster requires both awareness and due diligence. Here are steps you can take to reduce the risk of being scammed: 1. Know that FEMA Doesn’t Charge Application Fees FEMA provides disaster assistance for free, and they never charge for processing your application. If someone asks for money to help you qualify for FEMA funds, it’s a scam. Always verify through FEMA’s official website or hotline to ensure you’re dealing with legitimate representatives. 2. Verify Your Insurance Coverage Don’t rely on a contractor to tell you what your insurance covers. Always contact your insurance company directly for details about your policy. Additionally, never sign over your insurance check to a contractor. You want to maintain control over how your funds are spent to ensure the work is completed properly. 3. Be Skeptical of Immediate Offers for Repairs or Clean-Up In the rush to clean up or make repairs, it can be tempting to accept the first offer that comes along. However, unlicensed contractors and scammers often show up in disaster-affected areas promising fast fixes. Be cautious of anyone who demands cash upfront or won’t provide copies of their license, insurance, or a written contract. If they refuse to give you any of these, walk away. 4. Get a Written Contract and Read it Carefully Contract requirements vary by state, but even if your state doesn’t mandate a written agreement, always request one. A contract should outline the scope of work, materials to be used, payment schedules, timelines, and any guarantees. This provides you with legal protection if the contractor fails to deliver on their promises. Take Action: Protect Yourself and Your Community As we work together to rebuild after disasters, staying informed is the best defense against scams. Share this information with friends, family, and neighbors so that everyone in your community is aware of these fraudulent schemes. If you suspect you’ve encountered a scam or have been the victim of fraud, report it to local law enforcement, the Federal Trade Commission (FTC), or FEMA’s Disaster Fraud Hotline. Recovering from a natural disaster is hard enough without having to deal with the fallout from scammers. By recognizing the signs and taking the proper precautions, you can help ensure that your recovery is smooth, safe, and scam-free. Additional Resources: Hurricane Helene: Recovery Scams How to Avoid Imposter Scams How To Avoid Scams After Natural Disasters Picking Up the Pieces After a Disaster Stay safe, stay informed, and protect yourself from those who might try to take advantage during these challenging times. 5 min read
Image for tile. Money Mule Scams: How Criminals Convert Fraud into Profit What is a Money Mule? Money mules are individuals who unknowingly or knowingly assist criminals in laundering money, often by transferring illegally sourced funds between accounts or across borders. The source of the money comes from fraudulent scams or other illegal activities like drug trafficking. Criminals use their mule’s identity and layer the illegal transactions in an attempt to hide the illegal funds from law enforcement. Once properly hidden, the criminals are able to access their funds and cash out on their illegal activity. Common Money Mule Scams There are a number of ways that criminals will try to hide their money from law enforcement. Money mules are a form of money laundering, where criminals attempt to make their illegally sourced funds seem legitimate. Here are a few common ways people can unknowingly fall victim to money mule scams. 1- Deceptive Job Offers Money mule scammers will act as employers offering high-paying, remote positions. Common job titles could be payment processor, financial coordinator, or international fund liaison. While these job opportunities seem legitimate, their primary function is to receive and transfer illegal funds. The criminal will wire a large sum of funds to the mule, then instruct them to keep a percentage and transfer the remainder of the money to a different account or purchase a certain amount of cryptocurrency. The criminal hides behind their mule’s identity and is able to more easily access their funds. 2 – Romance Scams This type of mule scam exploits a victim’s emotions and trust. Scammers will find their victims on social media sites, dating sites or other online chat channels. They will deceive their victims with made up personas often using stolen photos and fake details. Over time, the scammer will attempt to build an emotional connection by sending affectionate messages or personal stories. Once they feel they have earned the victim’s trust, they will fabricate a story requiring financial assistance. These are oftentimes medical emergencies or travel issues that need quick funding into an account. Once the scammer has convinced their victim to oblige, they will continue to exploit their trust to launder their illegal funds. 3 – Lottery, Prize, and Investment Scams If something seems too good to be true – it probably is. These scams typically start via an unsolicited message or phone call informing you that you’ve won a prize. They instruct their victims to take a number of steps before they can claim their prize, and that is where the danger lies. These steps could include gathering your personal details, wiring a “prize tax” or fraudulent fee, accepting a large sum of money, and/or transferring a portion of the winning funds to another account. Similarly, investment scammers typically promise their mule victims “return” for their illegal money transfers – sometimes in the form of cryptocurrency or percentages of the money they wire. What are the Consequences? Large overdraft balances are most often the first consequence to the money mule. Once the criminal has access to their mule’s account, they typically push a large lump sum out of the account. This amount oftentimes will exceed the typical balance in the mule’s account, leaving them with a substantial negative balance to dig out from. Acting as a money mule is illegal, whether the crime is knowing or unknowingly committed. The punishment for these crimes include imprisonment and federal charges. Additionally, your identity and personal information could be stolen from the criminals involved in the money mule scheme. Internet Crime Complaint Center (IC3): The IC3 is run by the FBI and accepts online internet crime complaints from the victim at www.ic3.gov How to Protect Yourself As with most methods of protecting yourself against fraud – remain cautious whenever someone requests your personal information or banking information. Only share those details with people or organizations that you trust. If you receive a job offer from an online business, do your due diligence to confirm they are a legitimate company. Additionally, a legitimate employer will not ask you to form a company or open a new bank account on their behalf. Always be cautious if anyone asks you to wire or transfer money on their behalf. Be weary if something seems too good to be true, like you’ve won an unsolicited prize or been chosen to participate in a giveaway. Scammers act on urgency. If someone is pressuring you to do something that you’re uncomfortable with, walk away. If you or someone you know is afraid they are involved in a money mule scheme, it’s not too late to stop.  Stop communicating with the person giving the directions. Tell your financial institution and consider changing accounts. Report suspicious communications or activity to law enforcement. The Internet Crime Complaint Center (IC3) is the Nation’s central hub for reporting cyber crime and run by the FBI.  Visit www.ic3.gov for resources and more information about how to file a report. Maintain receipts, contact information and communications (emails, text messages, voicemails) so that information can be passed to law enforcement, if needed.   5 min read
Mature woman at home looking at the bills and taxes and trying to calculate and pay them. Ways to protect yourself against check fraud Check fraud is on the rise. Here’s what you can do. These days fraud is everywhere, and fraudster methods are always evolving. A growing number of methods are targeting your checkbook. Did you know that checks are now one of the least secure forms of payment? Criminals are combining old-school methods of theft with readily available technology to steal checks, impersonate account holders, and sell to the black market. Arm yourself with the knowledge to protect your identity and checking account. How is check fraud committed? Lifting ink: Lifting ink from a check, or “check washing”, can be done using chemicals as readily available as nail polish remover. Criminals can remove your intended payee’s information and replace it with theirs while also increasing the dollar amount. They then deposit the fraudulent check into their account. Targeting mailboxes: Once mail is stolen from a residential mailbox or a USPS blue box, criminals sift in search of checks that can be washed and forged. The frequency of mail theft is directly correlated to the spike in check fraud. Selling check images on the dark web: There is a growing network of darknets and encrypted communication platforms that criminals use to sell check images. Criminals can use the personal information from your check and your banking information to commit identity theft scams.   Consider these check-writing alternatives and services. If you can, try to avoid placing checks in the mail. First Bank offers a number of alternative options for mailing checks like BillPay, Zelle, External Transfer services, and more. Bill Pay: This free service lets you avoid the hassle of writing checks or visiting multiple websites to stay on top of your payments. See how convenient it is to manage your payments from one place. External Transfers: For those who support their kids in college or if you’re constantly writing checks between your First Bank account and one at another bank, First Bank’s External Transfer option makes it quick and easy to securely transfer funds. If you own both accounts, learn how to set up a transfer here. Zelle®1 : In your First Bank mobile app, you have access to Zelle®, a fast, safe, and easy method to send money directly from your bank 4 min read
Image for tile. 3 Steps to Creating a Strong and Unique Password In today’s world, passwords have become an important part of our daily lives. We use them for everything from social media accounts to digital banking, and endless apps in between. Although it is easy to choose the same short and memorable passphrase for everything, it can leave you wide open for risk if one of those platforms is compromised. Step One: Change It Up The first step to protecting yourself from data breaches is defining secure phrases for your different accounts in order to alleviate risk. The consider the following tips to remember when selecting a password: Make sure your password is at least 12 characters Include upper-case and lower-case letters throughout Avoid keyboard paths like 45678 or asdfg Add punctuation marks within the password not just at the end Step Two: Make it Meaningful While there is strength in a lengthy password, trying to remember an array of random letters, symbols, and numbers such as YP&3U6?@DM2$ may be difficult; therefore, it is beneficial to use phrases meaningful to you, but ambiguous to others. Instead of using easily predictable passwords containing information shared online such as birthdays, anniversaries, or family names, try relating it to your favorite hobby, food, or movie in order to better protect yourself. For example, creating a password that combines your favorite movie and the last 4 digits of your best friend’s phone number like PreTTyWoM@N2849! ensures that cybercriminals cannot effortlessly hack your account. Here is a chart designed to help you better understand how easily a cybercriminal can guess your password and the time it would take for you to be hacked. Step Three: Keep It Secret, Keep It Safe The more complex your passwords, the easier it is to forget a character and get locked out. So, what’s the best solution to keep everything straight and safe? Online: Storing passphrases on your phone or computer or sending them through email or text often seems like a convenient hassle-free solution, but it creates the opportunity for hackers to obtain private information. Offline: Writing down your passwords can be the safest way to store your information, but it is still crucial to not record them word for word. Sadly, fraud often times comes from internal sources 4 min read
Cropped shot of a businesswoman sitting alone and typing on her laptop during the day at home Learn the Cybercrime Warning Signs The number of cybercrimes continues to increase day by day. This can sometimes make it hard for you to completely protect yourself from these threats. But the more you know about these scams, the better chance you’ll have at identifying and avoiding them. What is a cybercrime? Cybercriminals aim to exploit your information for their own personal gain, causing harm to financial stability and exposing secure information. Cybercrimes are those criminal activities where a computer or the internet is used as a tool for fraudulent claims, to gain personal or business information, or to infect networks and devices. *First Bank will always take the appropriate measures to keep your personal information safe. In this article, we have outlined some common cyber scams, so that you can understand what to look out for. Some common scams/fraud includes: Phishing Email Scams Perhaps the most common type of scam is phishing, usually done via email and designed to look like they are coming from someone at your company, someone you know, or a notable figure. Because these emails look like they can come from anyone, it is easy to be caught in this form of scam. It may be hard to fully protect yourself from them, but it is always best to double check who is requesting your information. Payroll Scams In Protecting Against Fraud from Nacha, a payroll scam is when, “fraudsters target individual employees by directing the employees to update or confirm their payroll information via a fake payroll platform that spoofs their employer’s actual payroll platform. In some cases, the fraudster may claim the employee must do one of these: view a confidential email from human resources or the payroll department, view changes to the employee’s account, or confirm that the account should not be deleted.” Cybercriminals will use the stolen credentials to change payment information within the business’s payment platform. This type of scam can be extremely dangerous to an individual and a company because it exposes both user and business information. Romance Scams According to fbi.gov, romance scams, or online dating scams, “occur when a criminal adopts a fake online identity to gain a victim’s affection and trust. The scammer then uses the illusion of a romantic or 7 min read
Image for tile. Learn How to Be A Phishing Attack Detective With a number of people relying heavily on online services and communication for work and personal life, cybercriminals have increased their volume of attempts to acquire personal information. One of the most common ways they may try to gain access to this secure information is through phishing attacks. This causes problems for both individuals and companies when they are trying to keep information safe. What is phishing? As described by phishing.org, “Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. The information is then used to access important accounts and can result in identity theft and financial loss.” These attempts may look like someone posing as a coworker, asking for input, including links or attachments, among other things. Scammers attempt to gain access to user information every day, but when you know what to look for you don’t have to become a victim. Take a look at our playlist for a few tips to help you become a phishing email detective and use them in your everyday life. It is always a good idea to double check information before opening anything from unknown senders. In episode 1, you see Gil Ubble attempting to open an email from an external source. Upon further investigation, the domain name does not match and the email is not from someone at the company. Often times people are caught in these attacks because they aren’t paying close enough attention to who the email came from. If the email in question looks similar to something that provider would send, do not click on links or attachments. Instead, go directly to that company site or give them a call to make sure the information is accurate. If the email comes from someone who seems to work at your company, but you do not know the person, check to see if they actually work there. Even if the person’s email shows that they work at your company, check the email for other signs of false information. Scammers may go to extra lengths to spoof email addresses 4 min read
Get In Touch
First Bank has the resources you need, when you need them. Our personal banking services are there for you at the right time, every time.