Spotting red flags
Being able to identify red flags may prevent you from becoming a victim of a scam. Learn more below about three examples of red flags.
Gift Card Request
A request asking you to purchase various gift cards and send the code on the back as a form of payment.
Profession of Love
Scammer professes love for a victim very quickly. Claims to be over seas for business/military. Asks for money and lures victim off dating site.
Scammer claims that money is needed for an emergency situation, hospital bills, or travel - plans to visit victim, but can't due to emergency.
Four Common Types of Scams
Recently, we've seen that the latest scams can be categorized into four categories. These are the ways that scammers try to get your personal information.
Scammers strike up a relationship to build trust with a victim. Then, they make up a story and ask for money.
Job Opportunity Scams
Victims receive an opportunity to "work from home" with great pay. Scammers will send advance payment for equipment.
Loan Availability Scams
Promise of loan with no credit check and that will raise your credit score, just by paying fees upfront.
Scammers inform victims that they've been selected and won a lottery of some sort, but you must pay processing fees to receive your prize.
Protection against online banking fraud
The two most prevalent types of fraud, "Keylogging" and "Phishing,” occur from viruses on your computer. In both cases, the end result is the fraudster capturing your login credentials.
- Competitive rates for new or used vehicles
- Refinance vehicles financed elsewhere to lower your rate potentially
- Flexible repayment terms
- Up to 100% financing available on all purchases
- Free pre-approvals for extra buying power when negotiating
- Local decision-making and processing right here in Western Kentucky
- Customized, friendly service from our experienced lending team
- Identity Theft Many cyber criminals, also referred to as fraudsters, don't want to steal your identity in the traditional sense. They don't want to get a credit card or a mortgage or a checking account in your name and live their life off of your good credit history. They simply want to take your money and move on to the next victim. While most companies that do business on the internet including financial institutions, are very diligent in providing online protection for their customers, the first line of defense is knowledge about what you, the end-user, can do to protect yourself — an electronic way of "Looking out for Number One."
Protection against Identity Theft:Services like the ones available from the three major credit reporting agencies and companies such as LifeLock® offer protection against other people establishing credit or identities using your Social Security Number. These services are very valuable and worthwhile, but true identity theft is not the only threat out there in these digital times.Get Assistance contact for Identity Theft
- Keystroke Logging or Keylogging Keylogging is a method by which fraudsters record your actual keystrokes and mouse clicks. Keyloggers are "Trojan" software programs that target your computer's operating system (Windows, Mac OS, etc.) and are "installed" via a virus. These can be particularly dangerous because the fraudster has captured your user ID and password, account number, Social Security Number — and anything else you have typed. If you are like most other users and have the same ID and PIN/Password for many different online accounts, you've essentially granted the fraudster access to any company with whom you conduct business. After all, they've got your login credentials so they appear to be a valid user.
Protection against Keystroke Logging:Use Anti-Virus Software: This is the single most important thing you can do to protect your computer from viruses. There are many on the market today — some cost money while others are free. If you opt to use a free version, make sure it is being offered by a reputable company and do research on the company and its product before installing.Get Assistance contact for Keystroke Logging or Keylogging
- Phishing Phishing is a scam where Internet fraudsters request personal information from users online. These requests are most commonly in the form of an email from an organization with which you may or may not do business. In many cases, the email has been made to look exactly like a legitimate organization's email would appear complete with company logos and other convincing information. The email usually states that the company needs you to update your personal information or that your account is about to become inactive, all in an effort to get you to click the link to a site that only looks like the real thing.
Protection against Phishing:Never click on a link from a business requesting that you provide them with personal information.Get Assistance contact for Phishing
Pay close attention to the URL (Internet address) behind the link. Often in phishing attempts, if you hover the cursor over the link the fraudsters want you to click on, it has nothing to do with the actual company they claim to be.
If your Financial Institution uses watermarks or personal images, do not log in unless you see the correct image on the screen. Report any phishing attempts to your Financial Institution.
Additional Proection from Frauds
We currently only accept online applications from our immediate lending area (Counties, including Calloway, Graves, Livingston, Lyon, Marshall, and McCracken). If you are outside this area, please call one of our banking centers for assistance with your loan application.Protect Me Now for Additional Proection from Frauds
Looking for More
Here for YouCall, text, email, chat, or whatever method is most convenient for you - our team is ready to help!
Find a LocationVisit the nearest banking center for an in-person consultation to discuss any questions you may have.
Thank a BankerDid someone on our team go above and beyond? Leave a thank-you note so we can celebrate them!
Form Pre Tags + Captcha + Submit Button - Code Add/Edit Here