Personally Identifiable InformationPersonally identifiable information is any information that can be used to identify, locate, or contact an individual. This includes, but is not limited to – your name, Social Security number, date of birth, address, and phone number. Pay attention to where you might use, or share, your personally identifiable information. Don’t include any identifying information in your passwords, PIN numbers, or passcodes. Unless absolutely required for a legitimate business purpose, avoid giving out your:
The following links are resources to learn more about how to protect, store, and use your personally identifiable information.Safeguarding Sensitive PII Factsheet Protecting Your Privacy |
SpamNo, not the canned meat... We've all encountered unwanted calls, texts, emails, and junk mail. What if there was something you could do about all that spam? Welcome to what if. You have options to fight those dirty, rotten spammers.Unwanted Calls Unwanted Emails, Texts, and Mail Spam Texts Robocalls |
Debit Card SecurityTo protect your account, we monitor your debit card transactions for potentially fraudulent activity which may include a sudden change in locale (such as when a U.S. - issued card is used unexpectedly overseas), a sudden string of costly purchases, or any pattern associated with new fraud trends around the world. To help protect you:
Here’s what you can do:
|
Likes And Tags And Emails, Oh My!The world wide web is the greatest thing since sliced bread. It's a magical place of communication, information, and diversion. Unfortunately there are also dark corners where scammers lie in wait. Those corners often include the places we frequent most online - email accounts and social media platforms. Email Account SecurityEmail accounts are often targeted by scammers as a way of taking over your computer or device, installing hidden spyware, or tricking you into giving up your personal identifying information. Some hackers may try to take over your accounts altogether. Fraudulent emails may seem to come from reputable sites but carry bad links taking you to fake login sites or attachments that install unwanted software. These bad emails will often have typos or a sense of urgency. Stay alert to warning signs that your email accounts are at risk:
Some ways to protect your email accounts are:
Social Media SafetySocial media is a huge source for cybercriminals to gain your private information. You give away lots of personally identifiable information in those fun quizzes! Bad guys can hide out in social networks, requesting to be your friend and then using your personal profile information to hack your accounts. As you troll the reels, make sure your account is secure by looking out for these warning signs:
You can take actions to protect and secure your social media accounts:
Here are some tips to safely use email and social media accounts.Social Media Security Online Privacy and Security Phishing Scams |
Identity TheftIdentity Theft is the fastest growing crime. On average, it is about 3 months before a person even realizes they’ve been victimized. It can happen in many different ways: theft of a purse or wallet, "Dumpster Diving" for personal information you’ve discarded, mail theft, using online data, and even "Shoulder Surfing" when someone looks over your shoulder to steal information... rude. You can set up alerts on your bank account to help you spot suspicious activity like invalid logins, transactions, or fraudulent online charges. Many notice a problem when their credit card bills arrive with unauthorized charges. Others learn about it when they find their credit rating has been trashed. The point is, if your identity is stolen, you need to act quickly. You need to contact one of the three major credit bureaus: Equifax, Experian, and TransUnion. Ask that a Fraud Alert be placed on your file and that no credit be granted without your permission. Please check the additional links below for more information on Identity Theft. It could save you a lot of trouble.Free Credit Reports Identity Theft Resources Understanding Credit and Debt SIM Swap Fraud REPORT IDENTITY THEFT |
Don't stop here! Keep exploring with these links. Our Security Business Security Common Scams Your Resources REPORT FRAUD Only YOU can prevent forest fires... er, fraud attacks. Any further questions or comments, please contact us. |