person holding a cell phone

Security Tips

Consumer Technology Topic of the Month

Cybersecurity Tips for Tax Season
Every February through April, there is a rise in tax fraud by cyber criminals keen on stealing your personal and business's financial data. Learn how to prevent these types of attacks by being aware of the scams they use and having a solid cybersecurity program in place.
 
Common Tax Fraud Issues
  • Impersonating IRS Phone Scams: Callers claim to be IRS employees, say that you owe money and it must be paid as soon as possible via gift cards or a wire service. The real IRS will not call and demand immediate payment. In general, they will send a notice or bill via the mail.
  • Phishing, Email and Malware Scams: Cybercriminals will attempt to get valuable data via unsolicited emails, text messages, or fake websites that prompt users to click a link and open attachments to share personal or financial information or to release malware or spyware into a computer system.
  • Dishonest Tax Firms: Tax preparation companies with little or no credibility open and close quickly during peak tax season. These businesses might not have secure systems, allowing cybercriminals to easily access your information.
Cybersecurity Tips for Tax Season and Beyond
You can protect your business from tax fraud scams and cyber attacks by implementing employee cybersecurity training and data privacy verification procedures, such as:
  • Do not share social security numbers or any tax documentation with unknown parties.
  • Keep an eye on your credit report to see if any bank accounts are being opened in your name.
  • Look for any business loans being taken out under your company EIN.
  • Triple check information prior to sending any wire or ACH transfers. Call a known number directly (not using the email signature), and ensure that multiple parties review before pushing through any payment.
  • Stop, think, and double-check rush demands with other team members or management. Threat actors tend to use urgency in an attempt to rush people to make a mistake.
  • Do not open attachments unless it is one you expected. If in doubt, have IT look at the email in an abundance of caution.
  • Do not allow someone requiring access to your computer unless you can confirm whether they are legitimate with your IT department. Always gather their contact information, confirm and call back if necessary. It is not common practice for someone unknown to call and ask for remote access.
  • Use secure passwords and don't share or reuse them.
  • Ensure your communicate with an authentic individual and not an imposter trying to steal personal and financial information. If you are not familiar with the person's name, verify their relationship with your company before sharing any data.
  • Utilize multi-factor authentication (MFA) when filing taxes online. Use a tax preparing service that requires a username, complex password and MFA.
  • Update software on all devices and operating systems that connect to the internet. Having current software that is fully patched is a strong defense against viruses and malware. 

Fake checks drive many types of scams- like those involving phony prize wins, fake jobs, mystery shoppers, online classified ad sales, and others. In a fake check scam, a person you don't know asks you to deposit a check-sometimes for several thousand dollars and usually for more than what you are owed- and wire some of the money back to that person. The scammers always have a good story to explain the overpayment- they're stuck out of the country, they need you to cover taxes or fees, you need to buy supplies, or something else. But by the time your bank discovers you've deposited a bad check, the scammer already has the money you sent, and you're stuck paying the rest of the check back to the bank.

The Federal Trade Commission receives tens of thousands of reports each year about fake checks. Over the last three years, the number of complaints has steadily increased, and so have the dollars lost.

The FTC's new info graphic developed with the American Bankers Association Foundation, offers some tip-offs to rip-offs and what to do if you get a check from someone you don't know.

Please share this information with others. Victims may be embarrassed to talk about their experiences, but you can help. A simple phone call, email or text, saying "Look what I just found" and sharing this information may make a difference in someone else's life.
How to Avoid Cryptocurrency Scams!
 
Scammers are always finding new ways to steal your money using cryptocurrency. To steer clear of a crypto con, here are some things to know.

  • ONLY SCAMMERS DEMAND PAYMENT IN CRYPTOCURRENCY. No legitimate business is going to demand you send cryptocurrency in advance- not to buy something, and not to protect your money. That's always a scam.
  • ONLY SCAMMERS WILL GUARANTEE PROFITS OR BIG RETURNS. Don't trust people who promise you can quickly and easily make money in the crypto markets.
  • NEVER MIX ONLINE DATING AND INVESTMENT ADVICE. If you meet someone on a dating site or app, and they want to show you how to invest in crypto, or asks you to send them crypto, that's a scam.
Spot Crypto-Related Scams
 
Here are some common investment scams, and how to spot them.

  • A so-called "investment manager" contacts you out of the blue. They promise to grow your money- but only if you buy cryptocurrency and transfer it into their online account. The investment website they steer you to looks real, but it's a fake, and so are their promises. If you log in to your "investment account", you won't be able to withdraw your money at all, or only if you pay high fees.
  • An online "love interest" wants you to send money or cryptocurrency to help you invest. That's a scam. As soon as someone you meet on a dating app asks you for money, or offers you investment advice advice, know this: that's a scammer. The advice and offers to help you invest in cryptocurrency are nothing but scams. If you send them crypto, or money of any kind, it'll be gone, and you typically won't get it back.
  • Scammers guarantee that you'll make money or promise big payouts with guaranteed returns. Nobody can make those guarantees. Much less in a short time. And there's nothing "low risk" about cryptocurrency investments. So: if a company or person promises you'll make a profit, that's a scam. Even if there's a celebrity endorsement or testimonials from happy investors. Those are easily faked.
  • Scammers promise free money. They'll promise free cash or cryptocurrency, but free money promises are always fake.
  • Scammers make big claims without details or explanations. No matter what the investment, find out how it works and ask questions about where your money is going. Honest investment managers or advisors want to share that information and will back it up with details. 
  • IF YOU SEE A TWEET ( OR A TEXT, OR OTHER MESSAGE ON SOCIAL MEDIA) THAT TELLS YOU TO PAY WITH CRYPTOCURRENCY, THAT'S A SCAM!
How to prevent account takeover fraud for a personal account
 
Preventing Account Takeover Fraud on Personal Accounts
 
Account Takeover (ATO) fraud is a type of identity theft where a criminal gains unauthorized access to your online accounts, such as bank accounts, email, or social media, to steal money, access sensitive information, or commit further fraud.
 
Here's how you can prevent it from your personal accounts:
 
1. Secure your credentials
  • Use Strong and Unique Passwords: Create passwords that are difficult to guess and different for each of your online accounts: Avoid using easily discoverable information like your birthdate or pet's name.
  • Enable Multi-Factor Authentication (MFA): This adds an extra layer of security, requiring a second verification step, like a code sent to your phone or a biometric scan, in addition to your password.
  • Be Careful with Pubic Wi-Fi: Avoid accessing sensitive accounts on public Wi-Fi networks, or use a VPN for enhanced security if you must connect.
  • Don't Fall for Phishing Scams: Be cautious of suspicious emails or messages asking for your login information or prompting you to click on links.
  • Monitor Your Accounts Regularly: Look for any unfamiliar charges, password reset requests, or unusual activity.
2. Additional Proactive Measures
  • Consider a Password Manager: These tools can help you generate and securely store complex and unique password s for all your accounts.
  • Stay Informed About Data Breaches: If a company you have an account with experiences a data breach, change your password for that account and any others where you may have used the same password.
  • Check Active Logins: Some accounts allow you view a list of devices currently logged in. Log out any unfamiliar or unauthorized devices.
 
 3. If You Suspect an Account Takeover
  • Change Your Passwords Immediately: Secure your account by resetting the password.
  • Notify the Service Provider: Contact the company or financial institution involved to inform them of the potential breach
  • Review Account Activity and Transaction History: Look for any unauthorized transactions or changes to your account details.
Phishing Gets Smarter- How AI Is Changing Online Scams
Ever received an email that looked real but was actually a scam?- That's phishing.- a trick cybercriminals use to steal your personal information. Now, with artificial intelligence (AI), these scams are becoming even more convincing. 
 
How AI Is Making Phishing Harder to Detect
 
Personalized Attacks
AI can analyze your social media and other online information, compiling applicable details to create customized phishing messages. By gathering bits of personal information, AI can craft emails that appear tailored just for you, making these fake messages harder to spot.
Better writing
AI can write emails with fewer mistakes, making malicious messages look more legitimate.
Voice and Video Tricks
AI can copy someone's voice or create fake videos that look like someone you know. For example, you might receive a call from a friend asking for money, but it could actually be an impersonator using AI technology.
More Targeted and Adaptive Attacks
AI doesn't just create convincing phishing messages; it's revolutionizing how cybercriminals approach their scams.
These AI-powered systems can:
  • Analyze phishing results in real time
  • Rapidly fine-tune attack strategies
  • Create highly personalized messages for specific targets
  • Learn and improve from each attempt
This adaptive approach makes AI-driven phishing increasingly difficult for individuals and security systems to detect. As attacks evolve, they become more sophisticated and tailored to exploit specific vulnerabilities. The result? A new era of  phishing that's smarter, more responsive, and constantly evolving to stay one step ahead of traditional defenses.
 
How To Protect Yourself
AI-generated content may have:
  • Unusual phrasing or tone shifts
  • Abrupt changes in writing style
  • Out-of-place vocabulary
  • Inconsistent personal details
Practical Steps to Enhance your Security:
  • Enable multi-factor authentication on all accounts
  • Use a password manager to create and store strong, unique passwords
  • Be cautious when clicking links or downloading attachments, even from seemingly familiar sources
  • Verify requests for sensitive information through a separate, trusted channel
 
What Is a Compromised Email Account? The Meaning & Telltale Signs to Look Out For
 
What is  a Compromised Account?
A compromised email account occurs when an attacker or unauthorized individual access a legitimate user's email. Once attackers gain access to an email account, they can look at and copy all emails sent or received from that account- and any personal information attached to those messages. 
 
Email accounts can be compromised by attackers' tactics, such as phishing and password spraying. Phishing involves the attacker tricking a user into revealing login credentials through fraudulent emails or websites, while password spraying involves trying common passwords across multiple accounts. Malware can be used to hack into email accounts.

If you suspect your email account has been compromised, you should immediately change the password to a new one that's hard for others to guess and enable two-factor authentication. You should also notify your service provider about the breach so they can help recover any lost mail or files as needed. Let your contacts know that you've had a security breach so they don't unknowingly engage in fraudulent activity stemming from your account.
 
It is essential to practice good cybersecurity to protect yourself from compromised email accounts. This includes using strong, unique passwords, being cautious of suspicious emails or links, regularly updating your devices and software, and using reliable antivirus and anti-malware software.
 
How Are Accounts Compromised?
  • Phishing: Attackers create fraudulent emails that appear to be from a legitimate source, such as a well-known company or service. The emails may contain links prompting users- who are most likely expecting this kind of communication and don't check the URL before entering their login credentials-into believing they need to log back into something important. Once attackers have compromised these accounts, they can then use them for malicious purposes.
  • Password Attacks: Attackers may use techniques like password spraying to try a small number of commonly used passwords across multiple accounts. They exploit weak or reused passwords to gain access to email accounts.
  • Malware: Malware, including keyloggers and spyware, can be installed on a device without the owner's knowledge. This malicious software records login credentials (such as passwords) and sends them to an attacker.
  • Credential Stuffing: Attackers exploit the practice of password reuse by using leaked login credentials (such as passwords) and sends them to an attacker.
  • Social Engineering: Attackers may use manipulative tactics to trick individuals into revealing their email account login information. This may involve impersonating a trusted source, like a friend or coworker, or eliciting personal information through deceptive means.
To protect against email account compromise, staying vigilant and practicing good cybersecurity hygiene is crucial. This includes using strong, unique passwords, enabling two-factor authentication, being cautious of suspicious emails or links, and regularly updating devices and software.
 
What Are The Different Types of Account Compromise?
Business and personal accounts can be compromised in various ways, such as malicious phishing emails sent to employees or a data breach allowing unauthorized users to gain access. Weak passwords, malware, and social engineering attacks can all compromise personal accounts.
 
  • Email Account Compromise (EAC): Hackers most commonly gain access to people's email accounts by planting malware on their computers, usually after the victim has fallen for an initial email phishing scam. This can lead to various fraudulent activities like sending spam emails and stealing sensitive information- or sending official-looking messages to other contacts from the victim's email, trying to trick users into giving up personal or financial data.
  • Account Takeover (ATO): ATO occurs when a cybercriminal takes control of an individuals online identity and impersonates that person. Attackers can exploit these compromised accounts for financial gain and other malicious activities.
  • Business Email Compromise (BEC): BEC refers to an attack where cyber criminals target employees responsible for financial transactions or sensitive information. Attackers often impersonate high-ranking executives, tricking employees into making unauthorized wire transfers or sharing sensitive data.
  • Credential Stuffing: In this attack, attackers use username and password combinations obtained from previous data breaches to gain unauthorized access to various online accounts, including email accounts. They rely on the fact that many individuals reuse passwords across multiple platforms.
It is important to remember that this is just a small sample. New email hacking techniques are being developed all the time. So staying on top of solid security measures like using unique and strong passwords and enabling multi-factor authentication is your first line of defense. Being cautious with suspicious emails or links also helps mitigate the risk of account compromise.
 
What Are The Telltale Indicators of a Compromised Account?
It is important to act fast if you think your email account has been compromised. Start by changing the password to something secure, then take the necessary steps to ensure no further damage can be done. Some signs of a breach to look out for include:
 
Unfamiliar messages sent from your account
If you notice emails sent from your account that you did not write, this is a clear sign that someone else has gained access to the account, especially if the emails are sending messages and links to others. If other people are also complaining to you about receiving spam emails from your email address, then your account has likely been hacked.
Unexpected password reset notifications
Getting messages about changing passwords when you haven't changed anything may signal that someone else has tried to gain access.
Missing emails
Sometimes, hackers delete emails to cover their tracks, which can signify that someone else has accessed your account.
Other unusual activity
You may also watch for unusual activity from privileged accounts, increased access to services, or increased network activity. Also, watch for logins from unusual locations or strange emails being sent out, unauthorized settings, or registry changes. Finally, contact your IT department or security provider for additional help securing your account.
 
Steps to Take if Your Account Has Been Compromised

Change your password
Immediately change your password for the compromised account. Choose a strong and unique password not used for other accounts. This will help prevent further unauthorized access.
Check for and remove suspicious activity
Review your account activity and look for any unfamiliar or suspicious actions. If you notice any unauthorized activity, such as emails sent from your account without your knowledge, delete them and notify your contacts to avoid any potential scams.
Enable multi-factor authentication (MFA)
If available, enable MFA for your account. This adds an extra layer of security by requiring a second form of verification such as a code sent to your phone, in addition to your password.
Update you security settings
Review and update your account security settings. Ensure your recovery options, such as alternate email addresses or phone numbers, are current. Consider changing security questions and answers as well.
Scan your device for malware
Run a complete computer or mobile device scan with up-to-date security software. This can help to detect and remove any malware or keyloggers that may have compromised your account.
Be cautious of phishing attempts
Remain vigilant for phishing emails or messages that trick you into providing personal information or login credentials. Avoid clicking on suspicious links or downloading attachments from unknown sources.
Monitor your accounts
Check your financial accounts, credit reports, and other online accounts regularly for sign of unauthorized activity. If you notice any suspicious transactions or activity-report it immediately!
Report the compromise
Depending on the type of account, report the compromise to the appropriate service provider or organization. They can assist in recovering your account and take steps to prevent further compromises.
 
Remember, prevention is vital to account security. Changing your passwords regularly, using strong and different passwords for each account, and avoiding sharing personal information online is wise.
 
Tips & Best Practices to Prevent Accounts from Being Compromised
The best way to approach cybersecurity is preemptive. Taking proactive steps to secure your accounts can go a long way in preventing unauthorized access and safeguarding your data:
  • Use strong passwords with uppercase and lowercase letters, numbers, and special characters.
  • Enable two-factor authentication if available for additional protection.
  • Check your inbox regularly for any suspicious emails or activities. 
  • Set up email filters to automatically delete or block known malicious emails.
  • Use a secure email provider with built-in security measures to help protect your accounts from unauthorized access.
  • Keep up with security updates and patch any vulnerabilities immediately.
  • Monitor your accounts for any suspicious activity or changes in settings, and contact your IT department immediately if anything is out of the ordinary.
 
The Biggest Scams of 2025 and How to Outsmart Them
 
AI-Generated Scams
The rise of artificial intelligence has made it easier for scammers to create realistic videos, images and voice clones. In 2024 alone, we've seen an alarming increase in devilishly clever scams, making it harder than ever to discern the real from the fake. Imagine getting a call from your son or daughter, with what sounds exactly like them and they claim to be in danger, what will you do? That's how terrifying AI related scams can get.
 
Here's how they work and what to watch out for:
  • How it works: Scammers use AI to mimic a loved one''s voice. They may call you, pretending to be a family member in trouble and ask for money urgently.
  • Red flags: The caller demands immediate payment, avoids video calls, or refuses to provide proof of identity.
  • Protect yourself: Always verify the caller's identity through a secondary channel, such as calling them back on a known number.
Cryptocurrency Investment Frauds
Cryptocurrency scams are evolving with fraudsters using new tactics to deceive potential investors. One prominent trend involves leveraging influencers to promote fraudulent schemes, making these scams appear to be legitimate and trustworthy.
 
Cryptocurrency Investment Frauds
  • Initial Coin Offer Scams: Scammers launch fake cryptocurrencies, using high-profile influencers to create hype. 
  • Pump-and-Dump Schemes: Fraudsters artificially inflate the value of cryptocurrency through false claims and influencer endorsements, only to sell off their holdings and leave investors with worthless assets.
How can your protect yourself from Cryptocurrency scams
  • Red flags: Unverified projects, unrealistic promises of high returns, or reliance on influencer endorsements without transparency.
  • Protect yourself: Conduct thorough research, avoid investments promoted solely by influencers, and stick to reputable exchanges and cryptocurrencies.
Online Shopping Scams will Persist Thanks to Social Media
Fake online stores have been around for years, but scammers increasingly turn to social media to market their schemes. These platforms provide scammers with vast audiences and tools to create convincing, fraudulent campaigns.
  • How it happens: Scammers set up fake e-commerce pages advertising heavily discounted products. Once you make a purchase, either the product never arrives or it's a cheap counterfeit.
  • Red flags: Unverified accounts, poor-quality product images, or lack of customer reviews.
  • Protect yourself: Stick to trusted online retailers and use secure payment methods that offer buyer protection.
Phishing Scams Will Continue to Evolve
Phishing scams remain one of the most effective methods for scammers to steal your personal and financial information. In 2025, these scams are becoming more sophisticated, targeting individuals across various platforms and exploiting their trust.
  • How it works: Phishing typically involves fake emails, text messages, or links designed to look like they come from legitimate organizations. Scammers trick you into sharing sensitive details, such as passwords, credit card information, or Social Security numbers. 
  • New Trends:
  1. Personalized phishing:  Scammers now tailor their messages using information found on social media or public databases, making their attempts more convincing.
  2. Instant messaging apps:: Fraudsters increasingly use platforms like WhatsApp, Telegram, and Signal to send phishing links.
  3. QR code phishing (Quishing): Scammers share malicious QR codes that redirect users to fake websites designed to harvest personal data.
  • Red Flags: Unexpected messages asking for personal details, urgent requests to act immediately, or suspicious links and attachments.
  • Protect yourself: 
a. Verify the sender's identity before clicking on any links.
b. Check for spelling errors or unusual email addresses.
c. Use antivirus software and enable two-factor authentication for extra security.
d. Avoid scanning QR codes from unknown sources.
 
Event Driven Scams
Scammers are quick to capitalize on current events, using disasters, high-profile news, and even popular entertainment events to their advantage. These event-driven scams exploit emotions, urgency, and the sheer scale of public interest to trick unsuspecting victims.
  • How it happens: 
i. Disaster Relief Scams:  Following natural disasters or humanitarian crises, scammers pose as charity organizations, soliciting donations that never reach those in need.
ii. Concert and Festival Scams: Fraudsters create fake ticket selling websites or social media posts for popular events, like Taylor Swift's Eras ticket scams, offering deals that seem to good to be true.
iii. Sports Events Scams: Major sporting events are also a common target, with scammers selling counterfeit tickets or promoting fake contests.
  • Red flags: Requests for donations to unverified charities, ticket prices significantly lower than market value, or suspicious-looking event websites.
  • Protect yourself:
a. Verify charities through trusted platforms before donating.
b. Purchase event tickets only from authorized sellers or official websites.
c. Be cautious of social media ads offering exclusive deals or last-minute tickets.
 
Spot the Scammer in 2025: Warning Signs to Watch For
Scammers are like chameleons, constantly adapting to their surroundings. But beneath the surface, their tricks often share familiar patters. Here's your cheat sheet to recognize the telltale signs of a scam:
1. Out-of-the-Blue Buzz
A surprise call, text, DM, or email can be the opening act. Whether it's a "friendly" outreach on social media or a professional-sounding email. unsolicited contact is often the bait.
2. Ticking Time Bomb
Pressure is the scammer's favorite tool. They'll spin tales of dire consequences-leaked photos, missed deals, or vanishing opportunities- all to make you act without thinking.
3. "Safe" Account Shenanigans
If someone asks you to move money to a secure account, don't buy it. This is a classic move to steal your cash while making you feel like you're safeguarding it.
4. Do it, or Else!
Threats of fines, legal trouble, or even public humiliation are designed to scare you tinto compliance. Legit organizations don't use intimidation as their MO.
5. Too sweet to Be Real
Jaw-dropping deals, dream job offers, or "guaranteed" investment returns? If it sounds too good, it's probably fiction.
6. Tech Takeover Requests
Be wary of anyone asking to access your device or install apps remotely. It's the digital equivalent of handing over your keys to a stranger.
7. Shady Links
Ads or links from unknown sources urging you to "click here" can lead to trouble. Whether they're sponsored posts or suspicious results, tread carefully.
8. Signs of Sloppiness
Look out for poor grammar, awkward speech patterns, or mismatched mouth movements in video calls. Whether it's typos in URLs or accents that don't align, these quirks are often the mask slipping.
 
Stay Ahead of Scammers
Scammers can try all the tricks in the book, but you can always stay two steps ahead. Here's how to ensure you don't fall for their schemes:
  • Enable two factor authentication on all your online accounts.
  • Monitor your bank statements regularly for unauthorized transactions.
  • Educate yourself and your family about common scam tactics.
  • Report scams to your local authorities or fraud prevention organizations.
 
 
 
 

How Do I Prevent Account Takeover Fraud?
 
Tips to protect your passwords, usernames and online accounts.
Account takeovers have become a growing concern for people of all ages during 2023. Whether you're managing your retirement funds, social media accounts, or online shopping accounts, the risk of having your personal information and finances compromised is real. 
 
Understanding Account Takeovers
Account takeovers, also known as ATOs, occur when cybercriminals gain unauthorized access to your online accounts. These accounts can include financial institutions, social media profiles, email accounts and more. Once attackers gain access, they can steal your personal information, make unauthorized purchases, or even commit fraud in your name. 
 
Why Account Takeovers Matter
Account takeovers can have severe consequences, particularly for older adults who may have accumulated significant savings and assets over their lifetime. Here's why account takeovers matter:
  • Financial Loss: Cybercriminals can drain your bank accounts, make unauthorized purchases with your credit cards, or even liquidate your investments, leading to significant financial losses.
  • Identity Theft: ATOs often involve the theft of personal information, which can be used to open new lines of credit or commit other fraudulent activities in your name.
  • Emotional Distress: Dealing with the aftermath of an account takeover can be emotionally distressing, causing anxiety, frustration, and feelings of violation.
Protecting Yourself Against Account Takeovers
Fortunately, there are steps you can take to protect yourself from account takeovers and reduce the risk of falling victim to cybercriminals:
  • Strong, Unique Passwords and Usernames- Create strong, unique passwords for each of of your online accounts. Use a combination of letters, mismatched words, numbers, and symbols, and avoid using easily guessable information like birthdays or names. 
  • Two-Factor Authentication (2FA): Enable 2FA wherever possible. This adds an extra layer of security by requiring a one-time code sent to your mobile device or email when logging in.
  • Regularly Update Software: Keep your devices and software up to date to patch any vulnerabilities that cybercriminals might exploit.
  • Monitor Your Accounts: Regularly review your financial and online accounts for any suspicious activity. Report any unauthorized transactions immediately to your bank or the respective platform.
  • Beware of Phishing, Vishing, and Smishing: Be cautious of unsolicited emails, messages, or phone calls that ask for personal information. Verify the sender's identity before sharing any sensitive data.
    • Phishing is when criminals send you a fake email to get your information, including your passwords.
    • Vishing, or voice phishing, is when criminals make a fake phone call or an automated robocall.
    • Smishing is when they send you a fake SMS text message.
  • Secure Wi-Fi Networks: Use secure, password-protected Wi-Fi networks when accessing your accounts, especially in public places.
  • Educate Yourself: Stay informed about the latest cybersecurity threats and best practices for online security. 
  • Use a Password Manager: Consider using a reputable password manager to generate, store, and autofill your complex passwords.
  • Freeze Your Credit: Consider placing a credit freeze with the major credit bureaus to prevent new accounts from being opened in your name without your permission.
Account takeovers pose a real threat to individuals of all ages, but with vigilance and proactive measures, you can significantly reduce your risk. Protecting your financial well-being and personal information requires ongoing attention to online security practices.
 
 
Financial Scams to Avoid
 
Wire Transfer Scams
Wire Transfers can be a convenient way to send and receive money. That's why scammers find them so attractive.
 
Never Wire Money to Someone You Don't Know
This is the main advice when it comes to wiring money. If you don't know the person you're sending the money to- or if you haven't known them very long- simply don't do it. If you've sent money to a scammer by mistake, there's a good chance the money will be gone for good.
 
Signs of a Wire Transfer Scam
You're Unexpectedly Asked to Wire Money
 Be cautious before wiring money- even if you're asked by the government, a good friend, or relative.
Calls from the IRS, for example, are often scams. Fake IRS representatives will threaten you with arrest or other consequences if you don't pay up. If you think you might owe money to a government agency, contact them separately to confirm. Otherwise, just hang up!
 
Your relatives can even be used as part of a scam. Scammers are very skilled at fooling people into thinking their own relatives are asking for money. They might call you from a familiar phone number and disguise their voice, claiming to be crying or sick. They may email you from a familiar email address/name. They might seem credible because they know details about your family that they have learned from the internet. 
 
If you have any doubt, make sure you contact a relative separately to confirm the story. Don't listen to pleas to "not tell anyone". Remember, they are asking for your hard earned money!
 
You're sent a Check in Exchange for a Return Payment
Scammers will sometimes send a fake check-cashier's check, personal check, money order, etc.- and ask you to cash it and then send them the money.
 
Sometimes, they will say you have won a prize or the lottery, have earned an inheritance, can work from home, or can become a "secret shopper." Other times, you will receive a check as payment to something you were selling online. Either way, the check will be for more than they're asking in return. They'll say this is for processing fees and your time/effort pr that the extra payment was a mistake that they need refunded immediately.
 
Beware! The check is a fake. Don't attempt to ash it. Immediately cut off communication.
This is fake. You never need a confirmation code or money transfer control number to pick up wired money. If someone requests this info, you're being scammed.
 
You're Asked to Wire Money to Another Country
Typing or grammar errors are a common sign of foreign scammers attempting to get you to send them money. They'll have a convincing reason for their request- e.g., a grandchild is on vacation, etc. But there's almost no good reason to wire money without confirming the story first.
 
 
 
 
 
 



Proudly serving North Texas for over 130 years.