Skip to main content
Fraud and Security Tips

Knowledge is the first line of defense

There's no on-size-fits-all approach when it comes to preventing fraud from occurring, but there are a few steps that you can take to help prevent it.
Typically, there are four different types of scams that are used on unsuspecting victims - romance, job, loan, and lottery. There are a few red flags that are indicative that some of this communication could be fraudulent or a scam.
Fraud and Security Tips

Spotting red flags

Being able to identify red flags may prevent you from becoming a victim of a scam. Learn more below about three examples of red flags.

Gift Card Request

A request asking you to purchase various gift cards and send the code on the back as a form of payment.

Profession of Love

Scammer professes love for a victim very quickly. Claims to be over seas for business/military. Asks for money and lures victim off dating site.


Scammer claims that money is needed for an emergency situation, hospital bills, or travel - plans to visit victim, but can't due to emergency.
Find Assistance for Spotting red flags

Four Common Types of Scams

Recently, we've seen that the latest scams can be categorized into four categories. These are the ways that scammers try to get your personal information.

Romance Scams

Scammers strike up a relationship to build trust with a victim. Then, they make up a story and ask for money.

Job Opportunity Scams

Victims receive an opportunity to "work from home" with great pay. Scammers will send advance payment for equipment.

Loan Availability Scams

Promise of loan with no credit check and that will raise your credit score, just by paying fees upfront.

Lottery Scams

Scammers inform victims that they've been selected and won a lottery of some sort, but you must pay processing fees to receive your prize.
Get Assistance for Four Common Types of Scams

Protection against online banking fraud

The two most prevalent types of fraud, "Keylogging" and "Phishing,” occur from viruses on your computer. In both cases, the end result is the fraudster capturing your login credentials.
  • Identity Theft
    Many cyber criminals, also referred to as fraudsters, don't want to steal your identity in the traditional sense. They don't want to get a credit card or a mortgage or a checking account in your name and live their life off of your good credit history. They simply want to take your money and move on to the next victim. While most companies that do business on the internet including financial institutions, are very diligent in providing online protection for their customers, the first line of defense is knowledge about what you, the end-user, can do to protect yourself — an electronic way of "Looking out for Number One."

    Protection against Identity Theft:

    Services like the ones available from the three major credit reporting agencies and companies such as LifeLock® offer protection against other people establishing credit or identities using your Social Security Number. These services are very valuable and worthwhile, but true identity theft is not the only threat out there in these digital times.
    Get Assistance contact for Identity Theft
  • Keystroke Logging or Keylogging
    Keylogging is a method by which fraudsters record your actual keystrokes and mouse clicks. Keyloggers are "Trojan" software programs that target your computer's operating system (Windows, Mac OS, etc.) and are "installed" via a virus. These can be particularly dangerous because the fraudster has captured your user ID and password, account number, Social Security Number — and anything else you have typed. If you are like most other users and have the same ID and PIN/Password for many different online accounts, you've essentially granted the fraudster access to any company with whom you conduct business. After all, they've got your login credentials so they appear to be a valid user.

    Protection against Keystroke Logging:

    Use Anti-Virus Software: This is the single most important thing you can do to protect your computer from viruses. There are many on the market today — some cost money while others are free. If you opt to use a free version, make sure it is being offered by a reputable company and do research on the company and its product before installing.
    Keep your operating system up-to-date: Always download and install the latest security patches.
    Get Assistance contact for Keystroke Logging or Keylogging
  • Phishing
    Phishing is a scam where Internet fraudsters request personal information from users online. These requests are most commonly in the form of an email from an organization with which you may or may not do business. In many cases, the email has been made to look exactly like a legitimate organization's email would appear complete with company logos and other convincing information. The email usually states that the company needs you to update your personal information or that your account is about to become inactive, all in an effort to get you to click the link to a site that only looks like the real thing.
    If you click on the link to go to the phony website and enter all of your information, you've just become the victim of a phishing attack. The fraudsters have just captured all the necessary information to access your accounts online. No reputable business will ever email you requesting that you update your personal information, including account numbers, system passwords or Social Security Numbers via a link to their site.

    Protection against Phishing:

    Never click on a link from a business requesting that you provide them with personal information.
    Pay close attention to the URL (Internet address) behind the link. Often in phishing attempts, if you hover the cursor over the link the fraudsters want you to click on, it has nothing to do with the actual company they claim to be.
    If your Financial Institution uses watermarks or personal images, do not log in unless you see the correct image on the screen. Report any phishing attempts to your Financial Institution.
    If you are unsure that the request is valid, open a new Internet session and manually key in the business' web address. If the business genuinely needs information from you, they will have you log in to your online account to see the request. In most cases, you'll just be greeted with a message indicating that the business will never email you requesting personal information.
    Get Assistance contact for Phishing

Looking for More

Form Pre Tags + Captcha + Submit Button - Code Add/Edit Here
Leaving Site

You are now leaving the website

The link you clicked will take you to a third-party website. We do not control the content of this site, nor do we endorse or guarantee the products, information or recommendations provided by the linked site, Please review their Privacy Policy as it may differ from ours. The linked third-party website may provide less security than the bank's website.