Preventing fraud begins with you. Here are some tips to help you recognize and avoid fraud.
The security of your account(s) and personal information is very important to us. Please take time to review the following information on current threats, scams, cybersecurity and tips on how you can protect yourself:
Attempts to scam or fool you can happen over almost any form of communication you use - from Skype, WhatsApp, and Slack to Twitter, Facebook, Snapchat, Instagram, and even gaming apps. Communication over these platforms or channels can feel more informal or trustworthy, which is precisely why attackers are using them to fool others. In addition, with today's technologies, it has become much easier for any attacker anywhere in the world to pretend to be anything or anyone they want. It is important to remember that any communication that comes your way might not be what it seems and that people are not always who they appear to be.
Here are the most common clues that a message or post may be an attack:
The message has a sense of urgency that demands "immediate action" before something bad happens, like threatening to close your account or send you to jail. The attacker wants to rush you into making a mistake.
The message pressures you to bypass or ignore policies or procedures at work.
The message invokes a strong sense of curiosity or promises something that is too good to be true.
The message includes a request for non-public information such as a credit card number or password, or any information that you are not comfortable sharing.
The message may say it comes from an official or government organization but has poor grammar or spelling. Most government organizations will not use social media for official communications. If you are not sure if the message is legitimate, call the organization using a trusted phone number, such as one from their website.
You receive a message from a friend or co-worker, but the tone or wording does not sound like them. If you are suspicious, call the sender on the phone to verify they sent the message. It is easy for cyber criminals to create messages that appear to be from someone you know. In some cases, they can take over one of your friend's accounts and then pretend to be your friend and reach out to you.
Be particularly aware of text messages, Twitter, WhatsApp and other short message formats where it is more difficult to get a sense of the sender's personality.
You are the best defense against scams, cons, and attacks. If a post or message seems odd or suspicious, simply ignore or delete it. If it is from someone you personally know, call the person on the phone to confirm if they really sent it.
Cybersecurity is a shared responsibility and each of us has a role to play. It only takes a single infected computer to potentially infect thousands and perhaps millions of others. Everyone should take basic cybersecurity measures that can improve both individual and collective safety online. Here are some common tips:
Antivirus and anti-malware software are great ways to protect your devices from malicious viruses and software.
Installing software updates for your operating system and all programs is critical. Always install the latest security updates for your devices:
Phishing scams are a constant threat - using various social engineering ploys, cyber criminals will attempt to trick you into divulging personal information such as your login ID and password, banking or credit card information.
Watch for emails that:
The Bank will NEVER ask for sensitive information, such as account numbers, Access IDs or passwords, via e-mail or by phone. Always type PacificAllianceBank.com directly into your browser and NEVER follow a link to access our website.
We all have too many passwords to manage and it's easy to take short-cuts like reusing the same password. A password manager can help you to maintain strong unique passwords for all your accounts. These programs can generate strong passwords for you, enter credentials automatically, and remind you to update your passwords periodically.
Change default usernames and passwords. Default usernames and passwords are readily available to malicious actors. Change default passwords as soon as possible to a sufficiently strong and unique password.
Avoid visiting unknown websites or downloading software from untrusted sources. These sites often host malware that is automatically installed (often silently) and compromise your computer.
If attachments or links in the email are unexpected or suspicious for any reason, do not click on it.
The physical security of your devices is just as important as their technical security.
Considering how much we rely on our mobile devices and how susceptible they are to attacks, make sure you are protected:
Back up your data regularly - if you are a victim of a security incident, the only guaranteed way to repair your computer is to erase and re-install the system.
Make sure to use a physical credit or debit card with an EMV Chip embedded. Pay attention when using an ATM for unusual devices which may be a skimming device installed by a cyber criminal to steal your card information.
EMV Chip Cards:Â All new Pacific Alliance Bank debit cards now come with a security chip embedded in the card. This technology makes it nearly impossible for your card information to be stolen when used at a merchant's chip reader. For your convenience, this card can be used for contactless payments making it a secure, convenient and touch-free process. The new card should have a Contactless Indicator on either the front or back. You can tap to pay wherever you see the Contactless Symbol at many of your favorite stores.
Ransomware is a type of malware threat actors use to infect computers and encrypt computer files until a ransom is paid. After the initial infection/locked system, ransomware will attempt to spread to connected systems, including shared storage drives and other accessible computers.
If the threat actorâs ransom demands are not met (i.e., if the victim does not pay the ransom), the files or encrypted data will usually remain encrypted and unavailable to the victim. Even after a ransom has been paid to unlock encrypted files, threat actors will sometimes demand additional payments, delete a victimâs data, refuse to decrypt the data, or decline to provide a working decryption key to restore the victimâs access. The Federal Government does not support paying ransomware demands.
Identity theft occurs when a thief obtains some piece of personal information about a consumer, and without the consumerâs knowledge, appropriates the information to commit fraud or theft. A common example is when an identity thief uses consumersâ personal information to open a credit card account in the consumerâs name, and uses the account to ârun-upâ fraudulent charges or obtains credits for business etc.
Order a free copy of your credit report from each of the three major credit-reporting agencies every year by visiting www.annualcreditreport.com. Make sure it is accurate and includes only those activities you have authorized.
By checking your report on a regular basis, you can catch mistakes and fraud before they wreak havoc on your personal finances. Don't underestimate the importance of this step.
To order your report, call:Â 1-800-685-1111
To report fraud, call:Â 1-800-525-6285
To order your report, call:Â 1-800-916-8800
To report fraud, call:Â 1-800-680-7289
The Bank is committed to safeguarding our customersâ financial information. Maintaining our customersâ trust and confidence is a top priority. To learn more about how we protect your information, please ask for a copy of our privacy policy or click on the link in our website.
For more information, please contact us or visit a location near you.