Imposter scams rely on a victim’s sense of trust. Most people inherently trust well-known businesses and government agencies and would not expect to be scammed. Also, people are more likely to comply with unexpected requests or communications from what they deem a trusted source.
Criminals have been known to use email, texts, and particularly, phone calls to dupe victims. Often, they will mimic logos or spoof email addresses and phone numbers to appear as if the communication comes from a legitimate source. They may also have pieces of your confidential information including full name, address, date of birth and social security number – at least enough to convince the victim that the request is real.
The message from imposters is usually an urgent warning that requires immediate attention. Add in a threat of legal action, or potential consequences, and the victim turns their focus to solving the problem and less towards questioning the source.
Criminals are adept at social engineering. With minimal effort, they can easily find Information about your education, work history, and relationships through a variety of public records. Social media platforms like Facebook and Instagram or job boards like LinkedIn or Glassdoor can provide a wealth of information to include names of family, friends and coworkers, pets, birthdays, addresses, places you’ve recently visited and more.
Often, more detailed information can be found as a result of data breaches. Information such as email addresses, credit card information, financial services and partial social security numbers. With enough leading information, criminals can easily extract the rest directly from their victim. It is common for scam calls to increase after large data breaches. The caller may impersonate a retailer or your bank informing you that your debit or credit card has been compromised and they can help you resolve the issue. All they need is a bit more information from you.
Public records are widely available from the city level on up to the federal. Property, census and other legal records are accessible to anyone. Some private companies are even known to compile public information for resale because it is legal and profitable. That type of information in the hands of a scammer is a goldmine.
Your personal information is valuable. Protect it as you would your other personal property. Be cautious of how you share your personal information and the ways you share it.
At Bank Independent, your security is our priority. We are proud to offer secure, digital banking channels through our Sync Online and Mobile Banking. You can monitor transactions, set notices and alerts, temporarily freeze your debit card, or report a lost or stolen card all within the app. You can contact our diligent and helpful Customer Service team Monday through Saturday from 8:00 a.m. to 8:00 p.m., or within the Sync app through Conversations.
If you ever have concerns about the legitimacy of a communication from Bank Independent, we recommend you contact us directly, log into online or mobile Sync app to verify transactions, use the secure Conversations feature to begin a chat or call our Customer Service team.