The percentage of fraud that occurs online is steadily increasing, and a majority of scams today occur through the use of technology. Knowing how to spot different types of online fraud is the first line of defense in protecting your money and identity. Here are some best practices to keep in mind so you can securely navigate the internet and keep your finances safe!
Only open emails when you know the sender.
Check the sender's email address to verify that it is from a valid email account.
Ensure that any URLs in the email lead to a valid website.
Be careful when clicking on links contained in an unknown email. Just clicking a link could enable thieves to access your computer, record your keystrokes and capture passwords you use to access various websites.
Be aware of suspicious attachments, as they may contain viruses. Be careful opening or downloading files, even from friends.
Never fill in an email with input fields that ask you for sensitive data such as username, password, ATM PIN or account number information.
Do not open or follow instructions in any email asking you to verify information.
As a provider of online banking services, KCU will occasionally communicate with its members via email.
If you click a link in an email from KCU, make sure that you are on an official Kohler Credit Union page (www.kohlercu.com).
KCU will ask you to enter your username and password ONLY when you are on our official website.
KCU will NEVER ask you to send sensitive account information such as your credit card number, account number, password, username, etc. through email.
Fraudulent websites are created to look identical to legitimate company pages in an attempt to steal sensitive personal and financial information from users. Once at a phony site, you might unknowingly enter personal information and give scammers access to purchase goods, apply for a new credit card or even steal your identity.
A phony website will not contain the padlock symbol or https:// in the URL.
Most commonly, phony websites will lure customers through spam email (see above).
Inspect a URL for the presence of an "@" symbol, e.g., kohlercu@statements.com. This is a common sign of a fraudulent website. Even if the URL contains the phrase "kohlercu" it does not ensure that it is our website.
Be suspicious of sites that display an IP Address, or numerical address, e.g., http://190.192.100.255 in the address bar instead of a domain name.
Phishing is an attempting to acquire sensitive information by pretending to be a legitimate company. Victims are lured in by phony websites, email spoofing or instant messaging and asked to verifying private information that can be used to hack into your finances and more.
Practice safe banking etiquette to avoid phishing.
Verify that emails are legitimate.
Be aware of phony websites and how they work.
If you become aware of a phishing attack, report it to the authorities.
Vishing is when scammers use voice technology to appear to be a reputable party or claim a loved one is in an emergency to get personal information or money. If you use a Voice over Internet Protocol (VoIP) phone service, you are particularly vulnerable to this scam. Vishing is very hard for authorities to trace and monitor, so it is important that you are alert to such behavior.
Be highly suspicious when receiving calls or messages asking for or verifying sensitive financial information.
Be leery of any automated recordings posing as a credit card company or financial institution.
Never give suspicious parties your information. Even if you use your telephone keypad or keyboard to type in your details, if you are on the line, the scammer can record them.
Do not use a contact number provided by the caller.
Directly call the organization to check the legitimacy of the request.
Dumpster diving can help criminals gather information for fraud purposes, ranging from identity theft to spying on companies and neighbors. Once you throw something in the trash for pickup, your privacy is thrown to the curb too.
Shred mail that has personal information such as account statements, utility bills, credit card pre-approvals, expired credit cards, canceled checks, etc.
Destroy electronic items that may have data stored on them including laptops, USB devices, iPods, phones, etc. before throwing them away.
Consider when you place your trash bins outside for pick up. The less time between when you put the trash outside and when it gets picked up, the less time a thief has to grab information.
The less paper trail, the better. Sign up for eStatements and online bill pay.
Re-routing and stealing mail are the top two offline identity theft methods.
Watch your mailbox. Drop mail off at the post office instead of leaving it in your mailbox.
If you’re going out of town, put a hold on your mail so nothing gets delivered while you are not home.
Not getting any mail? Contact the post office immediately.
Foreign Business Offers. They pretend to be business people or government officials from various countries with business propositions that will make you money.
Warning signs:
Overpayments. They offer overpayments on items you advertised in the classifieds or an online auction such as Craigslist.
Warning signs:
Rental Schemes. They want to rent your property, but have some suspicious requirements.
Warning signs:
Sudden Riches. You won a foreign lottery, sweepstakes or a cash grant!
Warning Signs:
Work-at-Home. They promise easy money and the ability to work from home.
Warning Signs:
Love Losses. A type of scam that targets widows and people on dating sites. You think you’ve found that special someone online, who then begins to ask for money.
Warning Signs:
Exploitation through Education. Targets education-seeking and unemployed individuals looking for a fast, easy way to change careers and make more money.
Warning Signs: