Ideal CU Security Center
Your security is our top priority
Recently, we have been made aware there is a scam targeting Ideal CU members. We have seen reports from our members that they have received phone calls that appear to be coming from Ideal CU.
We want to remind our members that Ideal CU will never call and ask for any personal information including:
- Membership or account numbers
- Identifying information such as your date of birth or social security number
- Complete debit or credit card numbers and PIN information
- Digital Banking log in information or passwords
A reminder that Ideal CU will never contact you and ask for any identifying account information. If you are on the phone and suspect the call to be a scam, hang up immediately and if you believe you have given personal information to a scammer, immediately contact us by calling 651-770-7000.
Artificial intelligence (AI) is revolutionizing the way we live and work. Unfortunately, it’s also revolutionizing how scammers con unsuspecting victims into sharing their personally identifiable information and their money.
- Identify Fraud
-
When it comes to fraud, a good defense is the best offense. Learn how to identify fraud.
- Protect Yourself
-
Protect your identity and your account security with these ID security tips and tools.
- Report a Lost Card
-
Learn how to report a lost or stolen Ideal CU debit or credit card.
Take control of your account security
You don’t have to be a security expert to help defend your account against fraud. Here are just a few ways you can actively secure your account at Ideal Credit Union.
Keep your contact information updated
- Log in to Ideal Digital Banking online or on the app
- Go to Settings (desktop: upper right dropdown by your photo; app: select More to find Settings)
- Select the Contact tab
- Update your information as needed
- Save
Enroll in Ideal Digital Banking
Enable Debit Alerts
Enable Visa Credit Card Alerts
Enable fingerprint or facial recognition for Your Ideal Mobile Banking App
See Our Latest Cyber Security Blog Posts
Understanding Malicious Search Results
How Scammers Exploit Search Engines Scammers use various tactics to display their harmful websites prominently: Typosquatting: Scammers create websites with URLs similar to well-known sites, betting on users mistyping addresses or not noticing slight differences.Paid Advertisements: They may pay for
How Scammers Use Fake Celebrity Accounts and Ads
Understanding Celeb-Bait Scams What Are Celeb-Bait Scams? Celeb-bait scams involve unauthorized use of a celebrity's image, name or likeness to lure individuals into engaging with fraudulent content. Scammers create ads, social media posts or emails that feature well-known public figures to make the
Stay Safe: Test Your Scam Smarts
How It Works We'll present you with a series of typical scenarios that mimic common tactics used by scammers. After reading each scenario, decide whether you believe it's legitimate or a scam. Then, we'll reveal the answer along with an explanation to help you understand the red flags and best pract
Protect Yourself From Charity Scams: What You Need to Know
Understanding Charity Scams What Are Charity Scams? Charity scams are where individuals or groups pose as legitimate charitable organizations to solicit donations fraudulently. You should be particularly on your guard against these scams following natural disasters, since scammers focus on capitaliz
Top Tips to Prevent Credit Card Skimming
Understanding Physical Credit Card Skimming What Is Credit Card Skimming? Credit card skimming is a deceptive practice where criminals use unauthorized devices to steal your card information during legitimate transactions. These skimming devices are designed to read and store the data from the magne
Data Breach Response Strategies for Ideal CU Members
Whether this breach is confirmed or not, breaches of this scale have happened before. Most notably the Yahoo breaches starting in 2013 underscore the vulnerability of personal information in today's digital world and the urgent need for individuals to take proactive steps to protect their data. The
Protecting Your Personal Information on Social Networks
The Risks of Oversharing on Social Media Sharing too much information on social media can lead to several risks including identity theft, cyberstalking and loss of personal identifiable information. Sensitive information such as your location, personal relationships and daily routines can provide cy
How Freezing Your Credit Can Save Your Credit Score
Understanding How Credit Freezes Work To initiate a credit freeze, you must contact each of the three major credit bureaus: Experian, TransUnion and Equifax. This can typically be done online, over the phone or by mail. Once a freeze is in place, only specific entities, like your existing creditors
When Fraud Comes Close to Home: A Personal Story Behind the Statistics
Targeted Advertising is a Double-Edged Sword Targeted advertising – serving specific ads to a specific audience defined by their interests, demographics and more – is how search engines and social media sites make their billions in yearly revenue. Though most of us don’t think much about targ
The Goals and Consequences of Smishing Scams
These scams often mimic communications from legitimate sources such as banks, delivery services or even government agencies, using a phone’s familiar context and a user’s ingrained habit of instantly responding to urgent phone messages. Combining these two factors together, the scammer aims b
Taking a Closer Look at Tech Support Fraud
How Tech Support Scams Operate Tech support scams often begin with an unsolicited phone call, email or alarming pop-up message claiming that your computer is infected with a virus or experiencing a serious technical problem. The scammers pose as representatives from reputable companies, using fear a
Six Red Flags to Look for When Shopping Online
1. The Importance of Secure Connections Secure connections are the bedrock of online safety, acting as a shield for data in transit. These connections, symbolized by HTTPS in the website's address, ensure that the information you share is encrypted and inaccessible to eavesdroppers. Encryption trans
Four Facts You Should Know About Cybercrime
Common Types of Cybercrime Affecting Individuals Cybercrime manifests in various forms, including but not limited to identity theft, internet fraud, ATM and wire fraud, hacking and computer viruses. These activities highlight the digital extension of existing criminal behaviors, exploiting the perva
Protecting Older Adults Against Potential Scams
The Federal Trade Commission's reports highlight a stark increase in older adult financial abuse, with losses amounting to hundreds of millions annually. This introduction sets the stage for a critical exploration of the landscape of financial fraud affecting older adults, underscoring the importanc
Improving Your Fraud IQ For Better Awareness & Protection
Bridging the "Know/Do" Gap It's a human tendency to shy away from acknowledging the risks of fraud: it exposes our vulnerabilities and can make us feel uncomfortable and threatened. But when indulged this avoidance leads to a significant "Know/Do" gap, where intellectually we ‘know’ what steps are n
Signs You're Falling for a Romance Scam
From rushed declarations of affection to persistent excuses for avoiding face-to-face meetings, we'll highlight the red flags to watch out for in your online interactions. By staying informed and aware, you can help ensure a safe (and real) experience in the world of digital romance this Valentine's
Guide to Card Security and Fraud Prevention
Common Types of Debit & Credit Card Fraud Card-not-present (CNP) fraud: This occurs when fraudsters use stolen card information to make unauthorized online or phone purchases.Credit card application fraud: Here, criminals use stolen personal data to open fraudulent credit card accounts.Ac
Keeping Your Personal Information Secure Online
Online security isn't just about protecting your data; it's about ensuring peace of mind and maintaining the integrity of your digital presence. As your financial partner, Ideal Credit Union is committed to helping you navigate these challenges with knowledge and tools for enhanced security.
Cybersecurity Trends and Protecting Yourself in 2024
Fortifying Defenses Against Financial Cyber Threats In 2024, the financial sector continues to be a prime target for cybercriminals, necessitating heightened cyber resilience. Credit unions like Ideal CU are at the forefront, implementing advanced cybersecurity measures to protect sensitive financia
Password Security Strategies & Best Practices to Keep Your Accounts Safe in 2024
Why Passwords Matter Passwords are more than just a means to access your accounts; they are the guardians of your digital identity. In an era where data breaches are becoming increasingly common, a compromised password can lead to severe consequences, including financial loss and identity theft. Pas
How To Keep Yourself Safe From 6 Common Zelle® Scams
As transactions become swifter, so too does the need for vigilance. Ideal Credit Union is committed to helping you recognize the signs of digital payment scams, ensuring your financial safety against these rapidly evolving digital threats. How To Identify Zelle® Red Flags Staying alert and skeptical
Cybersecurity Tips for Safe Online Shopping This Holiday Season
Embracing the Holiday Season While Staying Secure Online Before diving into the shopping spree of November, it’s important to understand the cyber threat landscape. Cyber threats evolve continuously and being aware of the common threats like phishing, malware and identity theft can significantly bol
The Role of Two-Factor Authentication (2FA) in Strengthening Online Security
In collaboration with Stickley on Security, we've established a robust cybersecurity education program for our community. Why Two-Factor Authentication (2FA) is Crucial Two-factor authentication (2FA) is a pivotal aspect of online security. It adds an extra layer of protection beyond just a password
How to Protect Your Money & Avoid Common Scams and Frauds
Phishing Scams Phishing is a method of deception where scammers pose as trustworthy entities to steal sensitive information. This can be done through emails, phone calls, text messages or even social media. The objective is simple: to trick the recipient into sharing personal information or do
Don't Get Caught in a P2P Scam
You might find mysterious money in your P2P account and be asked to send it back, or sell an item via P2P payment and get paid with a stolen credit card. A fake customer rep allegedly from the P2P service or your bank could try to scam you out of your personal info, or you could get the old utility
Device Advice: How to Keep Your Phone Safe from Fraud
Your mobile devices pose an inherent risk to your security if they fall into the wrong hands. Fortunately, there are ways to protect your phone and information. Here are 6 tips for keeping your device safe and secure. Keep your phone locked If your entire life is on your phone, you run
Don’t Get Caught in a Non-Delivery Scam
There are many scams to watch for this time of year, from online “retailers” phishing for information as you shop to brazen porch thieves who swipe delivered packages from doorsteps and so many more. The non-delivery scam can be particularly difficult to spot, and recovery is nearly impossible. Here
Beware Malware Scams
The caller may even be a representative of the Federal Trade Commission (FTC), or another reputable company, and they’re happy to help restore your device to safety. Just do as they say, and all will be right again. Unfortunately, it won’t: If you do follow the caller’s instructions, you’ll be
Don’t Get Caught in a Cryptocurrency Scam
As a non-regulated currency, stolen crypto is virtually impossible to reclaim. Here are five crypto scams to know: 1. Bitcoin investment scams In this ruse, a scammer will reach out to crypto investors and pretend to be an investment manager. They’ll say they’ve earned millions by investing in Bitco
All You Need to Know About Cybersecurity
Cybercrimes are increasing exponentially by the year. Unfortunately, developments like the pandemic, the growth of cryptocurrency, and the increase in online working and shopping have created a target-rich environment for cyber criminals. In fact, according to Cybercrime Magazine, cybercrime wi
8 Ways to Spot a Survey Scam
What actually happens, though, is that the scammer walks away with a free survey, or worse, your information and/or your money. The alert consumer can spot a survey scam easily, but fraudsters are unfortunately becoming more sophisticated at luring innocent victims into their schemes. Don’t ge
Don’t Get Caught in a Vacation Rental Scam
Here’s all you need to know about these scams and how to avoid them. How these scams play out There are several variations of vacation rental scams. In one version, the vacation rental advertised on Airbnb, or on a similar site, does not exist or is in very poor condition. The scammer uses onl
Don't Get Caught in a Romance Scam
Romance scams have been around for a while, and they’re unfortunately on the rise: a record $304 million in losses related to romance scams was reported to the FTC in 2020, up by nearly 50% from 2019. Here’s all you need to know about romance scams and how to protect yourself from ge
Ideal CU Teams Up with Cyber Security Expert Jim Stickley to Host Two Live Educational Webinars
To provide cyber security education to Ideal Credit Union members and the community, Ideal CU Chief Marketing and Sales Officer Alisha Johnson teamed up with nationally recognized security expert Jim Stickley to host two live webinars on Tuesday, March 23, 2021. One webinar focused on personal secur
Ideal CU Has Partnered with Cyber Security Expert Jim Stickley to Provide Ongoing Education and Resources
Highlights included the introduction of Ideal’s new Cyber Security Center and two live Cyber Security Webinars. Two live webinars featuring CEO of Stickley on Security Jim Stickley were held on Tuesday, March 23 and are now available to view any time on www.idealcu.com/cyber-security. During the eve
Don’t Be A Victim Of A Social Security Scam
The victim receives a phone call from an alleged Social Security employee telling them their benefits have been suspended and need to be reactivated. To lift the suspension, they say, the victim must share their personal information. Alternatively, the victim receives an automated voice message inst