Skip Navigation Skip to Online Banking Skip to Accessible Content

Identify Scams

Learn About
Fraud Prevention

Identify Scams

Learn About Fraud Prevention

Card fraud

Card fraud, also known as payment card fraud, encompasses a variety of unauthorized transactions made using debit, credit, or prepaid cards. It's a prevalent form of financial crime that can result in significant financial losses and personal inconvenience for victims. Card fraud can occur through various means, including skimming, phishing, card theft, and online hacking.

Fraudsters employ sophisticated techniques to obtain card information, including card numbers, expiration dates, and security codes, which they then use to make unauthorized purchases or withdrawals. Card fraud not only affects individual cardholders but also poses risks to businesses and financial institutions.

Ways to identify:
  • Unusual Transactions: Keep an eye out for any unfamiliar or unexpected transactions on your card statements, including small charges that may be tests by fraudsters.
  • Missing Cards or Statements: If you notice that your card has gone missing or if you stop receiving statements unexpectedly, it could be a sign that someone else has gained access to your account information.
  • Notifications from Your Bank: Pay attention to any alerts or notifications from your bank or card issuer regarding suspicious activity on your account.
  • Unexpected Declines or Errors: If your card is declined unexpectedly, or if you encounter errors when attempting to use it, it could indicate potential fraudulent activity.
How to avoid:
  • Keep Your Card Secure: Protect your cards from theft or unauthorized access by keeping them in a secure location and never sharing your card details with anyone unnecessarily.
  • Monitor Your Accounts Regularly: Routinely review your card statements and transaction history online to identify any unauthorized charges promptly.
  • Enable Transaction Alerts: Utilize transaction alerts provided by your bank or card issuer to receive real-time notifications of any suspicious activity on your account.
  • Use Secure Payment Methods: When making online purchases, ensure that you're using secure websites with HTTPS encryption and avoid entering your card details on unfamiliar or suspicious websites.
  • Be Wary of Phishing Attempts: Avoid responding to unsolicited emails, text messages, or phone calls requesting your card information or personal details.
  • Report Lost or Stolen Cards Immediately: If your card is lost, stolen, or you suspect fraudulent activity, contact your bank or card issuer immediately to report the incident and request a card replacement.
Resources:
https://www.m1cu.org/news/articles/card-fraud-notification
https://www.m1cu.org/news/articles/identify-and-protect-yourself-from-card-skimmers

Check fraud

When scammers get their bad checks exchanged for good money, this is check fraud. The most common check fraud involves receiving a generous check with an explanation that you've won an award, a prize, a lottery, or other money. You're instructed to deposit the check and wire a portion back to pay fees, taxes, or the like. Wired funds can't be retrieved and, by law, you're responsible for the deposited check – even if it was counterfeit.

Ways to identify:
  • Discrepancies in Check Details: Look for any inconsistencies or discrepancies in the information printed on the check, such as misspelled words, altered dates, or irregularities in handwriting.
  • Unfamiliar Payees or Endorsements: Be wary of checks payable to unfamiliar individuals or entities, as well as endorsements that appear suspicious or unauthorized.
  • Unexplained Deductions or Fees: Scrutinize your bank statements for any unexplained deductions, fees, or withdrawals that may indicate fraudulent check transactions.
  • Duplicate Check Numbers: Monitor your checkbook for duplicate check numbers, as this could signal unauthorized checks being issued without your knowledge.
  • Missing or Delayed Check Deliveries: If you notice delays or inconsistencies in receiving expected checks or bank statements by mail, it could indicate potential mail theft or interception.
How to avoid:
  • Secure Your Checks: Store your blank checks in a secure location and limit access to authorized individuals to prevent unauthorized use or tampering.
  • Use Security Features: opt for checks that incorporate advanced security features, such as watermarks, microprinting, and security patterns, to deter counterfeiting and tampering.
  • Monitor Your Accounts Regularly: Routinely monitor your bank accounts and reconcile your checkbook to promptly detect any suspicious or unauthorized transactions.
  • Be Cautious with Personal Information: Avoid sharing sensitive personal and financial information, such as account numbers and Social Security numbers, unless absolutely necessary and only with trusted parties.
  • Shred Unused Checks and Documents: Dispose of unused checks, old bank statements, and financial documents securely by shredding them to prevent them from falling into the wrong hands.
Resources:
https://www.m1cu.org/news/articles/understanding-check-fraud

Wire fraud

Has someone asked you to use a money transfer app to send them money? This is often wire fraud. Wire fraud involves the use of electronic communications, such as email or phone calls, to deceive individuals or businesses into sending funds or sensitive information to fraudulent entities. It is a prevalent form of financial crime that can result in substantial financial losses and compromised personal and business security. Wire fraud schemes often employ sophisticated tactics, including impersonation, social engineering, and manipulation of financial information, to deceive victims and facilitate illicit transactions.

Fraudsters may impersonate legitimate entities, such as financial institutions, government agencies, or trusted vendors, to deceive victims into transferring funds or disclosing sensitive information. Wire fraud schemes can have devastating consequences for victims, including financial hardship, identity theft, and damage to reputation and trust.

Ways to identify:
  • Unsolicited Requests for Funds: Be cautious of unsolicited emails, phone calls, or messages requesting urgent wire transfers or payments, especially if they claim to be from unfamiliar or unexpected sources.
  • Pressure to Act Quickly: Exercise caution if you're pressured to act quickly or keep the transaction confidential, as this is a common tactic used by fraudsters to prevent victims from verifying the legitimacy of the request.
  • Suspicious Email Addresses or Domains: Pay attention to the sender's email address and domain name to identify any inconsistencies or irregularities that may indicate a fraudulent communication.
  • Requests for Sensitive Information: Beware of requests for sensitive personal or financial information, such as account numbers, passwords, or Social Security numbers, especially if they're solicited through unsolicited communications.
  • Unusual Transaction Details: Scrutinize the details of the transaction, including the recipient's account information and payment instructions, for any irregularities or discrepancies that may signal potential fraud.
How to avoid:
  • Verify Requests Through Trusted Channels: Before initiating any wire transfers or payments, independently verify the authenticity of the request through trusted channels, such as contacting the purported sender directly using verified contact information.
  • Implement Dual Authorization Procedures: Implement dual authorization procedures for wire transfers and financial transactions within your organization, requiring approval from multiple authorized individuals to mitigate the risk of unauthorized transactions.
  • Use Secure Communication Channels: Whenever possible, communicate sensitive financial information and instructions through secure channels, such as encrypted email or secure messaging platforms, to reduce the risk of interception and manipulation by fraudsters.
  • Exercise Caution with Email Attachments and Links: Avoid clicking on links or downloading attachments from unsolicited or suspicious emails, as they may contain malware or phishing attempts designed to compromise your personal and financial information.
  • Regularly Monitor Accounts: Routinely monitor your bank accounts, financial statements, and transaction history for any unauthorized or suspicious activity, and report any discrepancies or concerns to your financial institution promptly.
Resources:
https://www.m1cu.org/news/articles/understanding-wire-fraud

Phishing/smishing

Phishing and smishing are forms of social engineering tactics used by cybercriminals to trick individuals into divulging sensitive information or performing actions that compromise their security. Phishing typically occurs through email communication, while smishing involves text messages (SMS) or other messaging platforms. Both methods often involve impersonating legitimate entities, such as banks, government agencies, or reputable organizations, to deceive victims into providing personal information, clicking on malicious links, or downloading harmful attachments.

Phishing and smishing attacks can lead to various consequences, including identity theft, financial fraud, malware infections, and unauthorized access to sensitive accounts or information. These deceptive techniques exploit human vulnerabilities and rely on psychological manipulation to persuade victims to take actions that benefit the attackers.

Ways to identify:
  • Urgent Requests: Be wary of emails or messages that convey a sense of urgency, such as threats of account suspension, legal action, or imminent consequences if immediate action is not taken.
  • Suspicious Links: Scrutinize hyperlinks embedded in emails or messages by hovering your mouse cursor over them to reveal the actual URL. Beware of URLs that appear altered, misspelled, or lead to unfamiliar or suspicious domains.
  • Unsolicited Attachments: Avoid opening attachments or downloading files from unsolicited emails or messages, especially if they prompt you to enable macros or execute scripts, as they may contain malware or ransomware.
  • Unusual Requests for Information: Be cautious of requests for sensitive information, such as account credentials, Social Security numbers, or financial details, especially if they're solicited through unsolicited communications.
  • Poor Grammar and Spelling: Pay attention to the quality of language used in emails or messages, as phishing attempts often contain grammatical errors, spelling mistakes, or awkward phrasing that may indicate fraudulent communication.
How to avoid:
  • Verify Sender Identities: Verify the authenticity of the sender's identity and the legitimacy of the communication through alternative channels, such as contacting the purported sender directly using verified contact information.
  • Educate Yourself and Others: Educate yourself and others about common phishing and smishing tactics, warning signs, and best practices for identifying and reporting suspicious communications.
  • Enable Two-Factor Authentication (2FA): Enable two-factor authentication (2FA) on your accounts whenever possible to add an extra layer of security and prevent unauthorized access, even if your credentials are compromised.
  • Use Security Software: Install and regularly update reputable antivirus, anti-malware, and spam filtering software to help detect and block phishing attempts, malicious links, and suspicious attachments.
  • Exercise Caution with Personal Information: Avoid sharing sensitive personal or financial information online or over the phone unless absolutely necessary and only with trusted and verified entities.
  • Stay Informed: Stay informed about emerging phishing and smishing trends, security threats, and cybersecurity best practices by following reliable sources of information and staying up to date with the latest security updates and advisories.
Resources:
https://www.m1cu.org/news/articles/smishing-text-message-scams-on-the-rise
https://www.m1cu.org/news/articles/fraud-notice-text-phishing
https://www.m1cu.org/news/articles/protecting-yourself-from-the-rising-threat-of-online-fraud
https://www.m1cu.org/news/articles/social-engineering-and-how-to-you-protect-yourself
https://www.m1cu.org/news/articles/smishing-scams-dont-click-the-link

Elder scams

Elder scams target older adults, often exploiting their trust, cognitive decline, and financial vulnerability for fraudulent purposes. These scams come in various forms, including telemarketing scams, investment schemes, healthcare fraud, romance scams, and identity theft. Elderly individuals are particularly susceptible to these schemes due to factors such as social isolation, diminished cognitive abilities, and limited familiarity with modern technology.

Elder scams can have devastating consequences, including financial loss, emotional distress, deterioration of physical and mental health, and loss of independence. Protecting elderly individuals from financial exploitation requires awareness, education, and proactive measures to identify and prevent scams targeting this vulnerable population.

Ways to identify:
  • Unsolicited Contact: Be wary of unsolicited phone calls, emails, or letters promising prizes, awards, or investment opportunities, especially if they request personal or financial information.
  • Pressure to Act Quickly: Scammers often employ high-pressure tactics, urging victims to make immediate decisions or send money urgently. Be skeptical of any demands for immediate action or secrecy.
  • Requests for Personal Information: Be cautious about sharing sensitive personal information, such as Social Security numbers, bank account details, or Medicare information, especially in response to unsolicited requests.
  • Offers That Sound Too Good to Be True: Exercise caution when presented with offers or deals that seem overly generous or too good to be true. Always conduct thorough research and seek advice from trusted family members, friends, or financial advisors before making any financial decisions.
  • Unexplained Withdrawals or Transactions: Keep an eye out for unexplained withdrawals or transactions from bank accounts, sudden changes in financial behavior, or missing valuables, as these may indicate financial exploitation or fraud.
How to avoid:
  • Stay Informed and Educated: Educate yourself and elderly loved ones about common elder scams, warning signs, and strategies for protecting against financial exploitation. Encourage open communication about financial matters and empower them to ask questions and seek assistance when needed.
  • Set Up Trusted Contacts: Establish trusted contacts, such as family members, friends, or caregivers, who can help monitor financial transactions, provide support, and intervene if suspicious activity is detected.
  • Verify Identity and Legitimacy: Before responding to any requests for personal or financial information, verify the identity and legitimacy of the individual or organization contacting you. Use trusted sources, such as official websites or phone numbers, to confirm the authenticity of requests.
  • Implement Security Measures: Implement security measures, such as caller ID, call blocking services, and privacy settings on electronic devices, to reduce the risk of unsolicited contact from scammers.
  • Report Suspected Scams: If you suspect you or an elderly loved one has been targeted by an elder scam, report the incident to local law enforcement, adult protective services, and relevant regulatory agencies, such as the Federal Trade Commission (FTC) or the Consumer Financial Protection Bureau (CFPB).
  • Seek Legal and Financial Advice: Consult with legal and financial professionals for guidance on estate planning, power of attorney arrangements, and other measures to safeguard assets and protect against financial exploitation.
Resources:
https://www.m1cu.org/news/articles/a-scary-story-elder-financial-abuse
https://www.m1cu.org/news/articles/how-to-avoid-senior-scams

Romance and Employment scams

Romance and employment scams are prevalent forms of online fraud that target individuals seeking companionship or job opportunities. In romance scams, perpetrators create fake profiles on dating websites or social media platforms to establish romantic relationships with victims, often with the intention of manipulating them into sending money or personal information. Employment scams involve fraudulent job offers or opportunities that lure unsuspecting individuals into providing sensitive personal or financial information or performing illegal activities.

Both romance and employment scams exploit trust, vulnerability, and emotional connections to deceive victims and extract financial or personal gain. Recognizing the warning signs and implementing proactive measures are essential steps in protecting oneself from falling victim to these deceptive practices.

Ways to identify:
  • Unsolicited Contact: Be cautious of unsolicited messages, emails, or social media requests from individuals claiming romantic interest or offering employment opportunities, especially if they come from unfamiliar or unverified sources.
  • Quick Declarations of Love or Friendship: Beware of individuals who quickly declare their love, affection, or friendship, especially if you have just met them online. Scammers often use flattery and exaggerated expressions of affection to gain trust and manipulate emotions.
  • Requests for Money or Financial Assistance: Exercise extreme caution if the individual you met online requests money or financial assistance, particularly if they provide elaborate stories or excuses for why they need it. This is a common tactic used in romance scams to exploit victims' generosity and compassion.
  • Incomplete or Suspicious Job Offers: Scrutinize job offers that seem too good to be true or lack specific details about job responsibilities, salary, or company information. Be wary of requests to provide personal or financial information upfront, as legitimate employers typically do not require such information during the initial stages of recruitment.
  • Poor Grammar and Spelling: Pay attention to the quality of written communication, including grammar, spelling, and syntax. Many scammers operate from foreign countries and may use poor English language skills in their correspondence.
How to avoid:
  • Verify Identities and Information: Before engaging in romantic relationships or accepting job offers from unknown individuals, verify their identities and conduct thorough research to confirm the legitimacy of their profiles, companies, or organizations.
  • Never Send Money to Strangers: Refrain from sending money, gift cards, or personal information to individuals you meet online, especially if you have not met them in person or have doubts about their intentions.
  • Meet in Public Places: If you decide to meet someone you met online in person, arrange to meet in a public place and inform a trusted friend or family member about your plans.
  • Trust Your Instincts: Trust your instincts and be wary of any situation that feels suspicious or uncomfortable. If something seems too good to be true or raises doubts, proceed with caution and seek advice from trusted sources.
  • Use Trusted Platforms and Resources: Utilize reputable dating websites, job search platforms, and professional networks that prioritize user safety and security. Report suspicious profiles or job postings to the platform administrators for investigation and removal.
  • Educate Yourself and Others: Stay informed about the latest trends and tactics used in romance and employment scams, and educate friends, family members, and colleagues about the risks and warning signs associated with these fraudulent practices.
Resources:
https://www.m1cu.org/news/articles/dont-be-wooed-from-romance-scams
https://www.m1cu.org/news/articles/the-dark-side-of-online-love-how-to-spot-and-avoid-romance-scams

Holiday Scams

Holiday scams are schemes and fraudulent activities that target individuals during the festive season when spending and online transactions typically increase. Scammers take advantage of the holiday spirit, excitement, and distractions to deceive people into providing personal information, making unauthorized purchases, or falling victim to financial fraud. Common holiday scams include fake charities, online shopping scams, travel scams, and gift card fraud.

During the holiday season, it's essential to remain vigilant and cautious to protect yourself and your loved ones from falling prey to these deceptive practices. Recognizing the signs of holiday scams and adopting proactive measures are crucial steps in safeguarding your finances and personal information.

Ways to identify:
  • Unsolicited Emails or Messages: Be wary of unsolicited emails, text messages, or social media posts offering holiday deals, discounts, or prizes, especially if they come from unknown or unverified sources.
  • Pressure to Act Quickly: Watch out for messages or offers that pressure you to act quickly or claim that time is running out. Scammers often use urgency and scarcity tactics to prompt impulsive decisions.
  • Too Good to Be True Offers: Exercise caution if an offer or deal seems too good to be true. Scammers may lure victims with unrealistic discounts, free gifts, or extravagant prizes to entice them into providing personal or financial information.
  • Requests for Personal Information: Be cautious about sharing sensitive personal information, such as credit card numbers, Social Security numbers, or passwords, especially in response to unsolicited requests or offers.
  • Suspicious Websites or Links: Avoid clicking on links or visiting websites that appear suspicious or have misspelled URLs. Phishing websites often mimic legitimate retailers or charities to deceive visitors into providing personal information or making purchases.
How to avoid:
  • Shop from Reputable Retailers: Purchase holiday gifts and merchandise from reputable, established retailers with secure websites and verified payment systems. Avoid shopping on unfamiliar or suspicious websites that lack encryption or security features.
  • Verify Charity Appeals: Before donating to charities or fundraisers, research the organization's legitimacy and verify its charitable status through reputable sources such as Charity Navigator or the Better Business Bureau (BBB). Be cautious of high-pressure tactics or requests for cash donations.
  • Use Secure Payment Methods: Opt for secure payment methods such as credit cards or PayPal when making online purchases. These payment methods offer additional fraud protection and dispute resolution services in case of unauthorized charges or fraudulent transactions.
  • Monitor Financial Statements: Regularly review your bank and credit card statements for any unauthorized or suspicious charges. Report any discrepancies or fraudulent transactions to your financial institution immediately.
  • Be Skeptical of Unsolicited Offers: Exercise caution when receiving unsolicited offers, deals, or prizes, especially if they require payment or personal information to claim. Verify the legitimacy of the offer through independent research or by contacting the company directly.
  • Stay Informed: Stay informed about common holiday scams and fraud trends by following updates from trusted sources such as consumer protection agencies, law enforcement, and financial institutions. Share information and warnings with friends and family to help them stay vigilant as well.
Resources:
https://www.m1cu.org/news/articles/how-to-avoid-black-friday-scams-and-shop-safely
https://www.m1cu.org/news/articles/dont-let-scammers-steal-your-joy-this-holiday-season

Non-profit scams

Non-profit scams involve fraudulent activities that exploit the goodwill and charitable intentions of individuals and organizations. These scams often target donors, volunteers, and beneficiaries of non-profit organizations by misrepresenting their mission, misappropriating funds, or engaging in other deceptive practices. Non-profit scams can take various forms, including fake charity appeals, fraudulent fundraising campaigns, and misuse of charitable funds for personal gain.

Perpetrators of non-profit scams may create fake organizations, impersonate legitimate charities, or mislead donors about the use of funds to deceive unsuspecting individuals into contributing money or resources. These scams not only defraud donors and undermine public trust in charitable organizations but also divert critical resources away from legitimate causes and beneficiaries.

Ways to identify:
  • Pressure to Donate Immediately: Be wary of high-pressure tactics or aggressive solicitation techniques used by individuals or organizations seeking donations. Legitimate charities respect donors' autonomy and do not pressure them to contribute funds immediately or without careful consideration.
  • Lack of Transparency: Investigate the transparency and accountability practices of non-profit organizations before making donations. Legitimate charities provide clear information about their mission, programs, financial management, and impact to donors and the public.
  • Unsolicited Requests for Donations: Exercise caution when approached by individuals or organizations soliciting donations through unsolicited phone calls, emails, or door-to-door visits. Verify the legitimacy of the charity and the authenticity of the solicitation before making any contributions.
  • Minimal Information Available: Beware of charities that provide minimal information about their programs, beneficiaries, or financial management practices. Legitimate organizations are transparent about their activities and provide detailed information to donors and stakeholders upon request.
  • Refusal to Provide Documentation: Request documentation, such as IRS determination letters, annual reports, and audited financial statements, from charities soliciting donations. Legitimate non-profits willingly provide this information to demonstrate their compliance with legal and ethical standards.
How to avoid:
  • Research Charities Thoroughly: Conduct thorough research on non-profit organizations before making donations. Use reputable charity evaluation websites, such as Charity Navigator, GuideStar, and CharityWatch, to assess the credibility, effectiveness, and transparency of charities.
  • Donate Directly to Established Charities: Donate directly to well-established and reputable charities with a proven track record of impact and accountability. Avoid donating to unfamiliar or newly formed organizations without a documented history of charitable work.
  • Verify Tax-exempt Status: Verify the tax-exempt status of non-profit organizations by searching the IRS Tax Exempt Organization Search database. Legitimate charities are registered with the IRS and eligible to receive tax-deductible donations.
  • Be Skeptical of Unsolicited Appeals: Exercise caution when responding to unsolicited requests for donations, especially from individuals or organizations you are not familiar with. Verify the legitimacy of the charity and the authenticity of the solicitation before making any contributions.
  • Monitor Your Donations: Keep records of your donations and monitor your bank statements and credit card transactions for any unauthorized or fraudulent charges. Report suspicious activity to your financial institution and the appropriate authorities promptly.
Resources:
https://www.m1cu.org/news/articles/safeguarding-your-generosity-understanding-non-profit-scams-

ATM fraud

ATM fraud encompasses various deceptive practices aimed at compromising individuals' financial information and assets through Automated Teller Machines (ATMs). Perpetrators of ATM fraud employ sophisticated techniques such as card skimming, card trapping, cash trapping, and PIN theft to steal sensitive information and carry out unauthorized transactions. ATM fraud poses significant risks to individuals' financial security and can result in monetary losses, identity theft, and compromised personal information.

Ways to identify:
  • Physical Inspection of the ATM: Check the ATM for any suspicious devices or attachments, such as card skimmers or keypad overlays, which may be used to capture card information and PINs.
  • Irregularities in Card Slots or Keypads: Be cautious if the card slot feels loose, protrudes outward, or appears tampered with, as these may indicate the presence of card skimmers or trapping devices.
  • Observing Nearby Individuals: Beware of individuals loitering around the ATM or behaving suspiciously, as they may be attempting to steal card information or observe PIN entries.
  • Unusual Account Activity: Monitor your bank account statements and transaction history regularly for any unauthorized withdrawals, purchases, or transfers, which may indicate fraudulent activity originating from ATM transactions.
  • Inability to Retrieve Cards or Cash: If the ATM fails to return your card or dispense cash after completing a transaction, refrain from re-entering your PIN and report the incident to your bank immediately.
How to avoid:
  • Use ATMs in Secure Locations: Preferably use ATMs located in well-lit, populated areas or within bank branches, as they are less susceptible to tampering and unauthorized access.
  • Cover Your PIN: Shield the keypad with your hand or body while entering your PIN to prevent others from observing or recording your personal identification number.
  • Regularly Monitor Account Activity: Routinely review your bank statements, transaction history, and account balances to detect any unauthorized or suspicious activity promptly.
  • Choose Secure ATMs: Prioritize using ATMs equipped with security features such as EMV chip technology, which provides enhanced protection against card skimming and counterfeit card fraud.
  • Notify Your Bank of Suspicious Activity: Immediately report any suspicious or unauthorized transactions, lost or stolen cards, or suspected ATM tampering to your bank or card issuer.
  • Enable Transaction Alerts: Opt-in to receive real-time alerts or notifications from your bank for any ATM withdrawals or transactions exceeding a specified threshold, enabling you to detect and address potential fraud promptly.
  • Be Cautious of Phishing Attempts: Be wary of phishing emails, text messages, or phone calls requesting your personal or financial information, and avoid responding or providing sensitive details to unverified sources.
Resources:
https://www.m1cu.org/news/articles/bank-jugging-what-it-is-and-how-do-you-protect-yourself

Identity theft

Identity theft is a pervasive and damaging form of fraud that occurs when someone unlawfully obtains and uses another individual's personal information for fraudulent purposes. Perpetrators of identity theft may use stolen identities to open fraudulent accounts, make unauthorized purchases, obtain loans, or engage in criminal activities, causing significant financial losses and personal distress to victims. Identity theft can occur through various means, including data breaches, phishing scams, stolen wallets or documents, and social engineering tactics.

Ways to identify:
  • Unexplained Financial Activity: Monitor your financial accounts regularly for any unexplained withdrawals, unauthorized charges, or unfamiliar transactions, which may indicate fraudulent activity conducted using your identity.
  • Missing Mail or Documents: Be vigilant for missing mail, statements, or official documents, as well as notifications of accounts or services you did not apply for, which could be signs of identity theft.
  • Unusual Changes in Credit Report: Review your credit report periodically for any unfamiliar accounts, inquiries, or discrepancies in your personal information, as these may indicate potential identity theft.
  • Unexpected Denials of Credit or Services: If you receive unexpected denials of credit, loans, or services, despite having a good credit history, it could be a red flag for identity theft or unauthorized activities affecting your creditworthiness.
  • Notices from Government Agencies or Financial Institutions: Pay attention to notifications or alerts from government agencies, financial institutions, or creditors regarding suspicious activities or unauthorized access to your accounts or personal information.
How to avoid:
  • Secure Personal Information: Safeguard your personal information, including Social Security numbers, birth dates, financial account details, and passwords, by storing them securely and avoiding unnecessary disclosure to others.
  • Use Strong Passwords and Authentication: Create strong, unique passwords for online accounts and enable multi-factor authentication whenever possible to add an extra layer of security against unauthorized access.
  • Be Cautious Online: Exercise caution when sharing personal information online, especially on social media platforms, public Wi-Fi networks, or unsecured websites, to minimize the risk of data exposure to cybercriminals.
  • Shred Sensitive Documents: Shred or securely dispose of documents containing personal or financial information before discarding them to prevent dumpster diving or theft of sensitive information.
  • Monitor Financial Accounts: Regularly monitor your bank statements, credit card transactions, and credit reports for any signs of suspicious activity or unauthorized access, and report any discrepancies to your financial institution immediately.
  • Be Wary of Phishing Attempts: Be skeptical of unsolicited emails, text messages, or phone calls requesting personal or financial information, and avoid clicking on suspicious links or downloading attachments from unknown sources to mitigate the risk of falling victim to phishing scams.
  • Consider Identity Theft Protection Services: Consider enrolling in identity theft protection services offered by reputable companies, which can provide proactive monitoring, alerts, and assistance in the event of identity theft or fraudulent activities.
Resources:
https://www.m1cu.org/news/articles/protecting-yourself-from-identity-theft

Merchant data breaches

Merchant data breaches occur when cybercriminals gain unauthorized access to merchants' payment systems or databases, compromising sensitive financial information such as credit card numbers, expiration dates, and cardholder names. These breaches pose significant risks to both consumers and merchants, leading to financial losses, identity theft, and damage to trust and reputation. Merchant data breaches can result from various vulnerabilities in payment processing systems, including malware infections, phishing attacks, weak security controls, and insider threats.

Ways to identify:
  • Unexplained Charges or Unauthorized Transactions: Monitor your financial statements and transaction history for any unexplained charges, unfamiliar transactions, or discrepancies in payment records, which may indicate potential unauthorized use of your payment information.
  • Notifications from Financial Institutions: Pay attention to notifications or alerts from your bank or credit card issuer regarding suspicious activity, unusual spending patterns, or potential data breaches affecting your accounts.
  • Data Breach Announcements: Stay informed about data breach announcements and security advisories issued by merchants, financial institutions, and regulatory agencies, which may provide details about compromised payment systems or affected customers.
  • Increased Phishing Attempts: Be wary of an uptick in phishing attempts, fraudulent emails, or scam calls impersonating legitimate businesses or financial institutions, which may exploit the aftermath of a data breach to trick individuals into disclosing personal or financial information.
How to avoid:
  • Use Trusted Merchants and Payment Methods: Prioritize making purchases from reputable merchants and using secure payment methods such as credit cards or digital wallets, which offer enhanced fraud protection and dispute resolution mechanisms.
  • Enable Transaction Alerts: Opt-in to receive real-time transaction alerts or notifications from your bank or credit card issuer for any unusual or suspicious activity on your accounts, enabling you to detect and report potential fraud promptly.
  • Monitor Account Activity Regularly: Routinely monitor your bank statements, credit card transactions, and online accounts for any signs of unauthorized activity or fraudulent charges and report any discrepancies to your financial institution immediately.
  • Exercise Caution with Personal Information: Be cautious about sharing sensitive personal or financial information, especially in response to unsolicited requests or communications from unknown sources and verify the legitimacy of the requestor before disclosing any information.
  • Update Software and Security Controls: Keep your devices, software applications, and security controls up to date with the latest patches, updates, and security enhancements to mitigate the risk of malware infections, vulnerabilities, and cyberattacks targeting payment systems.
  • Be Vigilant for Red Flags: Be vigilant for common red flags of potential data breaches, including unusual system behavior, unexpected error messages, and unauthorized access attempts, and promptly investigate and address any suspicious activity to prevent further compromise.
Resources:
https://www.m1cu.org/news/articles/protecting-your-finances-understanding-merchant-data-breaches

Digital security

Digital security encompasses the protection of digital assets, information, and systems from unauthorized access, cyberattacks, and data breaches. In today's interconnected world, where individuals and organizations rely heavily on digital technologies for communication, commerce, and information sharing, ensuring robust digital security measures is paramount. Digital security involves implementing proactive strategies, adopting best practices, and leveraging technology to mitigate cyber risks and safeguard sensitive data from malicious actors and cyber threats.

Ways to identify:
  • Unusual System Behavior: Pay attention to any unusual or unexpected behavior exhibited by your computer systems, networks, or devices, such as slow performance, frequent crashes, or unauthorized access attempts, which may indicate the presence of malware or unauthorized activity.
  • Suspicious Emails or Messages: Be cautious of unsolicited emails, text messages, or social media messages containing suspicious links, attachments, or requests for sensitive information, as they may be phishing attempts or malware distribution vectors.
  • Unauthorized Access or Login Attempts: Monitor your accounts, systems, and network logs for any signs of unauthorized access, login attempts, or unusual login activity, which may indicate a potential security breach or account compromise.
  • Security Alerts and Notifications: Stay informed about security alerts, advisories, and updates issued by cybersecurity organizations, software vendors, and regulatory authorities regarding emerging threats, vulnerabilities, and software patches.
How to avoid:
  • Use Strong Authentication Methods: Implement strong authentication methods, such as multi-factor authentication (MFA) or biometric authentication, to enhance the security of your accounts and prevent unauthorized access to sensitive information.
  • Keep Software and Systems Updated: Regularly update your operating systems, software applications, and security tools with the latest patches, updates, and security fixes to address known vulnerabilities and protect against exploits and malware infections.
  • Exercise Caution Online: Exercise caution when browsing the internet, downloading files, or clicking on links, especially on unfamiliar or untrusted websites, as they may contain malicious content or phishing attempts designed to compromise your security and privacy.
  • Use Encryption for Sensitive Data: Encrypt sensitive data both in transit and at rest using encryption technologies and protocols to protect it from unauthorized access and interception by cybercriminals or eavesdroppers.
  • Implement Strong Password Policies: Create strong, unique passwords for each of your accounts and regularly update them to reduce the risk of password-based attacks and unauthorized access. Consider using password managers to securely store and manage your passwords.
  • Back Up Data Regularly: Regularly back up your important files, documents, and data to secure cloud storage or external storage devices to mitigate the impact of data loss or ransomware attacks and facilitate recovery in the event of a security incident.
  • Educate Yourself and Others: Stay informed about common cyber threats, phishing techniques, and best practices for digital security, and educate yourself and others, including employees, family members, and colleagues, on how to recognize and respond to potential security threats effectively.
Resources:
https://www.m1cu.org/news/articles/digital-account-security-best-practices
Apply now or speak with one of our loan officers at (800) 303-3838.

We may use tracking pixels, cookies, and other similar tools, which are provided by third parties, to improve our website, enhance your browsing experience, serve personalized ads or content, market our services, and analyze our traffic. By clicking "Accept & Close," you consent to our Consumer Privacy Policy and Digital Privacy Policy and our use of these technologies. By clicking "Accept & Close," you also recognize and accept that your data and other information you share with us on our website may be transmitted to third parties for the purposes we have identified in our Consumer Privacy Policy and Digital Privacy Policy.