• There are no suggestions because the search field is empty.

10 Ways to Foil Cyberfraudsters

Untitled design (15)-734912-edited.jpg

Cybercrime dominated the headlines in 2016.  From the political accusations of foreign hacking to major hacks and distributed denial of service (DDoS) attacks, the far-reaching and ever-evolving activities of cybercriminals grabbed the national spotlight.

But cybercrime is definitely not limited to governments and major corporations.  It's a 24/7 concern for consumers--at least it should be. Here at Bank Independent, our cybersecurity team is deeply committed to protecting the personal and financial information entrusted to us by our customers. Part of that commitment includes providing consumers and businesses with up-to-date information and recommendations on measures you can take to prevent fraud at home and on-the-go.

The Federal Deposit Insurance Corporation (FDIC) newsletter FDIC Consumer News is always packed full of great tips for bank customers about how banks and bank customers can help prevent online fraud and theft. We highly recommend that you take a look at this special cybercrime edition, from which these tips are reprinted with permission:  

Reminders about 10 simple things bank customers can do to help protect their computers and their money from online criminals:

  1. Have computer security programs running and regularly updated to look for the latest threats.  Install anti-virus software to protect against malware (malicious software) that can steal information such as account numbers and passwords, and use a firewall to prevent unauthorized access to your computer. 
  2. Be smart about where and how you connect to the Internet for banking or other communications involving sensitive personal information.  Public Wi-Fi networks and computers at places such as libraries or hotel business centers can be risky if they don’t have up-to-date security software.
  3. Get to know standard Internet safety features.  For example, when banking or shopping online, look for a padlock symbol on a page (that means it is secure) and “https://” at the beginning of the Web address (signifying that the website is authentic and encrypts data during transmission). 
  4. Ignore unsolicited emails asking you to open an attachment or click on a link if you’re not sure it’s who truly sent it and why.  Cybercriminals are good at creating fake emails that look legitimate, but can install malware.  Your best bet is to either ignore unsolicited requests to open attachments or files or to independently verify that the supposed source actually sent the email to you by making contact using a published email address or telephone number.
  5. Be suspicious if someone contacts you unexpectedly online and asks for your personal information.  A safe strategy is to ignore unsolicited requests for information, no matter how legitimate they appear, especially if they ask for information such as a Social Security number, bank account numbers and passwords.
  6. Use the most secure process you can when logging into financial accounts.  Create “strong” passwords that are hard to guess, change them regularly, and try not to use the same passwords or PINs (personal identification numbers) for several accounts.
  7. Be discreet when using social networking sites.  Criminals comb those sites looking for information such as someone’s place of birth, mother’s maiden name or a pet’s name, in case those details can help them guess or reset passwords for online accounts. 
  8. Be careful when using smartphones and tablets.  Don’t leave your mobile device unattended and use a device password or other method to control access if it’s stolen or lost. 
  9. Parents and caregivers should include children in their cybersecurity planning.  Talk with your child about being safe online, including the risks of sharing personal information with people they don’t know, and make sure the devices they use to connect to the Internet have up-to-date security. 
  10. Small business owners should have policies and training for their employees on topics similar to those provided in this checklist for customers, plus other issues that are specific to the business.  For example, consider requiring more information beyond a password to gain access to your business’s network, and additional safety measures, such as requiring confirmation calls with your financial institution before certain electronic transfers are authorized. 

Throughout 2017 Bank Independent will continue to provide tips and best practices to help consumers and businesses prevent, detect and recover from cyberfraud.  Subscribe to the BI Blog to stay informed and visit our websitefor even more information.


Subscribe for Weekly Updates

Bank Independent does not endorse, nor is responsible for the content in the linked 3rd party websites. Bank Independent's privacy policies do not apply to these linked websites.

Bank Independent does not endorse, nor is responsible for the content in the linked 3rd party websites. Bank Independent's privacy policies do not apply to these linked websites.