Fraud Prevention
How To Identify Fraud
Identifying fraud is sometimes easier said than done. To help avoid becoming a target, familiarize yourself with these common types of scams and learn about ways to avoid falling victim.
Always remember: Ideal Credit Union will never ask you for your Social Security number, debit card PIN or any other personal identifiable information over email or text. If you receive a communication from Ideal Credit Union that you find suspicious or are unsure of the source, do NOT click on any links, instead contact us and speak with an Ideal CU Representative.
Phishing Scams
Phishing scams involve the distribution of deceptive emails, messages or websites that appear to be from a legitimate source, like a bank or government agency, with the intention of duping individuals into divulging sensitive data, such as passwords or financial details.
Smishing is a form of phishing conducted via text messages. Scammers send deceptive texts that appear to be from reputable sources, in a similar attempt to convince recipients into revealing personal information. Fraudulent text messages will attempt to create urgency and coerce you to click on links or take action before carefully reading the message.
The tactics are similar to avoid falling victim to a phishing scam whether it comes via email or text message.
- Verify Sender's Authenticity: Always double-check the sender's email address or the source of the message. Be cautious of slight misspellings or unusual domains that don't match the legitimate organization.
- Exercise Caution with Links: Avoid clicking on links in unsolicited emails or messages, especially if they prompt you to log in or provide personal information. Instead, navigate to the organization's website by typing the URL directly into your browser.
- Don't Share Personal Information: Never share personal or financial information, such as passwords or credit card details, through text messages or via email.
Although certain Ideal CU text message notifications are legitimate, you should always be cautious of the sender and use your best judgement before clicking links or responding. To confirm the validity of a text or email, contact us and speak with an Ideal CU Representative.
Romance Scams
In romance scams, fraudsters create fake online personas to build romantic relationships with victims. Once trust is established, scammers ask for money, often claiming they need it for emergencies, travel or a variety of other reasons.
Above all else, never send money to someone you've never met in person, regardless of the reasons they provide. Scammers often use elaborate stories to elicit funds. Other tips to remember:
- Exercise Caution Online: Be wary of individuals who quickly profess love or affection in online relationships. Take time to get to know someone before sharing personal information or sending money.
- Verify Identity: If you have suspicions, perform online searches and reverse image searches to confirm the person's identity. Be cautious if they avoid video calls or face-to-face meetings.
- Stay Informed: Educate yourself about common signs and tactics used in romance scams. Awareness and vigilance are your best defenses against falling victim to such scams.
Phone Scams
Phone scams are one of the top ways fraudsters scam people out of money. Sometimes their only goal is to steal your information — don't give it to them! Here are some ways to help protect yourself against phone scams:
- Never provide personal or account information to an unsolicited caller — If you did not make the phone call, you should NOT provide any information.
- If you receive a suspicious phone call, hang up and contact the company yourself using the phone number you know and trust.
- Review financial statements regularly to ensure all transactions are correct. If you have Internet account access, periodically review activity online as well.
If you believe you have given personal information to a scammer, contact your financial institution and the three credit reporting agencies immediately. Also, closely monitor your credit files and account statements.
Tech Support Scams
Phone scams are one of the top ways fraudsters scam people out of money. Sometimes their only goal is to steal your information — don't give it to them! Here are some ways to help protect yourself against phone scams:
- Never provide personal or account information to an unsolicited caller — If you did not make the phone call, you should NOT provide any information.
- If you receive a suspicious phone call, hang up and contact the company yourself using the phone number you know and trust.
- Review financial statements regularly to ensure all transactions are correct. If you have Internet account access, periodically review activity online as well.
If you believe you have given personal information to a scammer, contact your financial institution and the three credit reporting agencies immediately. Also, closely monitor your credit files and account statements.
IRS & Tax Scams
Impersonating the IRS or tax authorities, scammers contact victims via phone or email, claiming they owe back taxes and threatening legal action or arrest. They demand immediate payment or personal information.
Remember: The IRS will not contact you by phone or email to demand immediate payment. If you receive such a call or message, verify with the IRS through official channels.
Investment Scams
Investment scams promise high returns on investments that are too good to be true. These can involve Ponzi schemes or fraudulent investments in stocks, real estate or cryptocurrencies. Be cautious of investment opportunities that guarantee high returns with little or no risk. Research any investment thoroughly and consider seeking advice from a financial advisor. Check for the proper licenses and registrations of the entity offering the investment.
Online Shopping Scams
Lottery & Prize Scams
Scammers inform victims that they've won a lottery or prize and ask for payment to claim the winnings or for personal information to process the prize. There is no real prize, and the scammer disappears with the money or information.
Always be wary of unsolicited notifications about lottery winnings. Legitimate lotteries don't ask for upfront fees or personal information to claim prizes.
Always exercise caution and skepticism when dealing with unfamiliar situations or offers and remember that legitimate organizations will not pressure you for personal or financial information. Staying informed about the latest scams and educating yourself on how to recognize and avoid them is crucial in protecting yourself from fraud. Be wary of unsolicited communications, do your research, and, when in doubt, consult with trusted professionals or authorities.
See Our Latest Cyber Security Blog Posts
Understanding Celeb-Bait Scams What Are Celeb-Bait Scams? Celeb-bait scams involve unauthorized use of a celebrity's image, name or likeness to lure individuals into engaging with fraudulent content. Scammers create ads, social media posts or emails that feature well-known public figures to make the
How It Works We'll present you with a series of typical scenarios that mimic common tactics used by scammers. After reading each scenario, decide whether you believe it's legitimate or a scam. Then, we'll reveal the answer along with an explanation to help you understand the red flags and best pract
Understanding Charity Scams What Are Charity Scams? Charity scams are where individuals or groups pose as legitimate charitable organizations to solicit donations fraudulently. You should be particularly on your guard against these scams following natural disasters, since scammers focus on capitaliz
Understanding Physical Credit Card Skimming What Is Credit Card Skimming? Credit card skimming is a deceptive practice where criminals use unauthorized devices to steal your card information during legitimate transactions. These skimming devices are designed to read and store the data from the magne
Whether this breach is confirmed or not, breaches of this scale have happened before. Most notably the Yahoo breaches starting in 2013 underscore the vulnerability of personal information in today's digital world and the urgent need for individuals to take proactive steps to protect their data. The
The Risks of Oversharing on Social Media Sharing too much information on social media can lead to several risks including identity theft, cyberstalking and loss of personal identifiable information. Sensitive information such as your location, personal relationships and daily routines can provide cy
Understanding How Credit Freezes Work To initiate a credit freeze, you must contact each of the three major credit bureaus: Experian, TransUnion and Equifax. This can typically be done online, over the phone or by mail. Once a freeze is in place, only specific entities, like your existing creditors
Targeted Advertising is a Double-Edged Sword Targeted advertising – serving specific ads to a specific audience defined by their interests, demographics and more – is how search engines and social media sites make their billions in yearly revenue. Though most of us don’t think much about targ
These scams often mimic communications from legitimate sources such as banks, delivery services or even government agencies, using a phone’s familiar context and a user’s ingrained habit of instantly responding to urgent phone messages. Combining these two factors together, the scammer aims b
How Tech Support Scams Operate Tech support scams often begin with an unsolicited phone call, email or alarming pop-up message claiming that your computer is infected with a virus or experiencing a serious technical problem. The scammers pose as representatives from reputable companies, using fear a
1. The Importance of Secure Connections Secure connections are the bedrock of online safety, acting as a shield for data in transit. These connections, symbolized by HTTPS in the website's address, ensure that the information you share is encrypted and inaccessible to eavesdroppers. Encryption trans
Common Types of Cybercrime Affecting Individuals Cybercrime manifests in various forms, including but not limited to identity theft, internet fraud, ATM and wire fraud, hacking and computer viruses. These activities highlight the digital extension of existing criminal behaviors, exploiting the perva
The Federal Trade Commission's reports highlight a stark increase in older adult financial abuse, with losses amounting to hundreds of millions annually. This introduction sets the stage for a critical exploration of the landscape of financial fraud affecting older adults, underscoring the importanc
Bridging the "Know/Do" Gap It's a human tendency to shy away from acknowledging the risks of fraud: it exposes our vulnerabilities and can make us feel uncomfortable and threatened. But when indulged this avoidance leads to a significant "Know/Do" gap, where intellectually we ‘know’ what steps are n
From rushed declarations of affection to persistent excuses for avoiding face-to-face meetings, we'll highlight the red flags to watch out for in your online interactions. By staying informed and aware, you can help ensure a safe (and real) experience in the world of digital romance this Valentine's
Common Types of Debit & Credit Card Fraud Card-not-present (CNP) fraud: This occurs when fraudsters use stolen card information to make unauthorized online or phone purchases.Credit card application fraud: Here, criminals use stolen personal data to open fraudulent credit card accounts.Ac
Online security isn't just about protecting your data; it's about ensuring peace of mind and maintaining the integrity of your digital presence. As your financial partner, Ideal Credit Union is committed to helping you navigate these challenges with knowledge and tools for enhanced security.
Fortifying Defenses Against Financial Cyber Threats In 2024, the financial sector continues to be a prime target for cybercriminals, necessitating heightened cyber resilience. Credit unions like Ideal CU are at the forefront, implementing advanced cybersecurity measures to protect sensitive financia
Why Passwords Matter Passwords are more than just a means to access your accounts; they are the guardians of your digital identity. In an era where data breaches are becoming increasingly common, a compromised password can lead to severe consequences, including financial loss and identity theft. Pas
As transactions become swifter, so too does the need for vigilance. Ideal Credit Union is committed to helping you recognize the signs of digital payment scams, ensuring your financial safety against these rapidly evolving digital threats. How To Identify Zelle® Red Flags Staying alert and skeptical
Embracing the Holiday Season While Staying Secure Online Before diving into the shopping spree of November, it’s important to understand the cyber threat landscape. Cyber threats evolve continuously and being aware of the common threats like phishing, malware and identity theft can significantly bol
In collaboration with Stickley on Security, we've established a robust cybersecurity education program for our community. Why Two-Factor Authentication (2FA) is Crucial Two-factor authentication (2FA) is a pivotal aspect of online security. It adds an extra layer of protection beyond just a password
Phishing Scams Phishing is a method of deception where scammers pose as trustworthy entities to steal sensitive information. This can be done through emails, phone calls, text messages or even social media. The objective is simple: to trick the recipient into sharing personal information or do
You might find mysterious money in your P2P account and be asked to send it back, or sell an item via P2P payment and get paid with a stolen credit card. A fake customer rep allegedly from the P2P service or your bank could try to scam you out of your personal info, or you could get the old utility
Your mobile devices pose an inherent risk to your security if they fall into the wrong hands. Fortunately, there are ways to protect your phone and information. Here are 6 tips for keeping your device safe and secure. Keep your phone locked If your entire life is on your phone, you run
There are many scams to watch for this time of year, from online “retailers” phishing for information as you shop to brazen porch thieves who swipe delivered packages from doorsteps and so many more. The non-delivery scam can be particularly difficult to spot, and recovery is nearly impossible. Here
The caller may even be a representative of the Federal Trade Commission (FTC), or another reputable company, and they’re happy to help restore your device to safety. Just do as they say, and all will be right again. Unfortunately, it won’t: If you do follow the caller’s instructions, you’ll be
As a non-regulated currency, stolen crypto is virtually impossible to reclaim. Here are five crypto scams to know: 1. Bitcoin investment scams In this ruse, a scammer will reach out to crypto investors and pretend to be an investment manager. They’ll say they’ve earned millions by investing in Bitco
Cybercrimes are increasing exponentially by the year. Unfortunately, developments like the pandemic, the growth of cryptocurrency, and the increase in online working and shopping have created a target-rich environment for cyber criminals. In fact, according to Cybercrime Magazine, cybercrime wi
What actually happens, though, is that the scammer walks away with a free survey, or worse, your information and/or your money. The alert consumer can spot a survey scam easily, but fraudsters are unfortunately becoming more sophisticated at luring innocent victims into their schemes. Don’t ge
Here’s all you need to know about these scams and how to avoid them. How these scams play out There are several variations of vacation rental scams. In one version, the vacation rental advertised on Airbnb, or on a similar site, does not exist or is in very poor condition. The scammer uses onl
Romance scams have been around for a while, and they’re unfortunately on the rise: a record $304 million in losses related to romance scams was reported to the FTC in 2020, up by nearly 50% from 2019. Here’s all you need to know about romance scams and how to protect yourself from ge
To provide cyber security education to Ideal Credit Union members and the community, Ideal CU Chief Marketing and Sales Officer Alisha Johnson teamed up with nationally recognized security expert Jim Stickley to host two live webinars on Tuesday, March 23, 2021. One webinar focused on personal secur
Highlights included the introduction of Ideal’s new Cyber Security Center and two live Cyber Security Webinars. Two live webinars featuring CEO of Stickley on Security Jim Stickley were held on Tuesday, March 23 and are now available to view any time on www.idealcu.com/cyber-security. During the eve
The victim receives a phone call from an alleged Social Security employee telling them their benefits have been suspended and need to be reactivated. To lift the suspension, they say, the victim must share their personal information. Alternatively, the victim receives an automated voice message inst