Tips for Spotting a Fraudulent Email
Personal Information Request
Provident will never ask you to respond to an email with any personal information. This includes your Social Security number (SSN) or your ATM or 24 Hour Access Plus Direct Talk Personal Identification Number (PIN) numbers
Threat of closing an account if information is not provided
This type of email informs you that your account will be closed if you fail to "authenticate" or verify your personal information. Provident will never ask you to confirm information in this manner.
Security or system emails.
This type of email indicates that the bank needs you to confirm important information. The email will ask you to update your information online. Provident will never ask you to confirm information in this manner.
An offer that sounds "too good to be true."
This email may ask that you complete a short survey in order to receive money credited to your account. It will ask for your account(s) and bank routing number(s) in order to complete the deposit to your account. Provident will never ask for your information in this manner.
Misspellings and/or grammatical errors.
Emails containing these issues are often an indicator of attempted fraud. Watch for typos, grammatical errors, awkward wording, and poor design.
Unusual URLs.
Many web pages and emails will display the destination URL of the link when you hover over the link with your cursor. (Please do not click the link) A URL formatted provident.suspicious.com will take you to a site that is not a part of the Provident web site even though Provident is contained within the URL.
Please, do not reply to any of these types of emails!
Tips for Secure Passwords
It is critical to use a highly secure password for all of your financial accounts. Never use passwords like your child's name, your pet's name, your Social Security number, your account or PIN number, or anything else that a person with the intention of performing fraud could easily discover. Passwords that are the most secure use at least 12 characters but preferably 16 and/or combinations of letters, numbers, and special characters. Do not just use an address, phone number, birthdate, or worst of all, simple passwords such as 1111 or 1234. For additional security, please change your password on a regular basis and do not use the same password for multiple accounts.
If you feel you have given out any personal information in regard to your Provident account(s) (such as your account number, password, or PIN), or typed it into a website that may not be legitimate, please contact us immediately. We will take the necessary steps to help you secure your account.
Common Sense Tips
Don't give out financial information such as account numbers, credit card numbers, ATM PIN number, and especially your Social Security number over the phone unless you have initiated the call and know the person/organization you are transacting business with. Please do not give this information to a stranger even if they claim to be representing Provident.
Report lost or stolen checks, credit cards, or ATM cards immediately.
Don't preprint your driver's license, telephone, or Social Security numbers on your checks.
Please notify Provident of any suspicious telephone inquiries that might ask for account information.
Don't write your (PIN) on or with your ATM or credit cards.
Remember that protecting your financial information is often asking the question: How can I protect myself?
Online Banking Account Protection That Works 24/7... Just Like You Do
Provident Bank's Online Banking Identity Verification feature
What is the security feature?
In order to make your online banking experience as secure as possible we have introduced a security feature that watches for uncharacteristic or unusual behavior involving your internet banking access. If anything out of the ordinary is detected, we will ask you to verify your identity.
How does it work?
In the rare case we detect any unusual or uncharacteristic activity, we will ask you to answer security questions or if there are problems with answering the questions, allow us to phone you to make sure that it is really you trying to sign on. Most of the time you will not notice that the security feature is even there, but it will still be protecting you 24 hours a day and 7 days a week.
Do I need to sign up for the security system?
The security system is automatically available to all of our customers. Expect to be prompted at some point while banking online to enter additional information. This may include choosing some security questions that only you know the answers to as well as supplying phone numbers where you can be reached while banking online. Once this occurs, you have added a layer of protection to your Online Banking access and best of all, it's free!
Frequently Asked Questions for our Identity Verification Feature
What is this security system?
As our customer, we know how you typically behave. For example, when and from where you normally access internet banking. If we detect any activities that do not seem like your typical behavior, we will prompt you to further verify your identity. This process will ensure us it is you and not someone else trying to access your information. This will only happen on rare occasions. Normally you will not be asked for any additional information. For example, if someone tries to sign in with your user name and password from a computer in a foreign country shortly after you have logged off from your normal computer at home, we may decide to verify that it is really you trying to access your account.
How do I sign up for the security system?
There is no need to sign up. The security is there right from the start! Expect to be prompted at some point while banking online to enter additional information. This may include choosing several security questions that only you know the answers to, as well as supplying phone numbers where you can be reached while banking online. Once this occurs you have added a layer of protection to your internet banking access!
How much will it cost?
There is absolutely no cost associated with the new security system.
When will I be asked for more information?
You will only be prompted to enter additional information when a particular activity or transaction appears to be unusual or uncharacteristic of your typical behavior. You will also be prompted to enter your information when you are first prompted to set up your security information.
What additional information will I be asked?
If any unusual or uncharacteristic behavior is detected, you will be asked to answer several of the security questions you chose. You may also be asked to answer an automated phone call.
What is unusual or uncharacteristic behavior?
Uncharacteristic or unusual behavior is anything that appears out-of-the-ordinary compared to how you normally would bank online and where you normally bank online. If the action being requested does not appear to be something you would normally do, we will ask you for more information to make sure it is really you and not an unauthorized user.
Will I be asked for more information all the time now?
No, you will only be asked for more information when unusual or uncharacteristic behavior is detected. This will most likely be a very rare occurrence.
How are you able to detect unusual or uncharacteristic behavior?
The security system takes into account factors such as the computers you typically use to access your account, or the typical security settings for your computer. Hundreds of factors, such as these, create a profile that is unique to you that allows us to make decisions about whether the person conducting a given activity appears to be really you.
How do I know it is working?
You only need to complete the set-up process once; afterwards the new security system will work automatically. That means you are being protected every moment; when you are online and more importantly when you are not.
How will my phone numbers be used?
If any unusual or uncharacteristic behavior is detected, you may be asked to answer an automated phone call. Once you answer the phone call, you will be prompted to enter the code that will appear on your computer screen at that time in order to verify your identity. Your phone numbers will not be sold to a third party, nor will they be used to contact you about marketing offers and promotions.
How many phone numbers should I provide?
You must provide at least one phone number but are encouraged to provide up to three. In case we need to verify your identity, you may receive an automated phone call at one of the numbers you have provided. It is important to provide numbers where you can be reached when you are banking online. For instance, if you bank online at work you should provide your work or cell phone number so you can be reached there. This will ensure you can continue your online banking session without any inconvenience.
What if I need to change my phone number?
If you need to change your phone number, please contact customer service at (800) 442-5201 Monday through Friday 8AM to 6PM and on Saturday 10AM to 2PM. You may also be occasionally asked to verify that your information is up to date during your Online Banking session.
What if I cannot be contacted at any of the phone numbers listed?
If you cannot be contacted at any of the phone numbers listed, please contact customer service at (800) 442-5201 Monday through Friday 8AM to 6PM and on Saturday 10AM to 2PM.
Is my personal information still safe?
Yes. In fact, your personal information is safer than ever before because we are making sure it is really you and not an unauthorized user trying to access your information.
I have already set up my contact numbers, why am I being asked for them again?
Occasionally we may prompt you to make sure that the information we have on file is up to date.
How will this help prevent online fraud?
If your user name and password are stolen, the fraudster would have to be able to answer your security questions correctly or answer a call at one of the numbers you provided before being able to access your information. If the user is not able to provide this information or be reached on the phone, the activity would be blocked. This added layer of security helps us protect your information.
I check my account very often, wouldn't I know if something unusual showed up on my account?
It is great you check your account! It is always a good idea to regularly monitor your account for any unusual activities (like payments you didn't make). This security service helps prevent those incidences from ever occurring, so when you check your account everything is exactly how it should be.
I share my computer with someone who has their own account. Can both of us still log in from this machine?
Yes, you can both use the same computer to log on to your individual accounts. There is no limit on how many people can log on the website from the same computer.
I already have anti-virus and a personal firewall. Why do I need this?
We are glad to hear you use anti-virus and a personal firewall. Be sure that you keep both software programs up to date for the best possible protection against viruses, Trojans, and hackers. This new security feature protects against other types of threats such as a stolen user name and password. It works with your other personal security programs, but it does not replace them.
Is Your Computer Secure?
If the computer you are currently using is not protected, identity thieves and other fraudsters may be able to get access and steal your personal information.
If you are using safety measures and good practices to protect your home computer, you can protect your privacy and your family. Here are some tips Provident would like to suggest to help you lower your risk while you're online.
Suggestions from Provident Bank
Install and use a firewall
Definition: A firewall is a software program or piece of hardware that blocks hackers from entering and using your computer. Hackers search the Internet in a similar manner as telemarketers automatically dial random phone numbers. They send out a ping (call) to thousands of computers and wait for a response. Firewalls prevent your computer from responding to these unsolicited calls. A firewall blocks communications to and from sources you don't permit. This is especially important if you have a high-speed Internet connection, like DSL or cable. Some computer operating systems have built-in firewalls that may be shipped in the "off" mode. Ensure that your firewall is on. To always be effective, your firewall must be set up correctly and updated regularly. You can check your online "Help" feature for specific instructions.
Install and use anti-virus software
Anti-virus software helps to protect your computer from viruses that can destroy your data, slow down/ crash your computer, or allow spammers to send email from your account. Anti-virus protection scans your computer and your incoming email for viruses, and then removes them. Anti-virus software must be updated regularly to cope with the latest "bugs" (viruses) circulating on the Internet. Most anti-virus software includes a feature to download updates automatically while you are online. Always make sure that the software is continually running and checking your system for viruses, especially if you download files from the Web or are checking your email. Set your anti-virus software to check for viruses when you first turn on your computer. You should also set the anti-virus software to scan your complete system at least twice a month.
Install and use anti-spyware software
Spyware is software installed without your consent or knowledge that has the ability to monitor your online activities and collect your personal information while you are surfing the Web. Certain types of spyware, called keyloggers, record everything you type in - including your passwords, credit card numbers, and financial information. Signs that your computer may be infected with spyware include a sudden influx of pop-up ads, being taken to websites you don't want to go to, and slower performance.
Spyware protection is included in some anti-virus software products. Review your anti-virus software documentation for information on how to activate the spyware protection options. You also purchase separate anti-spyware software programs. Keep your anti-spyware software up to date and run it regularly.
To avoid spyware in the first place, download software only from sites you know and trust. Piggybacking spyware is often an unseen cost of many "free" programs. Do not click on links in pop-up windows or in spam email.
Update and maintain your system and browser to protect your privacy
Hackers are continually searching and trying to find flaws and holes in operating systems and browsers. In order to protect your computer and all of your information on it, try to leave the security settings for your device and your browser to the defaults. Install updates to your system and browser regularly (as often as they are requested). You should consider taking advantage of automatic updating whenever available.
Secure your home wireless network
If you have a wireless network in your home, make sure you take precautions to secure it against hacking. Encrypt your home wireless communications. Select a wireless router that has an encryption feature and turn it on. WPA encryption is considered stronger than WEP. Your computer, router, and other equipment must use the same encryption type. If your router enables identifier broadcasting, be sure to disable it. Note the SSID name so you can connect your computers to the network manually. Hackers know the pre-set passwords of this kind of equipment. Be sure to change the default identifier on your router and the default administrative password. You may want to turn off your wireless network when you are not using it.
Remember that public "hot spots" found in many stores, restaurants and hotels may not be secure. It's safest to avoid accessing or sending sensitive personal or financial information over a public wireless network.
Is your company taking the steps necessary to safeguard information?
Most companies keep sensitive information in their files, whether it's names, Social Security numbers (SSN), credit cards, or other account data that identifies customers or employees. Businesses often need this information to fill orders, meet payroll, or perform other business functions. But if the information falls into the wrong hands, it can lead to fraud or identity theft. The cost of a security breach can be measured in the loss of your customers' trust and perhaps even a lawsuit, which makes safeguarding personal information just plain good business.
A sound data security plan is built on five key principles:
Take stock. Know what personal information you have in your files and on your computers.
Inventory all file storage and electronic equipment. Where does your company store sensitive data?
Talk with your employees and outside service providers to determine who sends personal information to your business, and how it is sent.
Consider all the ways you collect personal information from customers, and what kind of information you collect.
Review where you keep the information you collect, and who has access to it.
Scale down. Keep only what you need for your business.
Use Social Security numbers only for required and lawful purposes. Don't use SSNs as employee identifiers or customer locators.
Keep customer credit card information only if you have a business need for it. Change the default settings on your software that reads customers' credit cards.
Don't keep information you don't need. Review the forms you use to gather data - like credit applications and fill-in-the blank web screens for potential customers - and revise them to eliminate requests for information you don-t need.
Truncate the account information on electronically printed credit and debit card receipts you give your customers. You may include no more than the last five digits of the credit card number, and you must delete the card's expiration date.
Develop a written records retention policy, especially if you must keep information for business reasons or to comply with the law.
Lock it. Protect the information that you keep.
Put documents and other materials containing personally identifiable information in a locked room or file cabinet.
Remind employees to put files away, log off their computers, and lock their file cabinets and office doors at the end of the day.
Implement appropriate access controls for your building.
Encrypt sensitive information if you must send it over public networks.
Regularly run up-to-date anti-virus and anti-spyware programs on individual computers.
Require employees to use strong passwords.
Caution employees against transmitting personal information via email.
Create a laptop security policy, for within your office and when your employees are traveling.
Use a firewall to protect your computers and your network.
Set "access controls" to allow only trusted employees with a legitimate business need to access the network.
Monitor incoming Internet traffic for signs of security breaches.
Check references and do background checks before hiring employees who will have access to sensitive data.
Create a procedure to make sure that workers who leave your organization or transfer to another part of the company no longer have access to sensitive information.
Educate employees about how to avoid phishing and phone pretexting scams.
Visit OnGuardOnline.gov
for computer security tips, tutorials, and quizzes.
Pitch it. Properly dispose of what you no longer need.
Create and implement information disposal practices.
Dispose of paper records by shredding, burning, or pulverizing them.
Defeat dumpster divers by encouraging your staff to separate the stuff that's safe to trash from sensitive data that needs to be discarded with care.
Make shredders available throughout the workplace, including next to the photocopier.
Use wipe utility programs when disposing of old computers and portable storage devices.
Give business travelers and employees who work from home a list of procedures for disposing of sensitive documents, old computers, and portable devices.
Plan ahead. Create a plan for responding to security incidents.
Designate a response team led by a senior staff person.
Draft contingency plans for how your business will respond to different kinds of security incidents. Some threats may come out of left field; others - a lost laptop or a hack attack, to name just two - are unfortunate, but foreseeable.
Investigate security incidents immediately.
Create a list of who to notify - inside or outside your organization - in the event of a security breach.
Immediately disconnect a compromised computer from the Internet.
Identity Theft
Identity theft happens when a person uses your name, Social Security number (SSN), or some other personal, financial, or medical information without your permission to commit fraud and/or other crimes. Online threats like phishing, malware, or hacking may also lead to identity theft.
If your personal information is lost, stolen, or compromised, you can reduce the potential damage from identity theft.
View Our Identity Theft Flyer
Protect Your Identity
Do not give out personal or account information over the phone, by mail, emails or through the Internet unless you initiated the contact or you are sure you know who you are dealing with.
Never respond to unsolicited requests for your SSN, or requests to verify your financial information.
Secure your personal information in your home, especially if you have roommates, employ outside help or are having service work done in your home.
Guard your mail and trash from theft. Before discarding, shred all documents containing personal information. (Receipts, statements, etc.)
Check all credit card and bank statements monthly for accuracy.
Never open an email or click on the link provided in an email if you think it is fraudulent or is a request for personal information. Internet pages and email links may look like the official site. Call the institution or type in the site address you are familiar with instead of using the link provided in the email.
Obtain a copy of your credit report yearly and check it for accuracy. You can obtain a free copy of your credit report annually from the three major credit bureaus.
Report suspicious emails or calls to the Federal Trade Commission at:(877) IDTHEFT (438-4338)
If you Become a Victim
Put a Fraud Alert on Your Credit Reports
Contact one of the three nationwide credit reporting companies, so they can put a fraud alert on your credit report:
Equifax: (888) 378-4329 / Experian: (888) 397-3742 / TransUnion: (800) 680-7289
The one company you call is required to contact the others to place fraud alerts on your file.
A fraud alert may make it more difficult for an identity thief to open any accounts in your name. The alert is maintained on your credit report for at least 90 days. After you create an Identity Theft Report, you may request an extended alert on your file.
Review Your Credit Reports
After you place a fraud alert on your credit reports, you are entitled to one free copy of your credit report from each of the three credit reporting companies. Read and review the reports; verify that your name, address, SSN, accounts, and other information are correct.
If the report reflects accounts that you did not open or debts that are not yours, contact the credit reporting companies to report the fraud and have them corrected. You should also contact the security or fraud department of each company where an account was misused or opened without your consent. Ask the company to send you proof that the problem accounts have been corrected or closed.
Create an Identity Theft Report
An Identity Theft Report will help resolve issues with the credit reporting companies, debt collectors, and businesses that allowed the identity thief to open new accounts in your name. The Report can help you:
- Have fraudulent information permanently removed from your credit report
- Prevent a company from collecting debts that result from identity theft or selling the debts to other companies for collection
- Get an extended fraud alert placed on your credit report
Three steps are required to create an Identity Theft Report:
- File an identity theft complaint with the FTC. - Online: http://ftc.gov/idtheft / Phone: (877) 438-4338
- When you file your complaint with the FTC, obtain a copy of the FTC affidavit that shows the details of your complaint. The online complaint site describes how you can print your completed affidavit. If your complaint is filed by phone, ask the counselor how to get a copy of your affidavit.
- Take your completed FTC identity theft affidavit to your local police, or to the police where the theft occurred, and file a police report. Obtain a copy of the police report or the report number.
Your FTC identity theft affidavit plus your police report create an Identity Theft Report. Send a copy of the Identity Theft Report to each company where you report fraud. Request that they remove or correct fraudulent information on your accounts.
To learn more about how to protect your personal information and respond to identity theft go to http://identitytheft.gov
Privacy
Provident Bank values your trust and respects your expectation of privacy. As such, we are committed to maintaining the confidentiality of your personal financial information. This document outlines our privacy policy for visitors to our web site.
In addition to the protections you enjoy through our Online Privacy Policy, your online activities may also be covered by our Online Privacy Policy for consumers. This policy explains our collection, use, retention, and security of consumer information and applies to customers who obtain financial products and services primarily for personal, family, or household purposes.
At Provident Bank, protecting the privacy and security of your personal information is important to us. We collect, retain, and use information about you in order to administer our business and to provide quality products and services that may be of benefit to you. We consider safeguarding your financial information a fundamental part of our business philosophy.
Information We Collect
When you visit our website, we may collect the following information in order to service your accounts:
Information we receive from you on applications or other forms (such as your name, address, Social Security number, assets and income)
Information about your online transactions with us, as well as information about our online communications with you. Examples include your online bill payments and your activity on the website, such as collecting information on product information reviewed.
Visitors to Our Website
Visitors to our website remain anonymous, unless they register for a service or otherwise elect to disclose their identity to us. Although we do not collect personally identifying information about persons who simply visit our site, we do collect certain limited information about visitors, such as their IP address (a numeric address assigned automatically to computers when they access the Internet).
We also may place "cookies" on a computer to track a visitor's use of our website. A cookie is a piece of data that is stored on your hard drive. It takes up very little room on your system and helps us to customize our site and make its navigation easier for you. We sometimes use cookies to help estimate the number of visitors to our site and to determine which areas are the most popular. Unless you register with us for a service (such as our Online Banking service), the cookie does not provide us with any personally identifying information about you, such as your name or address.
Web Browser Settings and Control of Personally Identifiable Information Collection
You may have the ability to activate web browser tracking settings or other mechanisms that give you the option to control the collection of personally identifiable information about your online activities over time and across third-party websites or online services. Our response to these settings and mechanisms will depend on the setting and mechanism and the impact on our collection and tracking practices. At this time, our website only tracks your activities while on our website and, unless you register with us for a service, we do not collect any personally identifiable information about you. The tracking is facilitated using 'cookies' that we place on your computer. If you choose not to accept cookies or remove locally stored cookies, we will not track your activity on our website; however, some features and services on our website may not be available to you. For more information regarding cookies, refer to 'Visitors to Our Website' in this policy.
Third Parties
When you use our website or online service, third parties acting on our behalf may collect the personally identifiable information and website activity identified above. This may include the personally identifiable information collected when you register with us for a service. Depending on the third party websites you visit, as well as any preferences and authorizations you have provided to others, your activity on our website and across other websites, including personally information you provide, may be tracked and collected by third parties. Also, third parties may offer services on our website from time to time. If you access their websites or provide them with information, these third parties may track your activity across websites and collect your personally identifiable information, all subject to the third party's privacy and security practices.
For further details, refer to 'Links to Other Web Sites' and 'Services and Advertisements by Third Parties' in this policy.
Disclosure Of Non-Public Personal Information
We do not disclose non-public personal information about our customers to non-affiliated third parties, except as permitted by law. You do not have to take any action or instruct us to keep your information confidential. We will protect your privacy automatically. If you end your relationship with the Bank, we will continue to adhere to the information policies and practices described in this policy.
There are instances when information about you may be provided to others. For example, we are permitted by law to share information:
- Within the Bank in order to service your accounts or to market other products or services we may offer.
- With non-financial companies that perform services on our behalf, such as check printers, data processing companies, companies that prepare or mail account statements, or companies that perform marketing services on our behalf.
- With credit bureaus about loans we make, whether or not they are handled properly, and about deposit accounts that are not handled properly.
- In order to comply with a number of laws and regulations we are required to furnish various reports to federal, state, and/or local government officials regarding certain transactions or accounts.
- To comply with subpoenas and other legal processes that require us to provide information about your accounts or other business with the Bank.
- If we suspect that a crime involving you or your loan or deposit account may have been committed.
- With our regulatory agencies and agents of the Bank or its affiliated companies, such as our independent auditors, consultants or attorneys, all of who will be bound to protect the information as we do.
- With others that you, or any other person with signing authority over your account, have given us oral or written permission to do so.
Maintaining accurate Information
We have procedures in place that help us to maintain the accuracy of the personally identifiable information that we collect. Please contact us at the number or address set forth below if you believe that our information about you is incomplete, out-of-date, or incorrect. If you are an online banking customer, sign-on to Online Banking to review and correct information about yourself, such as a change in your address or email address.
Links to Other Web Sites
Our web site may feature links to third party web sites that offer goods, services or information. Some of these sites may appear as windows-within-windows at this site. When you click on one of these links, you will be leaving our site and will no longer be subject to this policy. We are not responsible for the information collection practices of the other web sites that you visit and urge you to review their privacy policies before you provide them with any personally identifiable information. Third party sites may collect and use information about you in a way that is different from this policy.
Services and Advertisements by Third Parties
Third parties may offer services from time to time at our web site. If you provide them with information, their use of that information will be subject to their privacy policy, if any, and will not be subject to this policy. If you accept third party goods or services advertised at our web site, the third party may be able to identify that you have a relationship with us (e.g., if the offer was only made through our site).
Minors
We feel strongly about protecting the privacy of children and teenagers. As such, we do not knowingly collect personally identifiable information from such individuals through our web site.
Changes to This Policy
We may add to, delete from, or otherwise change the terms of this Online Privacy Policy from time to time by posting a notice of the change (or an amended Online Privacy Policy) at this website. If required by law, we will send you a notice of the change. Your continued use of our web site or any on-line service following notification will constitute your agreement to the revised Policy.
Questions
If you have any questions or concerns about the integrity of your account information, or any other aspect of our business operations, please do not hesitate to telephone or come in to talk to our staff. You may also write to:
Provident Bank
Attention: Compliance Officer
3756 Central Ave.
Riverside, CA 92506
(800) 442-5201
We value your business and hope you will continue banking with us for many years to come.
At Provident Bank, protecting the privacy and security of your personal information is important to us. In order to proactively combat cybersecurity and decrease the likelihood of you, our customers, being compromised, we have implemented this CyberSecurity Tips Monthly Newsletter. It should help you grow to be security-conscious both at home and at work by providing helpful tips to consider in your everyday activities. A list of our current and previous issues of our newsletter have been provided below.
Disclaimer for links provided in this newsletter: If you click on a link within the following newsletters, you will be linking to another website not owned or operated by Provident Bank. Provident Bank is not responsible for the availability or content of this website and does not represent either the linked website or you should you enter into a transaction. We encourage you to review their privacy and security policies which may differ from Provident Bank.
Cyber Security Tips Monthly Newsletters
2025-03 Tis the Tax Fraud Season
Mar 2025
‘Tis the Tax Fraud Season
|
Monthly Security Tips Newsletter
|
Summary
It’s that time of year again and the possibility of phishing scams takes the usual tax-time anxiety to a whole new level as the Internal Revenue Service warns that fraudulent tax professionals are behind tax-related identity theft and financial harm.
These phishing and related scams are designed to trick the recipient into disclosing personal information such as passwords and bank account, credit card, and Social Security numbers, or into sending gift cards or wire transfers to the scammer.
US consumers and business owners should be extra vigilant, know the different phishing terms, and be aware of what the scams might look like:
Phishing/smishing – Phishing (emails) and smishing (SMS/texts) attempt to trick the recipient into providing sensitive information or downloading malware — i.e., malicious software — by clicking a link. Phishing emails are often sent to multiple email addresses at an organization to increase the chance someone will fall for the trick.
Spear phishing – This email phishing scam is more specific in that it targets potential victims individually and delivers a more effective email known as a "lure." These types of scams can be harder to identify because they are personalized, which makes the email seem more legitimate.
Whaling – Whaling attacks generally target leaders or other executives with access to large amounts of sensitive information at an organization or business. Whaling attacks can also target human resources or accounting office personnel.
|
|
|
Fraudsters use a wide array of different themes in their campaigns, which often look like ordinary business communications. Train your personnel to spot these attempts and prevent the disclosure of credentials or other financial and business assets.
|
|
|
Cloud-Based Schemes Aimed at Tax Preparers
|
|
The IRS and tax preparers continue to see attacks that exploit cloud-based applications.
-
These cloud-related schemes trick their victims with realistic-looking phishing emails that contain links to websites that mimic cloud storage sites that look legitimate but are frauds. These scams are designed to collect the tax preparer's credentials, which the threat actor uses to access the real cloud storage site.
-
Tax professionals using cloud-based applications are warned to use multi-factor authentication with information storage or run tax preparation software to help safeguard data. Multi-factor authentication requires at least two forms of identity, such as a password and a fingerprint, providing an extra layer of security.
|
|
Red Flags for Choosing a Tax Professional
|
|
“Ghost” preparers - The IRS requires that paid tax preparers sign returns. Unscrupulous “ghost” preparers, however, have the taxpayer sign and send the IRS their tax returns. These scammers often promise large refunds or charge low fees based on the refund amount. These red flags of unethical behavior can indicate fraud.
Valid ID for tax preparers - Taxpayers should always choose a tax preparer with a valid Preparer Tax Identification Number (PTIN). By law, anyone who is paid to prepare or assists in preparing federal tax returns must have a valid PTIN. Paid preparers must sign and include their PTIN on any tax return they prepare.
|
|
Safe Tax Preparers for Employers
|
|
Employers need to understand their payroll and employment tax responsibilities and choose a trustworthy tax prep service. Here are a couple of options:
- A certified professional employer organization (CPEO). Typically, these organizations are solely liable for paying the customer's employment taxes, filing returns, and making deposits and payments for the taxes reported related to wages and other compensation. They file employment tax returns and deposits and pay the combined tax liabilities of their customers using the CPEO's Employer Identification number. An employer enters into a service contract with a CPEO and then the CPEO submits Form 8973, Certified Professional Employer Organization/Customer Reporting Agreement to the IRS. Employers can find a CPEO on the Public Listings page of IRS.gov.
- Reporting agent. This is a payroll service provider that informs the IRS of its relationship with a client using Form 8655, Reporting Agent Authorization, which is signed by the client. Reporting agents must deposit a client's taxes using the Electronic Federal Tax Payment System and can exchange information with the IRS on behalf of a client, such as to resolve an issue. They are also required to provide clients with a written statement reminding the employer that it, not the reporting agent, is ultimately responsible for the timely filing of returns and payment of taxes.
|
|
Reporting an IRS Impersonator
|
|
The IRS doesn’t initiate contact by email, text, phone, or social media to request personal or financial information, and you can verify a suspicious message with the IRS. If you think it’s a scam, report it.
If your Social Security number (SSN) or individual tax identification number (ITIN) was stolen, immediately report it to IdentityTheft.gov.
|
|
|
|
|
|
If You’re a Victim?
Immediately change any passwords you might have revealed. Consider reporting the attack to IC3.gov and the police, and file a report with the Federal Trade Commission.
|
|
|
Getting Help
If you identify suspicious activity involving your institution, contact them immediately.
|
|
|
|
|
©FS-ISAC 2025
2025-02 Love is in the Air, or is it?
Feb 2025
Love is in the Air, or is it?
|
Monthly Security Tips Newsletter
|
Summary
February 14th is right around the corner and love is in the air. Are you confident that the person special person you are talking to via the Internet is who they say they are?
A romance scam is a type of confidence ruse where a criminal pretends to be romantically interested in a victim to gain their trust and steal money. Scammers may use dating sites and social media to target victims.
According to Yale Cybersecurity, “The average loss from a romance scam was $4400 in 2022. Nearly 70,000 people reported a romance scam to the Federal Trade Commission (FTC), with total reported losses of an astounding $1.3 billion.”
|
|
Why Should You Be Worried? |
|
Scam artists play on emotion. They may email photos to create a bond with the victim. Once that emotional bond is cemented, they often say they all they need is to be wire transferred funds and when received, will travel to meet them.
There are other scenarios where a person arrives at the persons home with “family members” who then physically and emotionally abuse the victim.
Whatever the case, it begins with that first wire transfer which makes it easier to avoid meeting in person - and more plausible when they ask for money for a medical emergency, an unexpected legal fee, or some over emergency.
If someone you meet online needs your bank account information to deposit money, they are most likely using your account to carry out other theft and fraud schemes.
|
|
|
Regardless of whether you are the victim or care for a family member, the Federal Bureau of Investigation wants you to think and talk with a trusted friend or family member:
- Be careful what you post and make public online. Scammers can use details shared on social media and dating sites to better understand and target you.
- Research the person’s photo and profile using online searches to see if the image, name, or details have been used elsewhere.
- Go slowly and ask lots of questions.
- Beware if the individual seems too perfect or quickly asks you to leave a dating service or social media site to communicate directly.
- Beware if the individual attempts to isolate you from friends and family or requests inappropriate photos or financial information that could later be used to extort you.
- Beware if the individual promises to meet in person but then always comes up with an excuse why he or she can’t. If you haven’t met the person after a few months, for whatever reason, you have good reason to be suspicious.
- Never send money to anyone you have only communicated with online or by phone.
- If your financial institution has investigated the matter and tell you it’s a scam – believe them, they are looking out for your best interests.
Lots of people have found love online — but many have found crooks and criminals too. So, during this special time of year when love is in the air, remember to be careful with your heart and your wallet.
|
|
What to Do if You are Scammed |
|
- If you feel an email contains a scam, don’t respond. Block the sender.
- If it’s a phone call – hang up!
- Set emotion aside, if it’s too good to be true, it usually is.
- If you provide your personal information (account, date of birth, online banking user ID, password, etc.) contact your financial institution immediately.
- Verify then trust the source.
|
|
|
|
|
|
|
|
If You’re a Victim?
Immediately change any passwords you might have revealed. Consider reporting the attack to IC3.gov and the police, and file a report with the Federal Trade Commission.
|
|
|
Getting Help
If you identify suspicious activity involving your institution, contact them immediately.
|
|
|
|
|
©FS-ISAC 2025
2025-01 Its Time for Identity Theft Prevention!
Jan 2025
It’s Time for Identity Theft Prevention!
|
Monthly Security Tips Newsletter
|
Summary
This year, Identity Theft Awareness Week is 27-31 January. Because security is everyone’s responsibility, there is a lot that you can do to protect your personal information from identity thieves this week — and all year long.
|
|
|
|
What is Identity Theft?
Identity theft is the fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
Identity theft can happen to anyone and can take many forms. Bad actors could open a credit card or utility account in someone else's name, or use that information to get a loan, a job, or medical care. They might even file taxes in someone else’s name to get a refund.
|
|
Here's What You Can Do
Here are some leading practices to keep your identity safe:
-
Protect your Social Security number
-
Fight "phishing" — don't take the bait
-
Use strong passwords and enable multi-factor authentication More Than a Password
-
Exercise caution on social media sites
-
Use security software on your PC and mobile devices
-
Review your financial and other statements regularly
-
Regularly inspect your credit report
-
Stop pre-approved credit offers (www.optoutprescreen.com)
|
|
Here's How to Get Involved
Here are some ways you can participate in and support your community during Identity Theft Awareness Week:
- Visit the Identity Theft Awareness Week 2025 website and learn more about scheduled events you can participate in.
- Get information in multiple languages about how to spot, avoid, and report identity theft at ftc.gov/languages and share it in your community.
- Watch and share videos on social media in English, Spanish, Chinese, and Korean.
- Share images before and during Identity Theft Awareness Week on your social media to help gather support and attention.
- Order publications, including bookmarks and one-page flyers, and share them with people you know or place them at places of worship and libraries where people can find them.
Look for updates on the Identity Theft Awareness Week events at ftc.gov/IDTheftWeek! Whether you are chatting with friends and family, posting on social media, or speaking at a community group meeting, talking about identity theft can help protect you and your community.
|
|
What to Do if You are Scammed
- If you feel an email contains a scam, don’t respond. Block the sender.
- If it’s a phone call – hang up!
- If you provide your personal information (account, date of birth, online banking user ID, password, etc.) contact your financial institution immediately.
- Verify then trust the source.
|
|
|
|
|
|
If You’re a Victim?
Immediately change any passwords you might have revealed. Consider reporting the attack to IC3.gov and the police, and file a report with the Federal Trade Commission.
|
|
|
Getting Help
If you identify suspicious activity involving your institution, contact them immediately.
|
|
|
|
|
© FS-ISAC 2025
2024-12 Being Cyber Safe in 2025
Dec 2024
Being Cyber Safe in 2025
|
Monthly Security Tips Newsletter
|
Summary
Security is everyone’s responsibility, but that doesn’t mean you must have several cybersecurity degrees to protect your personal and financial assets. In this issue, we list some easy ways to reduce your risk and be cyber safe in 2025. |
|
Here's What You Can Do
Turn on Multifactor Authentication. Turn on Multifactor Authentication. Your accounts will be significantly less likely to get hacked if they’re protected with Multifactor authentication (MFA). When you enable MFA in your online services (like email), you must provide a combination of two or more authenticators (e.g., 1. Something you know such as a personal identification number (PIN), or password, 2. Something you have such as an authentication application or a confirmation text on your phone, or 3. Something you are such as a fingerprint or facial scan) to verify your identity before the service grants you access. This layered approach to securing data and applications prohibits unauthorized access to the targeted physical space, computing device, network, or database.
Update Your Software. Bad actors exploit flaws in computer systems. Network defenders are working hard to fix them quickly, but their work relies on all of us updating our software with their latest fixes. So update the operating system on your mobile phones, tablets, and laptops. And update your applications – especially the web browsers – on all your devices too. Leverage automatic updates for all devices, applications, and operating systems as well. You may be too busy to install every updates, but your PC or other electronic devices won’t be if you activate automatic update settings.
Think Before You Click. Take a little time before you click that link or open that attachment. More than 90% of successful cyber-attacks start with a phishing email. Sadly, we are more likely to fall for phishing than we think – and false urgency and fake links are often the cause.
False urgency.An email from your gas company says your service will be canceled unless you re-enter your card details right now. Or maybe your phone provider says you’ve been hacked and need to contact them ASAP. But should you? Slow down, and don’t be alarmed about that urgent email. Carefully look at the subject line or preview the content of the email. If the email provides the name of the business and asks for a response, locate its contact information elsewhere – such as its website – and use it to see if it’s really that urgent.
Fake links. Have you ever seen a link in a text or email that looks a little … off? Sure, it looks like something you’ve seen before and the sender is familiar – maybe your email service, your boss, your bank, or a friend. But when you click the link you’re asked to change or enter a password or verify personal information. Don’t. It’s likely a phishing scheme using a link or webpage that looks legitimate but was designed by bad actors to install malware on your machine or get your password, social security number, credit card number, or other sensitive information. Once they have that information, they can use it on legitimate sites. If it’s a link you don’t recognize, trust your instincts and think before you click.
Use Strong Passwords. Did you know the most common password is “password”? Followed by “123456”? Your child’s name and birthday isn’t much better. Using an easy password is like locking your door but hanging the key on the doorknob. Anyone can get in. Using strong passwords and, ideally, a password manager is much safer.
Here are some tips for creating a stronger password.
-
Make it long – at least 16 characters
-
Don’t use the same password on multiple sites
-
Use randomly generated passwords created by a computer or password manager. They’re better than humans at being random.
You can use a password manager to store all of your passwords, too. That way you don’t have to remember them all! If you go this route, make sure the password you use for the password manager is strong and memorable, and secure your account with MFA!
|
|
What to Do If You Are Scammed
-
If you feel that an email contains a scam, don’t respond and block the sender.
-
If it’s a phone call – hang up!
-
If you provide your personal information (account, date of birth, online banking user ID, password, etc.) contact your financial institution immediately.
|
|
|
|
|
|
|
|
If You’re a Victim?
Immediately change any passwords you might have revealed. Consider reporting the attack to IC3.gov and the police, and file a report with the Federal Trade Commission.
|
|
|
Getting Help
If you identify suspicious activity involving your institution, contact them immediately.
|
|
|
|
|
©FS-ISAC 2024
2024-08 Understanding Cyber Threats
Aug 2024
Understanding Cyber Threats
|
Monthly Security Tips Newsletter
|
Understanding Cyber Threats
Summary
The one thing cybersecurity threats have in common is that they are harmful and the cybercriminal is committed to destroying, stealing, or disrupting data, critical systems, and digital life in general. Your financial institution uses numerous security applications and incorporates processes to keep your financial information and assets secure and to comply with regulatory guidelines.
However, security is everyone's responsibility, and you can do the following three things to help safeguard your assets.
First, educate yourself about the various tactics, techniques, and processes (TTP) cybercriminals use to steal from you. TTPs are like fashion – what’s in style one month is out-of-date the next – so cybercrimes change over time. Below you’ll see the most current attack types and TTPs.
|
|
|
Second, install security applications on your personal computers and mobile devices. Those applications – especially anti-virus and content-blocking applications – are an additional layer of protection for devices connected to the outside world. It's important to secure all your devices, especially those used by your whole family.
As tempting as free security applications are, they aren’t always the best way to protect your financial data. Research and select applications offering the best protection. Consider it an investment that protects you from the hassles of restoring your online financial life to some degree of normal.
Third, regularly monitor your account activity and tell your financial institution about suspicious activity. Many financial services providers offer mobile apps that alert you to activity on your accounts. Those apps help you and your institution remediate cybercrime quickly.
|
|
|
Tips To Help You Remain On Guard
- Don’t reveal personal or financial information in a text or email, and don’t respond to email solicitations for this information.
- Don’t click on links sent in a text or email – you might wind up in a scam site built by a cybercriminal.
- Don't send sensitive information over the internet without checking the website's security. Look for URLs that begin with "https" – the ‘s’ stands for secure – rather than "http." A website safety checker like Google Safe Browsing helps, too.
|
|
|
If You’re a Victim?
Immediately change any passwords you might have revealed. Consider reporting the attack to IC3.gov and the police, and file a report with the Federal Trade Commission.
|
|
|
Getting Help
If you identify suspicious activity involving your institution, contact them immediately.
|
|
|
|
|
©2024 FS-ISAC, Inc. | All Rights Reserved.
2024-07 Keeping an Eye Out for Telcom Attacks
Jul 2024
Keeping an Eye Out for Telcom Attacks
|
Monthly Security Tips Newsletter
|
Keeping an Eye Out for Telcom Attacks
Summary
Voice Over Internet Protocols (VoIP) is one-way threat actors attempt to trick unsuspecting consumers into sharing their confidential information, such as user names, passwords, bank account information, and the like. These actors frequently use “ID Spoofing” as vehicles in their attack campaigns.
ID Spoofing is when a caller deliberately falsifies the information transmitted to a caller ID display to disguise their identity. Scammers often use “neighbor spoofing” so it appears that an incoming call is coming from a local number, or spoof a number from a company or a government agency that the victim probably knows and trusts. Then they use scam scripts to try to steal money or valuable personal information that can be used in fraudulent activity.
Smishing is a similar form of social engineering fraud, but it exploits SMS, or text, messages rather than VoIP. In a smishing scheme, the scammer purports to be a known entitity and texts a link to such things as webpages, email addresses, or phone numbers that, when clicked, automatically open a browser window or email message or dial a number. This integration of email, voice, text message, and web browser functionality increases the likelihood that users will fall victim to engineered malicious activity.

Red Flags
- Demands for payment
- Account verification
- Program enrollment
- Order/shipping confirmation
- Winning a prize
- Tech support
Tips To Help You Remain On Guard
- Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about employees or other internal information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company.
- Do not provide personal information or information about your organization, including its structure or networks, unless you are certain of a person's authority to have the information.
- Do not reveal personal or financial information in a text or email, and do not respond to email solicitations for this information. This includes following links sent in a text or email.
- Don't send sensitive information over the internet without checking a website's security.
- Pay attention to the Uniform Resource Locator (URL) of a website. Look for URLs that begin with "https" - an indication that sites are secure - rather than "http."
Resources
- If You're a Victim?
- Immediately change any passwords you might have revealed. Consider reporting the attack to IC3.gov, and the police, and file a report with the Federal Trade Commission.
- Getting Help
- If you identify suspicious activity involving your [Institution] account, contact us immediately.
|
|
|
|
©2024 FS-ISAC, Inc. | All Rights Reserved.
|
2024-06 Protecting Vulnerable Adults
Jun 2024
Protecting Vulnerable Adults
|
Monthly Security Tips Newsletter
|
Protecting Vulnerable Adults
Summary
Elder abuse refers to an intentional or negligent act by any person that causes harm or a serious risk of harm to an older adult. The trauma of elder abuse can result in premature death, the deterioration of physical and psychological health, destruction of social and familial ties, devastating financial loss, and more. Older adults can be mistreated in multiple settings (homes, nursing homes, assisted living facilities) by family members, friends and neighbors, professionals, and strangers.
Abuse Types
Elder abuse is a term used to describe five subtypes:
Elder Abuse Red Flags
While no single red flag may signal abuse, observing several may indicate that intervention is required to protect a loved one.
Warning signs of physical abuse
- Bruises, black eyes, welts, lacerations, or rope marks
- Bone fractures, broken bones, or skull fractures; sprains, dislocations, or internal injuries/bleeding
- Open wounds, cuts, punctures, untreated injuries in various stages of healing
- Broken eyeglasses/frames, physical signs of being subjected to punishment, or signs of being restrained
- Laboratory findings of medication overdose or under-utilization of prescribed drugs
- An older adult’s sudden change in behavior
Warning signs of emotional/psychological abuse
- Being emotionally upset or agitated
- Being extremely withdrawn, non-communicative, or non-responsive
- Unusual behavior, such as sucking, biting, or rocking
- A caregiver controlling or isolating an older adult
- Exhibiting a change in sleeping patterns or eating habits
- Personality changes, such as apologizing excessively
- Depression or anxiety
- An older adult’s report of being verbally or emotionally mistreated
Warning signs of financial exploitation
- Sudden changes in bank accounts or banking practices, including an unexplained withdrawal of large sums of money by a person accompanying the older adult
- The inclusion of additional names on an older adult’s bank signature card
- Unauthorized withdrawal of the older adult’s funds using their ATM card
- Abrupt changes in a will or other financial documents
- Unexplained disappearance of funds or valuable possessions
- Provision of substandard care or bills left unpaid despite the availability of adequate financial resources
- Discovery of a forged signature for financial transactions or for the titles of the older adult’s possessions
- Sudden appearance of previously uninvolved relatives claiming their rights to an older adult’s property or possessions
- Unexplained sudden transfer of assets to a family member or someone outside the family
- The provision of services that are not necessary
- An older adult’s report of financial exploitation
- Unexplained credit card charges
Warning signs of neglect and abandonment
- Dehydration, malnutrition, untreated bed sores, and poor personal hygiene
- Unattended or untreated health problems
- Hazardous or unsafe living conditions or arrangements (e.g., improper wiring, no heat, or no running water)
- Unsanitary and unclean living condition (e.g., dirt, fleas, lice on person, soiled bedding, fecal/urine smell, inadequate clothing)
- The desertion of an older adult at a hospital, a nursing facility, or other similar institution, or a shopping center or other public location
- An older adult’s report of being neglected or abandoned
- Lack of food in the refrigerator or cupboards
Warning signs of sexual abuse
- Bruises around the private areas
- Unexplained sexually transmitted disease
- Changes in an older adult’s demeanor, such as showing fear or becoming withdrawn when a specific person is around
- Blood found on sheets, linens, or an older adult’s clothing
- An older adult’s report of being sexually assaulted or raped
Resources
Call
If this is an emergency, call 911 for immediate help.
For non-life-threatening emergencies, call either:
National Elder Fraud Hotline
1-833-FRAUD-11 (833-372-8311)
10 a.m. - 6 p.m. Eastern Time | Monday - Friday
Eldercare Locator helpline
1-800-677-1116
|
|
|
|
©2024 FS-ISAC, Inc. | All Rights Reserved.
|
2024-05 Spotting Scams
May 2024
Spotting Scams
|
Monthly Security Tips Newsletter
|
Spotting Scams
Summary
Sharing a romance scam experience with someone you know takes courage. If an elderly person or vulnerable adult trusts you enough to share their scam story, especially if they are still in touch with the scammer, here’s some information that you or your loved ones will benefit from.
Romance Scams
Say your loved one is contacted on social media by someone interested in getting to know them. Or maybe they meet someone special on a dating website or mobile app. Soon the scammer wants to write to them directly or start talking on the phone. The scammer says it’s true love, but lives far away — maybe because of work, or because they’re in the military.
Then the scammer starts asking for money. Maybe it’s for a plane ticket to visit. Or emergency surgery. Or something else urgent.
Scammers of all ages, genders, and sexual orientations make fake profiles, sometimes using photos of other people — even stolen pictures of real military personnel. They build relationships — some even pretend to plan weddings — before they disappear with your loved one’s money.
How You Can Help
Lead with empathy. Respond with kindness and concern instead of criticizing or expressing disappointment. Scams can happen to anyone. Keep lines of communication open with a kind, concerned response.
Let them tell their story. Talking about a scam experience helps both of you understand what happened. And talking about the scam also helps both of you spot another attempt in the future.
Validate their story. The only person at fault here is the scammer — not your friend or family member. It’s a scammer’s job to steal money or information, and they’ll target anyone. Ask them not to blame themselves and, instead, blame the scammer.
Remind them not to send money. Never send cash, gift cards, wire transfers, or cryptocurrency to an online love interest. They won’t get it back.
Ask what we can do next together. See if their personal information was involved, too, because identity theft might be a concern. Ask if they might want to report the scam. Their story can help protect friends, family, their community, and themselves, as well as help law enforcement agencies like the FTC fight that scam.
Getting Help
If you realize you or your family member clicked or responded to a phishing email involving your [Institution] account, contact us immediately. You will need to change your passphrase. Additionally, you can report the incident to the FTC at ReportFraud.ftc.gov or the Internet Crime Center at www.ic3.gov. Please remember, that security is everyone’s responsibility.
|
|
|
|
©2024 FS-ISAC, Inc. | All Rights Reserved.
|
2024-04 Protecting Our Children
Apr 2024
Protecting Our Children
|
Monthly Security Tips Newsletter
|
Protecting Our Children
Summary
The surge in cyberattacks on K-12 schools, targeting vulnerable computer systems and exploiting the lack of cybersecurity experts, is causing widespread disruptions across the nation. With incidents doubling in 2023, these attacks, often involving ransomware and data theft, underscore the urgent need for enhanced cybersecurity measures to safeguard student records and maintain the continuity of education. (NPR)
Prevention Tips
At home and at school, protect your systems by performing the following:
- Deploy multi-factor authentication. (MFA)
- Mitigate known exploited vulnerabilities.
- Implement and test backups.
- Regularly exercise an incident response plan.
- Implement a strong cybersecurity training program.
If you lack adequate resources, consider leveraging:
- The State and Local Cybersecurity Grant Program (SLCGP).
- Free or low-cost services to make near-term improvements in resource-constrained environments.
- Technology providers enable strong security controls by default for no additional charge.
- Minimizing the burden of security by migrating IT services to more secure cloud versions.
- CISA’s online toolkit provides additional free cybersecurity training and resources available for the K-12 community
Every K-12 organization—large and small—must be prepared to respond to disruptive cyber incidents. The Cybersecurity Infrastructure and Security Agency (CISA) is available to help you prepare for, respond to, and mitigate the impact of cyberattacks. When cyber incidents are reported quickly, they can use this information to render assistance and as a warning to prevent other organizations and entities from falling victim to a similar attack. CISA encourages our stakeholders to voluntarily share information about cyber-related events that could help mitigate current or emerging cybersecurity threats to critical infrastructure.
Sharing thwarted or actual cyber incidents with an information-sharing organization could help mitigate current or emerging cybersecurity threats to critical infrastructure.
If you realize you clicked or responded to a phishing email involving your [Institution] account, contact us immediately. You will need to change your passphrase. Additionally, you can report the incident to the FTC at ReportFraud.ftc.gov or the Internet Crime Center at www.ic3.gov. Please remember, that security is everyone’s responsibility.
|
|
|
|
©2024 FS-ISAC, Inc. | All Rights Reserved.
|
2024-03 Protecting Your Identity
Mar 2024
Security is Everyone's Responsibility
|
Monthly Security Tips Newsletter
|
Protecting Your Identity
Summary
Is it worth being cautious with your personally identifiable information in light of so many data breaches? Yes! The Federal Trade Commission (FTC) estimates that it can take approximately six months and 200 hours of work to recover from an identity theft. This estimation is based on the amount of work needed to follow the necessary steps to ensure the victim is not responsible for the debt incurred (Privacy Guard).
Warning Signs of Identity Theft
You may not know that you experienced ID theft immediately, so be aware of:
- Bills for items you did not buy.
- Debt collection calls for accounts you did not open.
- Information on your credit report for accounts you did not open.
|
- Denials of loan applications.
- Mail stops coming to, or is missing from your mailbox.
|
Prevention Tips
How can you protect yourself?
- Use multi-factor authentication wherever offered. Do not reuse passwords, and if you have a lot of passwords, consider using a password vault.
- Do not answer phone calls, texts, social media messages, or emails from numbers or people you do not know. Enable blockers to help filter out scam numbers.
- Do not share personal information like your bank account number, social security number, or date of birth.
- Collect your mail every day and place a hold on your mail when you will be on vacation or away from your home.
- Review credit card and bank account statements. Watch for and report unauthorized or suspicious transactions.
- Understand how ATM skimming works and how to protect yourself.
- Learn when it is safe to use a public Wi-Fi network.
- Store personal information, including your social security card, in a safe place. Do not carry it in your wallet.
- Do not share personal information or dates of vacations on social media.
If you realize you clicked or responded to a phishing email involving your [Institution] account, contact us immediately. You will need to change your passphrase. Additionally, you can report the incident to the FTC at ReportFraud.ftc.gov or the Internet Crime Center at www.ic3.gov. Please remember, that security is everyone’s responsibility.
|
|
|
|
©2024 FS-ISAC, Inc. | All Rights Reserved.
|
2024-02 Quishing, the New Phishing
Feb 2024
Security is Everyone's Responsibility
|
Monthly Security Tips Newsletter
|
Quishing, the New Phishing
Summary
Do you work hard for the money you earn? We feel you do. We work diligently behind the scenes to protect your information and money from fraudsters, but security is a shared responsibility between us. That’s why Provident Bank wants to ensure you start 2024 on the right track.
QR codes seem to be everywhere. You may have scanned one to see the menu at a restaurant or pay for public parking. You may have used one on your phone to get into a concert or sporting event or to board a flight. There are countless other ways to use them, which explains their popularity. Unfortunately, scammers hide harmful links in QR codes to steal personal information. Here’s what to know.
There are reports of scammers covering up QR codes on parking meters with a QR code of their own. And some crafty scammers might send you a QR code by text message or email and make up a reason for you to scan it. These are some of the ways they try to con you:
- Lying and saying they couldn't deliver your package and you need to contact them to reschedule
- Pretending like there’s a problem with your account and you need to confirm your information
- Lying and saying they noticed suspicious activity on your account, and you need to change your password
These are all lies they tell you to create a sense of urgency. They want you to scan the QR code and open the URL without thinking about it. A scammer’s QR code could take you to a spoofed site that looks real but isn’t. And if you log in to the spoofed site, the scammers could steal any information you enter. Or the QR code could install malware that steals your information before you realize it.
Prevention Tips
How can you protect yourself?
- If you see a QR code in an unexpected place, inspect the URL before you open it. If it looks like a URL you recognize, make sure it’s not spoofed — look for misspellings or a switched letter.
- Don’t scan a QR code in an email or text message you weren’t expecting — especially if it urges you to act immediately. If you think the message is legitimate, use a phone number or website you know is real to contact the company.
- Protect your phone and accounts. Update your phone's operating system to protect against hackers and protect your online accounts with strong passwords and multi-factor authentication.
If you realize you clicked or responded to a phishing email involving your [Institution] account, contact us immediately. You will need to change your passphrase. Additionally, you can report the incident to the FTC at ReportFraud.ftc.gov or the Internet Crime Center at www.ic3.gov. Please remember, that security is everyone’s responsibility.
|
|
|
|
©2024 FS-ISAC, Inc. | All Rights Reserved.
|
2024-01 Starting Your Year Off Right
Jan 2024
Security is Everyone's Responsibility
|
Monthly Security Tips Newsletter
|
Starting Your Year Off Right
Summary
Do you work hard for the money you earn? We feel you do. We work diligently behind the scenes to protect your information and money from fraudsters, but security is a shared responsibility between us. That’s why Provident Bank wants to ensure you start 2024 on the right track.
Prevention Tips
Improve password security. Passwords are one of the most vulnerable cyber defenses. Improve your password security by doing the following:
- Create a strong password. Use a strong password that is unique for each device or account. Longer passwords are more secure. An option to help you create a long password is using a passphrase - four or more random words grouped and used as a password. To create strong passwords, the National Institute of Standards and Technology (NIST) suggests using simple, long, and memorable passwords or passphrases. (See Choosing and Protecting Passwords)
- Consider using a password manager. Password manager applications manage different accounts and passwords while having added benefits, including identifying weak or repeated passwords. There are many different options, so start by looking for an application that has a large install base (e.g., 1 million plus) and an overall positive review. Properly using one of these password managers may help improve your overall password security.
- Use multifactor authentication, if available. Multifactor authentication (MFA) is a more secure method of authorizing access. It requires two out of the following three types of credentials: something you know (e.g., a password or personal identification number [PIN]), something you have (e.g., a token or ID card), and something you are (e.g., a biometric fingerprint). Because one of the required credentials requires physical presence, this step makes it more difficult for a threat actor to compromise your device. (See Supplementing Passwords)
- Use security questions properly. For accounts that ask you to set up one or more password reset questions, use private information about yourself that only you would know. Answers that can be found on your social media or facts everyone knows about you can make it easier for someone to guess your password.
- Create unique accounts for each user per device. Set up individual accounts that allow only the access and permissions needed by each user. When you need to grant daily use accounts administrative permissions, do so only temporarily. This precaution reduces the impact of poor choices, such as clicking on phishing emails or visiting malicious websites.
- Choose secure networks. Use internet connections you trust, such as your home service or Long-Term Evolution connection through your wireless carrier. Public networks are not very secure, which makes it easy for others to intercept your data. If you choose to connect to open networks, consider using antivirus and firewall software on your device or using a Virtual Private Network (VPN) service, which allows you to connect to the internet securely by keeping your exchanges private. When setting up your home wireless network, use Wi-Fi Protected Accessed 3 (WPA3) encryption. All other wireless encryption methods are outdated and more vulnerable to exploitation. (See Securing Wireless Networks)
- Keep all of your personal electronic device software current. Manufacturers issue updates as they discover vulnerabilities in their products. Automatic updates make this easier for many devices—including computers, phones, tablets, and other smart devices but you may need to manually update other devices. Only apply updates from manufacturer websites and built-in application stores, third-party sites and applications are unreliable and can result in an infected device. When shopping for new connected devices, consider the brand's consistency in providing regular support updates.
- Be suspicious of unexpected emails. Phishing emails are currently one of the most prevalent risks to the average user. The goal of a phishing email is to gain information about you, steal money from you, or install malware on your device. Be suspicious of all unexpected emails. (See Avoiding Social Engineering and Phishing Attacks)
If you realize you clicked or responded to a phishing email involving your FS-ISAC account, contact us immediately. You will need to change your passphrase. Additionally, you can report the incident to the FTC at ReportFraud.ftc.gov or the Internet Crime Center at www.ic3.gov. Please remember, that security is everyone’s responsibility.
|
|
|
|
©2024 FS-ISAC, Inc. | All Rights Reserved.
|
Identifying and Preventing Elder Abuse
- What is Elder Abuse?
Elder abuse is a willful act or a failure to act that creates or causes a risk of harm to an older adult. An older adult is considered to be someone age 60 or older. The abuse occurs at the hands of a family member, a caregiver, or a person the elder trusts. Common types of elder abuse include:
- Physical abuse occurs when an elderly person encounters illness, pain, injury, functional impairment, distress, or death as a result of the willful use of physical force and may include actions such as kicking, hitting, pushing, slapping, or burning.
- Sexual abuse is the unwanted or forced sexual interaction of any kind with an older adult. This could include unwanted sexual contact or non-contact actions such as sexual harassment.
- Psychological or Emotional abuse refers to verbal or nonverbal behaviors that inflict anguish, mental pain, fear, or distress on an older adult. Examples may include humiliation and/or disrespect, verbal and non-verbal threats, harassment, and isolation (geographic or interpersonal).
- Neglect is a failure to meet an older adult’s basic needs. These needs may include food, water, clothing, shelter, hygiene, and essential medical care.
- Financial Abuse is the unauthorized, improper, or illegal use of an older adult’s money, assets, benefits, property, or belongings for the explicit benefit of someone other than
the elderly adult. Common financial abuse scenarios include:
- Misappropriation of income or assets
- Improper or fraudulent use of the power of attorney or fiduciary authority
- Obtain money or property by undue influence
- Scams
- How big is the problem?
Elder abuse is a serious problem in the United States. The number of cases is underestimated as the number of nonfatal injuries is limited to older adults who
are treated in emergency departments. The information doesn’t include those treated by other providers or those that do not need or do not seek treatment. Additionally, because elders are afraid or
unable to tell police, friends, or family about the violence, many cases aren't reported. Victims need to decide whether to tell someone they are being hurt or continue to be abused by someone they depend upon
or care for deeply.
Elder abuse is common. Approximately 1 in 10 people aged 60 and over who live at home experienced abuse, including exploitation and neglect. In the years 2002 through 2016,
more than 643,000 older adults were treated in the emergency department for nonfatal assaults and over 19,000 homicides occurred.
Financial abuse is hard-to-detect and is becoming a widespread issue. Financial neglect occurs when an older adult’s financial responsibilities such as paying rent or mortgage, medical expenses or
insurance, utility bills, or property taxes, are ignored, and the person’s bills are not paid. Even strangers can steal financial information using the telephone, internet, or email. Be careful about sharing any financial information
over the phone or online.
- How can elder abuse be prevented?
There are many factors that may increase or decrease the risk of inflicting and/or experiencing elder abuse. To prevent elder abuse, we must observe and correct the factors that put people at risk for or protect them from violence.
- Observe signs of insufficient care or unpaid bills despite adequate financial resources.
- Learn how signs of elder abuse are different from the normal aging process.
- Listen to older adults and their caregivers to understand challenges and provide support.
- Learn how to recognize and report elder abuse
- Provide stressed caregivers with support from family and friends, day care programs, and counseling.
- How can you avoid becoming a victim of financial abuse?
- Use direct deposit for all checks. Sign your own checks and do not sign a "blank check" for anyone.
- Have a trusted third person review your bank statement if someone helps you manage your finances. Put all financial instructions in writing and be specific.
- Establish a banking relationship with the staff at your bank.
- Execute a power of attorney with a trusted friend, relative, or attorney. The definition of this may be as limited or as broad as you wish.
- Do not sign over money or property to anyone in return for care, including family and friends.
- Keep all important documents together. This includes wills/trusts, insurance policies, and bank account information. Be sure to let someone know where these documents are kept.
- Never give out credit card numbers over the phone unless you placed the call. Never give out your Social Security Number or bank account number over the phone.
- If something seems "to good to be true," it is probably a scam. This includes being told you won a prize for a drawing you did not enter or that someone will get you 100 percent return on an investment.
- How can elder abuse be reported?
To report elder abuse and to learn more, please follow the links below.