Fraud Protection Graphic
As your Bank, we are here to help guide and support you in understanding what hackers are doing to obtain and misuse your confidential data, and what you can do about it. We have taken steps to empower you with tips, tools, examples and knowledge that we will share on an ongoing basis via email, social media and this page. These steps are intended to help you in responsibly safeguarding your accounts and data, as well as be aware of the most current scams.
Why is it so important to be aware of and vigilant in protecting yourself from fraud?
Your security has been and always will be a top priority. By being aware of and informed on these topics, together we can effectively fight fraud.
Multi-Factor Authentication (MFA) can block 99.9% of attacks on your accounts, according to Microsoft. With MFA enabled, you need to provide additional verification in order to access accounts online, providing more layers of security and making it more difficult for a hacker to access your account. Basically, after you log in with your username/email and password, you will be asked to provide further authentication to verify it is you. Typically, it is a one-time passcode sent to your email or phone, or a notification sent to an authenticator app on your phone, or a request for a biometric like your fingerprint. MFA means a bad actor/hacker may get a hold of your username/email and password, but they won’t have your additional layers of authentication so their efforts to access your accounts will be thwarted.
Learn more about multi-factor authentication for the safety of your digital banking.
90% of passwords are vulnerable to attack (source: Avast). Here are steps you can take to keep your passwords and PINs safe –
Making sure software and apps you are using are the most current is easy to do and plays an important role in keeping your information safe. Software and app companies are constantly monitoring and advancing their products to stay well ahead of hackers. In doing so they push updates to you that fix general software problems and provide new security patches and tools, protecting your data from being exposed to criminals. The next time you receive a notification for an update, think smart, be safe and perform the update as soon as possible.
The most common forms of fraudulent communications you may receive are phishing (email), vishing (phone call) and smishing (text message). These give the appearance of coming from a reputable source and try to trick you to take action in order to obtain your confidential information.
Tips to Avoid phishing, vishing and smishing –
Imposters to watch for who are targeting you and your money –
With the convenience it offers to make payments digitally (transferring money from one bank account to another), many of us use p2p on a regular basis. While p2p is secure, it’s important to be aware that this is an area scammers are targeting to have you send them money. Know how to identify that it is happening, how to protect against it and what to do if you are victim to a p2p scam.
Identifying p2p scams –
How to protect against p2p scams –
If a p2p scam happens to you –
Social media has become a mainstay in staying connected with our friends, neighbors and communities. According to Oberlo, the average amount of time spent on social media worldwide is set to hit 147 minutes, or two hours and 27 minutes, a day in 2022.
Here are steps you can take to keep yourself safe as you spend time on social media –
From shopping to research and so much more we heavily rely on the internet. And, we surf online from everywhere – when we are at home, on vacation, at a restaurant/coffee shop, in our cars, etc. Increase your protection as you spend time on the web by doing the following –
With Business Email Compromise (BEC) scams, they can result in extremely large sums of company dollars being unknowingly sent to cyber criminals. Make sure your organization has protocols in place to be aware of BEC scams and how to protect against them.
How BEC scams work –
To protect your organization, verify any financial transaction, especially ones that include edits to the processing of the transaction, in person or by calling the person involved in the transaction to make sure it is legitimate.
Below are links to true stories of real people targeted by scammers using various methods to steal their confidential information. We will continue to share stories to keep you aware of the most current issues other customers have faced to help us all relate and learn valuable lessons to fight fraud.
Case Study #4 – Debit Card Fraud
Case Study #9 – p2p Fraud
A Providence Bank & Trust representative will contact you if we detect unusual activity on your account(s).
When we contact you –
Important Disclaimer Information:
All trademarks and registered marks are the properties of their respective owners.