

Identity Theft Prevention
- Safeguard your financial information such as checking account, debit or credit card, and social security numbers. Unless you know the person or organization you're dealing with, don't give it out, even someone claiming to be from your bank. Bank of DeSoto will never ask you to provide this information over the phone.
- Report lost or stolen checks immediately. Review new deliveries of checks to make sure none have been stolen in transit.
- Report lost debit cards immediately. Report to the Bank of DeSoto as soon as you think you have lost or misplaced your card.
- Notify the bank of suspicious phone inquiries such as those asking for account information to "verify a statement" or "award a prize".
- Shred financial solicitations or financial statements before disposing of them.
- Deposit your mail into a secure, official Postal Service collection box.
- If regular bills fail to reach you, call the company to find out why. Someone may have filed a false change-of-address form to divert your mail and steal your personal information.
- If your statements include questionable items, investigate immediately. This is often the first sign of fraudulent activity.
- Avoid phishing scams. Never reply directly or click on a link in response to an email that asks for personal or financial information. If you are concerned about your account, contact the bank as soon as possible. Remember, the Bank of DeSoto will never contact you to just to verify personal information.
- Personal safety
- Chip technology
- Account Security
- The added safety measures work only for in-person or card-present transactions—the card must be inserted into the ATM to be read. All financial institution ATMs have been updated with new hardware and software to read and authorize
the microchip cards.
- Protect your ATM and debit card as if it were cash. Report lost or stolen cards immediately.
- Don’t write your Personal Identification Number (PIN) on your card.
- Never leave the receipt behind, even after an incomplete transaction. Discarded ATM receipts can lead to identity theft or account hijacking.
- Use common courtesy at the ATM. Give people ahead of you space to conduct their transactions.
- If you find any irregularities in your statement, then contact your financial institution immediately to report the incident.
- If you leave your car and walk to the ATM, turn off your ignition and lock your car. If you use a drive-up ATM, be sure to roll up passenger windows and lock your car doors.
- Use extra caution when using an ATM at night. If the lights at the ATM are not working, don’t use it. If shrubbery has grown up, or if a tree blocks the view, select another ATM and notify the financial institution.
- If you use the ATM at night, consider taking a friend along.
- Count your cash later. Once you’ve completed your ATM transaction, put your money away immediately and leave the ATM premises. It’s best to count your money later.
- Always use common sense when using an ATM. The tips in this brochure are a start, but the best advice is simply to be aware of your surroundings when at the ATM.
- Federal Trade Commission - www.ftc.gov
- Federal Reserve Board - www.federalreserve.gov
- Secure Technology Alliance - www.securetechalliance.org
- Lawmakers, regulators, and the banking industry have forged substantive standards for safeguarding customers’ personal information.
- Uniform examination procedures are in place to monitor and enforce these standards, and bank examiners regularly go on-site to assess how bank security measures are being implemented, understanding that each bank has a different menu of products and services, and therefore differing security requirements. Some of the areas they look at include:
- Access controls ensure customer information can be accessed only by authorized persons, including use of multi-factor authentication when warranted.
- Physical restrictions at computer facilities that permit access to authorized persons only.
- Data encryption of electronically transmitted and stored customer information.
- Modification procedures to ensure that changes are consistent with the approved security program.
- Dual control procedures, segregation of duties, and employee background checks.
- Monitoring procedures to detect actual and attempted intrusions into customer information.
- Response programs specify actions to be taken by specific individuals when the institution suspects unauthorized access.
- Environmental hazard protections against physical damage or technology failures.
- Strong passwords—Experts advise a combination of letters and numbers, and advise against using easily guessed passwords such as birthdays or home addresses.
- Anti-virus protections—Make sure the anti-virus software on your computer is current and scans your email as it is received.
- Email safety—Email is generally not encrypted so be wary of sending any sensitive information such as account numbers or other personal information in this way.
- Sign off and log out—Always log off by following the bank’s secured area exit procedures.
- Don’t get phished—Crooks are always trying to get your personal information, and they employ some ingenious methods. Don’t respond to any unusual email requests for personal information—when you opened your bank accounts you already gave it. When in doubt, call your bank.
- Monitor your accounts—When you check your accounts regularly, you can let your bank know immediately if you encounter anything that does not seem right.
Helpful Hint: Studies show that those who monitor their accounts online often detect fraud earlier than those who rely solely on paper statements.
- When it comes to guarding against cyber fraud, one of the most important tools at your disposal is your credit report. It details all of your credit transaction accounts and will be the first place where unusual charges or entirely new accounts will appear. And you can monitor your report for FREE.
- Since Federal law permits consumers to obtain a free report annually from each of the three major credit reporting agencies, cyber-security experts advise that you get a free report from a different agency every four months. Doing so will allow you to monitor your online security all year long.
- Do not give out financial information such as checking and credit card numbers, or your Social Security number, unless you know the person or organization.
- Report lost or stolen checks immediately. Your bank will block payment on them.
- Notify your banker of suspicious phone inquiries such as those asking for account information to “verify a statement” or “award a prize.”
- Closely guard your ATM Personal Identification Number and ATM receipts.
- Shred any financial solicitations and bank statements before disposing of them.
- Put outgoing mail into a secure, official Postal Service collection box.
- If regular bills fail to reach you, call the company to find out why.
- If your bills include questionable items, don’t ignore them. Instead, investigate immediately to head off any possible fraud.
- Periodically contact the major credit reporting companies to review your file and make certain the information is correct.
copy of their own credit report.
- Other measures will help consumers recover their credit reputation after they have been victimized:
- Credit reporting agencies must stop reporting allegedly fraudulent account information when a consumer establishes that he or she has been the victim of identity theft;
- Creditors or businesses must provide copies of business records or fraudulent accounts or transactions related to them. This information can assist victims in proving that they are, in fact, victims.
- Consumers will be allowed to report accounts affected by identity theft directly to creditors—in addition to credit reporting agencies—to prevent the spread of erroneous information.
- Place a fraud alert: 1-888-766-0008
- Order a credit report: 1-800-685-1111
- Place a fraud alert: 1-888-397-3742
- Order a credit report: 1-888-397-3742
- Place a fraud alert: 1-800-680-7289
- Order a credit report: 1-800-888-4213
The scammer contacts a person to report an urgent security problem or some suspicious activity with an internet device that needs immediate attention. Then they ask to verify personal information or to allow them access to computer files. Often, they direct a person to a website that looks authentic — but it is not. The page was set up to phish for personal information that collects the data and imbeds malware.
These scammers need one thing; that is, to get account information and account access — without it — they can’t steal.
If you get an unexpected pop-up, telephone call, email or other urgent message about a problem with your computer or other device, stop right there! Technology companies will never call you to offer a solution to a random computer problem.
This call is likely a technical support scam and the goal is to convince you that your computer or other device has a serious, urgent problem — and only they can provide the fix.
These scams occur when a scammer contacts you pretending to work for a legitimate business or government agency. The initial contact may be by telephone, email, mail, or even a text message. The two most common types of this fraud are:
-
- Tax collection scam – You receive a phone call or letter claiming that you owe taxes. They will demand that you pay immediately, often with a prepaid debit card or wire transfer. They threaten serious consequences if you don’t pay.
- Verification scam – You receive a phone call, an email or text message that requires you to verify your personal information from the Social Security Administration. The message often includes a link to a phishing website.
- Hang up if you get a telephone call from someone who claims to be from computer tech support or a government agency asking for personal information.
- Ignore it if you get a pop-up message, email or text that directs you to call a specific telephone number or go to a website for technical support or government agency.
- Never use the phone number in the pop-up or on caller ID. Instead, find the real contact information online.
- Never give control of your computer or other device to anyone who contacts you by telephone, e-mail, pop-up or text message.
- Remember the IRS doesn’t initiate contact with taxpayers by telephone, email, text messages, or social media channels to request payments or personal information. Call 800-366-4484 to report it.
-
- Federal Trade Commission www.ftc.gov
-
- Federal Deposit Insurance Corporation www.fdic.gov
-
- National Credit Union Association www.ncua.gov
-
- Financial Fraud Enforcement Task Force www.stopfraud.gov
