Security Banking Tips From First National Bank of River Falls
Protect Yourself: Recognize, Report, and Prevent Fraud, Scams, and Identity Theft
Every year, billions of dollars are stolen by scammers and identity thieves, targeting unsuspecting individuals through sophisticated tactics. These criminals use emails, phone calls, texts, and online platforms to steal personal information or trick victims into sending money.
Stay informed and safeguard your finances by learning how to identify warning signs, report suspicious activity, and protect yourself from fraud, common scams, identity theft, and cybercrimes.
Click below to explore actionable tips and resources to stay a step ahead of cybercriminals.
Common Types of Frauds and Scams
Type of Fraud/Scam | Description |
Imposter Scams |
Imposters often disguise themselves as someone you trust—a family member, friend, or representative from organizations like the NCUA, IRS, or Social Security Administration. They may also pose as tech support agents or representatives of companies you do business with. Their goal? To gain your trust and steal your personal information or convince you to buy gift cards, send digital currency, or transfer money. Stay vigilant. Legitimate government agencies, including the NCUA, will never ask for money or your personal and financial information. If you’re unsure whether a request is legitimate, do not send money or share sensitive information. Instead, end the communication immediately and contact the organization directly to verify their claims. |
Online Shopping Scams |
Online shopping scams can happen in various ways, from paying for products that never arrive to losing money and sensitive payment information on fake websites or apps. Scammers create fraudulent websites that mimic trusted retailers and design counterfeit apps embedded with malware to steal your data and money.
|
Prizes, Sweepstakes, and Lotteries |
Scammers may contact you claiming you’ve won a prize, sweepstakes, or lottery, then demand money or account details to cover "taxes" or "fees" upfront. They might impersonate government agencies or claim you've won a foreign lottery—common signs of a scam. Protect Yourself from Prize Scams:
|
Investment Fraud |
Investment fraud comes in many forms, including Ponzi schemes and pyramid scams. A Ponzi scheme pays returns to earlier investors using funds from new investors, while pyramid scams operate similarly. Often, these scams promise high investment returns without actually investing your money. Despite their names, most investment scams share common red flags: guaranteed high returns with no risk and high-pressure sales tactics. How to Protect Yourself from Investment Fraud:
|
Business and Job Opportunity Scams |
Scammers frequently advertise fake job and business opportunities that sound too good to be true. Promises like "minimal work with a high salary," "guaranteed income," or a "proven business operation system" are red flags. These scams often disguise themselves as legitimate job offers, mentoring programs, or business opportunities to exploit your money and steal personal information. Tips to Protect Yourself:
|
Fake Check Scams |
Fake check scams follow a common pattern: scammers send you a cashier’s check or money order and ask you to return a portion of the money using gift cards, money orders, or cryptocurrency. While the check may initially clear, it’s later identified as fraudulent, leaving you responsible for repaying the deposited funds to your credit union or bank. How to Protect Yourself from Fake Check Scams:
|
Check Washing Scams |
Check washing scams involve criminals altering checks by changing the payee names and often increasing the dollar amounts before fraudulently depositing them. Scammers frequently steal these checks from mailboxes and use chemicals to erase ink, allowing them to rewrite the check details. How to Stay Safe from Check Washing Scams:
|
Disaster Fraud |
Disaster fraud occurs when scammers exploit vulnerable individuals during crises. Common tactics include posing as fake government employees or representatives of bogus charities. These fraudsters aim to steal your money and financial information under the guise of offering recovery assistance. Tips to Protect Yourself from Disaster Fraud:
|
Romance Scams |
Romance scams occur when scammers create fake online identities to gain your trust and affection. They manipulate you into believing you’re in a close or romantic relationship. These scammers often promise to meet in person but never follow through, claiming to be working abroad or dealing with emergencies. Their ultimate goal? To ask for money or trick you into sharing sensitive information. How to Protect Yourself from Romance Scams:
|
Identity theft occurs when someone steals your personal information without permission to commit fraud. Thieves use stolen identities to apply for credit, file taxes, obtain medical services, or impersonate victims during legal issues. These fraudulent activities can severely harm your credit score, finances, and reputation, costing you significant time and money to resolve.
Protect Your Identity:
- Monitor your financial accounts and credit reports regularly.
- Avoid sharing sensitive information online or over the phone unless you trust the source.
- Use strong, unique passwords for your accounts and enable multi-factor authentication when available.
How Scammers Steal Personal Information: Common Tactics to Watch For
Scammers use various methods to steal your personal information and commit fraud. Here are some common tactics:
- Wallet or Purse Theft: Scammers steal your ID, credit, or debit cards for fraudulent use.
- Public Wi-Fi and USB Charging Scams: Thieves can access your personal data when you use unsecured networks or public USB charging stations.
- Data Breaches: Scammers exploit breaches to obtain sensitive information like passwords or account numbers.
- Social Media Snooping: Fraudsters look through your social profiles for personal details like your name, birthdate, or address.
- Phishing Attacks: Scammers trick you into sharing personal information through fake emails, texts, or websites (see our Cybersecurity section for more details).
- Skimming Devices: Card readers installed at ATMs, cash registers, or fuel pumps capture card numbers and PINs.
- Mail Theft or Diversion: Criminals intercept mail or submit fraudulent change-of-address forms to gain access to sensitive documents.
- Dumpster Diving: Scammers rummage through trash for credit union statements or other personal information.
- Other Fraud Tactics: Scammers combine these methods with various types of fraud and scams to exploit victims.
Protect Yourself from Scammers:
- Use secure connections for online activities and avoid public Wi-Fi or USB charging stations.
- Regularly monitor your financial accounts for suspicious activity.
- Shred sensitive documents before discarding them.
- Be cautious about sharing personal information online or in public.
What to Do If Your Identity Is Stolen: A Step-by-Step Guide
Act quickly to prevent further misuse of your identity. Follow these essential steps immediately if your identity is stolen:
Step 1: Notify Companies Where Fraud Occurred
- Contact the fraud department of the companies involved.
- Inform them that your identity has been stolen and request account closure or suspension.
- Update login credentials for all affected accounts.
Step 2: Place a Fraud Alert and Review Credit Reports
- Request a fraud alert from one of the three main credit bureaus (Equifax, Experian, or TransUnion). The bureau you contact will notify the others.
- Fraud alerts are free, last one year (renewable), and make it harder for scammers to open new accounts.
- Access your free credit reports and review them for unauthorized accounts or transactions. Take notes for use in reports to authorities.
Step 3: Report Identity Theft
- File an identity theft report with the FTC and your local police department.
- These reports serve as proof that you are a victim of identity theft.
Step 4: Close Fraudulent Accounts and Dispute Charges
- Contact the companies where fraudulent accounts were opened or unauthorized charges occurred.
- Provide copies of the FTC identity theft report and police report.
- Request account closures, bogus charge removal, and written confirmation of the actions taken.
Step 5: Correct Your Credit Report
- Send an identity theft letter, along with your FTC report and proof of ID, to all three credit bureaus.
- You have the right to remove fraudulent information from your credit report.
Extra Protection: Fraud Alerts or Credit Freezes
- Extended Fraud Alert: Lasts up to 7 years and makes it even harder for scammers to open accounts.
- Credit Freeze: Restricts access to your credit report indefinitely until you lift or remove it, offering additional protection.
Visit IdentityTheft.gov for more information and resources to help recover your identity.
With cybercriminals worldwide continually developing new ways to exploit digital systems, staying vigilant and proactive in securing your online presence is essential to avoid potential damage.
Best Practices for Cyber Safety
Adopting these habits ensures your online safety and security.
1. Enable Multifactor Authentication (MFA):- MFA adds an extra layer of security by requiring additional identification, like a PIN, fingerprint, or confirmation text, along with your password.
- Opt-in to MFA whenever prompted by websites and applications for stronger protection.
- Cybercriminals exploit known vulnerabilities. Regular updates and security patches for operating systems, antivirus software, and apps protect against cybercrime.
- Enable automatic updates for seamless protection.
- Phishing is a leading cause of data breaches. Avoid clicking on unsolicited links or attachments in emails, texts, or calls.
- Never share sensitive information unless absolutely necessary. Trust your instincts—if something seems suspicious, don’t click.
- Create long, unique, and random passwords using all character types.
- Use a password manager to generate and securely store your passwords.
Different Types of Cybercrimes
Types of Cybercrime | Description |
Business Email Compromise (BEC) |
BEC scams target businesses and individuals, evolving from simple fake email requests for urgent wire transfers to sophisticated schemes. Scammers now hack real business email accounts using social engineering or hacking to authorize unauthorized fund transfers. Many now use cryptocurrency platforms to quickly disperse stolen funds. How to Protect Yourself:
|
Ransomware |
Ransomware is malicious software (malware) that blocks access to your files, systems, or devices. It’s often installed via phishing emails, malicious downloads, or infected drives. Cybercriminals demand payment to unlock your data or threaten to destroy or leak it. How to Stay Safe:
If You’re Attacked:
|
Spoofing |
Spoofing scams involve falsifying email addresses, sender names, phone numbers, or website URLs to make them appear from a trusted source. Scammers use this tactic to trick you into downloading malware, sending money, or sharing sensitive personal or financial information. Spoofing is often linked to other crimes. How to Stay Safe from Spoofing Scams:
|
Phishing |
Phishing scams trick you into providing sensitive information by mimicking legitimate businesses. Scammers send emails, texts, or social media messages with links to fake websites designed to look real. These sites ask for details like Social Security numbers, login credentials, or personal information, which scammers then use to steal money or sell your data to others. How to Stay Safe from Phishing Scams:
|
Technical Support Impersonation Scams |
Scammers pose as tech support, claiming you have an expensive subscription renewal. They convince you to grant remote access to your computer, stealing sensitive information and conducting unauthorized transfers. Almost half of victims are over 60. Protect Yourself:
|
If you find out you’ve been scammed, there may still be something that can be done to stop the further damage.
Where to report
If you suspect a fraud, scam, identity theft, or cybercrime, report to as many agencies as possible.
What to Report | Where to Report |
Report anything you think may be identity theft - in a scam, cybercrime, or data breach - and get a recovery plan. | Identitytheft.gov |
Report unwanted calls from telemarketers and register you number on the national do not call registry. | Donotcall.gov |
Report anything you think may be a fraud, scam, or bad business practice. | Reportfraud.ftc.gov |
Report any suspected cybercrime. | Ic3.gov |
Report a suspected investment fraud or a problem with your investments. | Sec.gov |
Report a potentially fraudulent, illegal, or unethical investment activity. | Finra.org |
Report a violation of the Commodity Exchange Act or Commission regulations. | Cftc.gov |
Report a suspected financial/economic crime or fraud (e.g., mortgage fraud or investment fraud). | Fbi.gov |
Report any fraud related to natural or man-made disasters. | Justice.gov |