SNBT feels that it is important to alert the community to scams and fraudulent activity. Awareness is the key to avoiding being victimized by these types of crimes.
Once a victim answers the phone, the first words heard are, ‘Can you hear me alright?’ and without thinking right away the victim says, ‘Yes.’ By then, it's too late. "It seems the intent of the scam is to get a recording of that person saying the word ‘yes’,” said Susan Bach, the regional director for Wisconsin Better Business Bureau.
Bach says that “yes” recording could be edited to make it sound like you agreed to a major purchase or credit card payment.
View the original news story from WBAY: http://wbay.com/2017/01/31/dozens-falling-victim-to-can-yo u-hear-me-phone-scam-in-wisconsin/
How SNBT Protects You
| ||Fraud Detective - We have an automated system that monitors your ATM and Debit Card transactions for potentially fraudulent activity. If a threat is discovered, you should receive an automated phone call that will verify whether recent transactions are fraudulent.|
|Mastercard SecureCode - When you carry a Mastercard, you can register your card for this service. It provides another layer of protection while shopping online.|
|Pick Your Own ATM & Debit Card PIN - You control your card's security and can change your own PIN by calling 1-800-567-3451.|
How You Can Protect Yourself
| ||Monitor Accounts Frequently. Waiting for your monthly statements to arrive may be too late. Instead, routinely monitor your bank and credit accounts by enrolling for online banking or mobile banking .|
| ||Check Your Credit Score for Free. You're entitled to one report from each of the three credit bureau reports. (Equifax, Experian and TransUnion) every twelve months through www.AnnualCreditReport.com.|
| ||Never Give your Personal Information to Anyone. No legitimate entity, neither the police nor bank personnel, will ever ask you for your Account or Personal Identification Number PIN) number. This is true in person, on the phone, and by email. If you are ever suspicious, contact your SNBT for verification.|
|Keep a Record of all of your ATM, Debit, and Credit Cards. Maintain a file of your account numbers, card numbers, expiration dates, and issuing bank's 800 numbers. If your card or wallet is ever stolen, you'll be able to contact them and provide necessary information.|
|Take Action. If you discover unauthorized use or if your Credit or Debit Card number is stolen, and are able to report the loss before your card is used, you're not responsible for any charges you did not authorize. Reporting before use provides zero liability, 2 days to 2 weeks losses could be $50 - $500. After 60 days your liability is unlimited.|
What to do After ID Theft
|Five Steps to Take if Your Identity is Stolen - While prevention is the best solution, you need to know what to do if you become victim of identity theft. Here are five steps to take immediately if you think your identity has been stolen.|
| ||Financial Elder Abuse - Learn the signs of financial elder abuse so you know what to watch for if you suspect a senior citizen is being exploited to gain access to their property, investments, cash, or real estate.|
| ||Taking Charge - What To Do If You Identity is Stolen, a 68- page comprehensive resource guide from the Federal Trade Commission.|
|You Have the Power to Stop Identity Theft - Be on guard against "urgent" requests and unsolicited "deals" on the Internet. This includes fraudulent text messages.|
|Securing Your Home Network - Unfortunately, the default configuration of most home routers offers little security and leaves home networks vulnerable to attack.|
|||Before You Connect a Computer to the Internet - We rely heavily on our computers to provide many important services, yet we sometimes overlook our need to secure them. Follow these essential steps to make your home computer more secure.|
|Reported Theft of 1.2 Billion Passwords - Learn the steps to take if your passwords are stolen from some of the sites you frequently visit. Following these tips will allow you proactively protect your accounts.|
|SPAM Emails Look Real, Be Cautious - SCAMS come in a variety of forms and try to mimic trustworthy sources. Lately fraudsters have sent emails pretending to be from Walmart.com or Amazon.com, even FedEx and UPS to name a few. Do not click on any links, in fact DO NOT even open them.|
| ||Security Tips to Protect Yourself Online - A recent Javelin survey found that consumers with smartphones are 30% more likely to be victims of identify fraud. The survey also found that certain behaviors on social media can put consumers at risk.|
|Be On Guard Against Texting Scams - A new scam involves a fraudulent text message sent to cell phones warning bank customers that their debit or credit card has been blocked for security reasons.|
|ATM Skimming - Many consumers are unaware of another common financial scam that can severely impact their bank accounts: ATM skimming. Here are a few things you need to know in order to protect yourself.|
Identity Theft - is a generic term that covers a number of possible loss situations including purse/wallet snatch, mail theft, insider sources, impostors, spyware, phishing scams, account takeover (using account information to commit a fraud), full-blown identity theft (an impostor obtains personal information about the victim and “takes over” their identity in another location, normally another state), and data compromise.
Check Fraud - is where consumers are tricked into depositing counterfeit cashier’s checks and money orders with instructions to send funds back to someone, either the remitter or another person involved with the scam. When the check is returned to the bank as counterfeit, the consumer is legally responsible for restitution.
Keylogging - software allows cybercrooks the ability to see what you type, for instance your access ID or password. According to the Center for Strategic and International Studies, cybercrime creates a $100 billion annual loss to the U.S. economy.
Ransomware - a form of malware - becomes a growing problem for both individuals and businesses. Ransom can affect individual computers or laptops, enterprise networks or servers used by government agencies, financial institutions and health care providers. In a typical ransomware scheme, cyber criminals freeze the victim's device, steal data and demand that a "ransom" be paid.
Phishing - the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Education - is the best way to protect you from these types of thefts. Arm yourself with as much information and knowledge about what avenues these thieves are taking to get your money or your identity. Many government agencies websites provide information on various frauds and identity theft; they also provide instructions on what to do if you’ve been victimized.
www.us-cert.gov US Department of Homeland Security
www.identitytheft.gov Resources from the government
www.staysafeonline.org Powered by the National Cyber Security Alliance
www.annualcreditreport.com Obtain your free credit report
www.creditkarma.com Access to all of your financial information in one location - FREE!
www.fdic.gov/consumers Federal Deposit Insurance Corp (FDIC)
www.ftc.gov/consumer Federal Trade Commission (FTC)
http://www.privacy.wi.gov/ WI Office of Privacy Protection
http://www.ic3.gov/ Internet Crime Complaint Center
www.onguardonline.gov/ Federal Trade Commission, Homeland Security, Office of Justice Programs, US Postal Inspection, Dept of Commerce, Securities & Exchange Commission