Every 5 Years
Please read the other sections below to learn about the different types of fraud and how to prevent them, from spyware and other computer fraud to mail and phone fraud to email phishing and web spoofing. Our Fraud Summary page provides more tips on how to protect yourself.
Identity Theft is the most popular and profitable form of consumer fraud. It occurs when someone uses your personal information such as your name, Social Security number, credit card number or other identifying information, without your permission to commit fraud or other crimes.
“Old Fashioned” Stealing
Change of Address
Monitor your accounts
Keep track of transactions on your accounts by logging in to South Ottumwa Savings Bank‘s Online Banking, where you can view your activity as it is posted.
Protect your personal information
South Ottumwa Savings Bank continually makes investments in state-of-the-art online banking security to ensure we protect the confidentiality of every customer’s online information and to provide the utmost security of every user.
Computer protection tips:
We recommend you learn ways to protect yourself from common fraud schemes.
Vishing scams target consumers by “spoofing” text or voicemail messages that ask you to call a phone number and give your personal information. Here’s how it works:
Smishing is when consumers’ cell phones and other mobile devices are targeted with mobile spam. The spam, or text messages, attempt to trick consumers into providing personal information. Here’s how it works:
Lottery/Sweepstakes scams target consumers by a notification, which arrives through the mail, by email, or by an unsolicited telephone call. Here’s how it works:
Check Overpayment Scams
Check Overpayment scams target consumers who sell items through an online auction site or a classified ad. Here’s how it works:
Tips for the mailbox
Tips for the phone
While South Ottumwa Savings Bank works to protect your banking privacy, you also play an important role in protecting your information. Here are a few steps you can take to protect your identity:
Phishing scams target consumers by “spoofing” emails and websites. Here’s how it works:
Email protection tips
Bank Error Messages
One of the newest schemes by fraudsters involves spoofing bank error messages. Here’s how it works:
Emails from South Ottumwa Savings Bank
For your protection, we will not send you an email to update or confirm your sensitive information by clicking a link or replying.
Emails to South Ottumwa Savings Bank
Please do not send personal information in un-secure email. Secure email may be sent from the Secure Feedback form from within our Online Banking’s Support Tab.
|Equifax®||P.O. Box 740241|
Atlanta, GA 30374-0241
|1 (800) 525-6285||www.equifax.com|
|Experian®||P.O. Box 9532|
Allen, TX 75013
|1 (888) EXPERIAN |
|TransUnion®||Fraud Victim Assistance Division|
P.O. Box 6790
Fullerton, CA 92834-6790
|1 (800) 680-7289||www.transunion.com|
We continually make investments in state-of-the-art online banking security to ensure we protect the confidentiality of every customer’s online information and to provide the utmost security of every user.
The Federal Deposit Insurance Corporation (FDIC) has received numerous reports from consumers who received an e-mail that has the appearance of being sent from the FDIC. The e-mail informs the recipient that “in cooperation with the Department of Homeland Security, federal, state and local governments…” the FDIC has withdrawn deposit insurance from the recipient’s account “due to account activity that violates the Patriot Act.” It further states deposit insurance will remain suspended until identity and account information can be verified using a system called “IDVerify.” If consumers go to the link provided in the e-mail, it is suspected they will be asked for personal or confidential information, or malicious software may be loaded onto the recipient’s computer.
This e-mail is fraudulent. It was not sent by the FDIC. It is an attempt to obtain personal information from consumers. Financial institutions and consumers should NOT access the link provided within the body of the e-mail and should NOT under any circumstances provide any personal information through this media.
The FDIC is attempting to identify the source of the e-mails and disrupt the transmission. Until this is achieved, consumers are asked to report any similar attempts to obtain this information to the FDIC by sending information to email@example.com.
Sandra L. Thompson, Director
FDIC: Division of Supervision and Consumer Protection
A fast growing electronic crime where thieves typically use some form of malware to obtain login credentials to Corporate Online Banking accounts and fraudulently transfer funds from the accounts.
What is Corporate Account Takeover, how does it work?
Types of Security Threats
What can you do to protect your business?
Contact the Bank if you:
The Bank will never ask for sensitive information, such as account numbers, access IDs, or passwords via e-mail.
Incident Response Plans
Since each business is unique, customers should write their own Incident Response Plan. A general template would include:
How to recognize a phishing, mishing or vishing scam
How to respond to a phishing, mishing or vishing scam
How to reduce the damage if you think you have fallen for a scam
When you think about cybersecurity, remember that electronics such as smartphones and other internet-enabled devices may also be vulnerable to attack. Take appropriate precautions to limit your risk.
Actually, the issue is not that cybersecurity extends beyond computers; it is that computers extend beyond traditional laptops and desktops. Many electronic devices are computers—from cell phones and tablets to video games and car navigation systems. While computers provide increased features and functionality, they also introduce new risks. Attackers may be able to take advantage of these technological advancements to target devices previously considered “safe.” For example, an attacker may be able to infect your cell phone with a virus, steal your phone or wireless service, or access the data on your device. Not only do these activities have implications for your personal information, but they could also have serious consequences if you store corporate information on the device.
Any piece of electronic equipment that uses some kind of computerized component is vulnerable to software imperfections and vulnerabilities. The risks increase if the device is connected to the internet or a network that an attacker may be able to access. Remember that a wireless connection also introduces these risks (see Securing Wireless Networks for more information). The outside connection provides a way for an attacker to send information to or extract information from your device.
For more information on how to protect yourself go to www.dhs.gov/stopthinkconnect