Skip to main content
_FB_2018-Icons-finalized-cleaned-up_new_FB_2018-Icons-finalized-cleaned-up_newGroup 9
Back
Scroll to top

Fending Off Fraud

Financial fraud protection requires diligence — know the red flags to look for.

Learn How to Fend Off Fraud

Read these articles to learn about the latest scams and safety measures to protect your accounts from financial fraud.

All Budgeting and Goals Credit: Score and More Family Finances Fending Off Fraud Paying Off Debt Personal Finance 101 Homeownership Retirement
Cropped shot of a businesswoman sitting alone and typing on her laptop during the day at home Learn the Cybercrime Warning Signs The number of cybercrimes continues to increase day by day. This can sometimes make it hard for you to completely protect yourself from these threats. But the more you know about these scams, the better chance you’ll have at identifying and avoiding them. What is a cybercrime? Cybercriminals aim to exploit your information for their own personal gain, causing harm to financial stability and exposing secure information. Cybercrimes are those criminal activities where a computer or the internet is used as a tool for fraudulent claims, to gain personal or business information, or to infect networks and devices. *First Bank will always take the appropriate measures to keep your personal information safe. In this article, we have outlined some common cyber scams, so that you can understand what to look out for. Some common scams/fraud includes: Phishing Email Scams Perhaps the most common type of scam is phishing, usually done via email and designed to look like they are coming from someone at your company, someone you know, or a notable figure. Because these emails look like they can come from anyone, it is easy to be caught in this form of scam. It may be hard to fully protect yourself from them, but it is always best to double check who is requesting your information. Payroll Scams In Protecting Against Fraud from Nacha, a payroll scam is when, “fraudsters target individual employees by directing the employees to update or confirm their payroll information via a fake payroll platform that spoofs their employer’s actual payroll platform. In some cases, the fraudster may claim the employee must do one of these: view a confidential email from human resources or the payroll department, view changes to the employee’s account, or confirm that the account should not be deleted.” Cybercriminals will use the stolen credentials to change payment information within the business’s payment platform. This type of scam can be extremely dangerous to an individual and a company because it exposes both user and business information. Romance Scams According to fbi.gov, romance scams, or online dating scams, “occur when a criminal adopts a fake online identity to gain a victim’s affection and trust. The scammer then uses the illusion of a romantic or 7 min read
Image for tile. Learn How to Be A Phishing Attack Detective With a number of people relying heavily on online services and communication for work and personal life, cybercriminals have increased their volume of attempts to acquire personal information. One of the most common ways they may try to gain access to this secure information is through phishing attacks. This causes problems for both individuals and companies when they are trying to keep information safe. What is phishing? As described by phishing.org, “Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. The information is then used to access important accounts and can result in identity theft and financial loss.” These attempts may look like someone posing as a coworker, asking for input, including links or attachments, among other things. Scammers attempt to gain access to user information every day, but when you know what to look for you don’t have to become a victim. Take a look at our playlist for a few tips to help you become a phishing email detective and use them in your everyday life. It is always a good idea to double check information before opening anything from unknown senders. In episode 1, you see Gil Ubble attempting to open an email from an external source. Upon further investigation, the domain name does not match and the email is not from someone at the company. Often times people are caught in these attacks because they aren’t paying close enough attention to who the email came from. If the email in question looks similar to something that provider would send, do not click on links or attachments. Instead, go directly to that company site or give them a call to make sure the information is accurate. If the email comes from someone who seems to work at your company, but you do not know the person, check to see if they actually work there. Even if the person’s email shows that they work at your company, check the email for other signs of false information. Scammers may go to extra lengths to spoof email addresses 4 min read
Image for tile. Lock It Up: Protect Your Login Info These days an increasing number of people are online creating accounts for shopping, streaming services, or to stay connected with other people. Of course, with all those accounts on various websites, who wants to create a different username and password every time? Well, it turns out the extra effort is worth it. Having different logins for your online shopping or subscription accounts can reduce your risk of fraud. Here’s why: if you use the same username and password across multiple sites and one of them is compromised, access to the other sites is automatically at risk. Fraudsters will then use the stolen credentials on those other sites to see if they can gain access and attempt various forms of fraud or other data mining activity. Please note: First Bank has several protective measures in place to ensure that your information is secure and that your account is safe from this type of fraud. But your other online accounts may not be so well guarded. Here are some tips to help you make each of your log-ins stronger and more secure: Use different login information. Not surprisingly, this is the best thing you can do to keep fraudsters out of your retail or subscription accounts. This means you will need to resist using your favorite username or password over and over again because it is the easiest to remember. Create strong/unique usernames and passwords. When using different usernames and passwords, use information that is not easily identifiable, but something you can remember. The more complex, the less likely it is to be guessed. One more tip: use numbers, capital letters, and special characters throughout your username or password, not just at the beginning or end. Enable two-factor/multi-factor authentication where available. By enabling this feature, a user is provided a second form of identification to verify a log in attempt. Think of it as a second layer of protection against potential attackers. This can be as simple as receiving a code via text or email, or clicking a link to confirm a log in from an unfamiliar device. Keep second factor information confidential. Never give out your second factor code to anyone – even if they say they are from a favorite 3 min read
Pencil laying on 1040 tax form Staying Safe from Tax Scams We received the following very handy and timely article from the Multi-State Information Sharing and Analysis Center (MS-ISAC) in regards to staying safe during this season of numbers crunching and record keeping for taxes. As always, if you have any specific tax questions, be sure to consult a tax prep professional. Watch out for these scams Unfortunately, much of your personal information can be gathered from multiple locations online with almost no verification that the right person is receiving the information. Criminals know this and use the information to file a fake tax refund request! If a criminal files a tax return in your name before you do, they will file it with false information to get a large refund, forcing you to go through the arduous process of proving that you did not file the return and subsequently correcting the return. Once they have your personal information, criminals can continue to commit identity theft well beyond the tax season. Another favorite technique used by criminals during the tax season is sending phishing messages indicating that a new copy of your tax form(s) is available. These emails often impersonate state, local, tribal, and territorial government comptroller or IT departments. If you fill out or attempt to login into the phishing website, the criminals will be able to see your login name and password, which they can then use to try and compromise your other accounts. The more information they gather from you, the easier it is for them to use the information to file a fake tax return in your name. Lastly, tax fraudsters also impersonate the IRS and other tax officials to threaten taxpayers with penalties if they do not make an immediate payment. It is important to remember: The IRS will not initiate contact about payment with taxpayers by phone, email, text messages, or social media without sending an official letter in the mail first. The IRS will not call to demand immediate payment over the phone using a specific payment method such as a debit/credit card, a prepaid card, a gift card, or a wire transfer. The IRS will not threaten to immediately notify local police or other law-enforcement agencies to have you arrested for not paying. 4 min read
Get In Touch
First Bank has the resources you need, when you need them. Our personal banking services are there for you at the right time, every time.