Online Banking

Fraud Alerts

Stay abreast of the latest fraud alerts to learn how to help you avoid being a victim.

Recent Alerts

  • 9/8/17 - The Equifax Data Breach

    September 8, 2017
    by Seena Gressin, Attorney, Division of Consumer & Business Education, FTC

     

    If you have a credit report, there’s a good chance that you’re one of the 143 million American consumers whose sensitive personal information was exposed in a data breach at Equifax, one of the nation’s three major credit reporting agencies.

     

    Here are the facts, according to Equifax. The breach lasted from mid-May through July. The hackers accessed people’s names, Social Security numbers, birth dates, addresses and, in some instances, driver’s license numbers. They also stole credit card numbers for about 209,000 people and dispute documents with personal identifying information for about 182,000 people. And they grabbed personal information of people in the UK and Canada too.

     

    There are steps to take to help protect your information from being misused. Visit Equifax’s website, www.equifaxsecurity2017.com.

     

    • Find out if your information was exposed. Click on the “Potential Impact” tab and enter your last name and the last six digits of your Social Security number. Your Social Security number is sensitive information, so make sure you’re on a secure computer and an encrypted network connection any time you enter it. The site will tell you if you’ve been affected by this breach.
    • You also can access frequently asked questions at the site.

     
    Here are some other steps to take to help protect yourself after a data breach:

    • Check your credit reports from Equifax, Experian, and TransUnion — for free — by visiting annualcreditreport.com. Accounts or activity that you don’t recognize could indicate identity theft. Visit IdentityTheft.gov to find out what to do.

    • Consider placing a credit freeze on your files. A credit freeze makes it harder for someone to open a new account in your name. Keep in mind that a credit freeze won’t prevent a thief from making charges to your existing accounts.

    • Monitor your existing credit card and bank accounts closely for charges you don’t recognize.

    • If you decide against a credit freeze, consider placing a fraud alert on your files. A fraud alert warns creditors that you may be an identity theft victim and that they should verify that anyone seeking credit in your name really is you.

    • File your taxes early — as soon as you have the tax information you need, before a scammer can. Tax identity theft happens when someone uses your Social Security number to get a tax refund or a job. Respond right away to letters from the IRS.

    • Visit Identitytheft.gov/databreach to learn more about protecting yourself after a data breach.

    • Consider protecting yourself with Kasasa Protect™

     

    Have questions? We're here to help. Contact us.

  • 6/27/17 - "NotPetya" Ransomware Attack

    You may have already heard in the news about another widespread ransomware attack taking down large companies, hospitals, and transportation systems around Europe and the U.S. Labeled "NotPetya" by security authority Kaspersky Lab, it uses the same Windows vulnerability that the "Wannacry" ransomware did just a few weeks ago.

     

    Screenshot of NotPetya rasomware

     

    How does NotPetya work? 
    NotPetya doesn't just encrypt files, it also overwrites the Master Boot Record. This renders the machine unusable and prevents users from recovering any information on it. Unlike WannaCry, Petya does not include any type of "kill switch" 

     

    If you have been infected

    1. Do not pay. You will not only be a financial criminal, but you are also unlikely to regain access to your files. The email account used to manage ransom demands, in this case, has been blocked. So the attackers' only known channel for communication at the moment, has been rendered useless. 
    2. Make sure that you keep a copy of the phishing email received from the attackers and provide it with the police, as it helps with their investigation. 
    3. Disconnect infected devices from the internet. If the infected device is part of a network, isolate it as soon as possible, to prevent the spread of the virus to other nodes in the network. 
    4. You can then format the hard drive, reinstall the operating system and apps, run any available updates and, finally, restore the locked files from your backup device 

    If you have not been infected

    1. Keep all applications and the Operating System up to date. If you are offered the option of automatic updates by your device, take it. 
    2. Keep your data backed up, and create two copies - one in the cloud, and one is physical storage. It is easy to retrieve those files even if you are affected by Ransomware. Use robust security products to protect your system from all threats, including ransomware. 
    3. Do not use high privileges accounts (accounts with administrator rights) for daily business. 
    4. Even if trusted parties like banks send you suspicious or unexpected emails, do not click on the attachments or the links.
  • 5/15/17 - "Wannacry" Ransomware Attack

    The ransomware attack, known as "Wannacry," has affected over 200,000 individuals and organizations worldwide, with a vast majority in Europe and Asia. As of the writing of this communication, there have been no infections detected or reported at any of Safety Net's client sites. We proactively ran full scans on various systems to be certain.

     

    The cyber-attack that began on Friday, May 12, took advantage of a vulnerability in the Windows Operating System (OS). Safety Net had already pushed out a Microsoft patch that addressed the vulnerability during regular maintenance windows. Symantec created and pushed out a fix for the worm, as well.

     

    This outbreak is a good example of why diligent maintenance of multi-layered protection (antivirus, patches, spam filtering, firewalls, and user education) is so important.

  • 5/4/17 – Google Docs users hit by phishing scam

    Google Docs users were recently hit with a phishing scam. During the attack, users were sent a deceptive invitation to edit a Google Doc, with a subject line stating a contact "has shared a document on Google Docs with you".

     

    The email address hhhhhhhhhhhhhhhh|@|mailinator[.]com was also copied in to the message; Mailinator, a free email service provider has denied any involvement.

     

    If users clicked on the "Open in Docs" button in the email, they were then taken to a real Google-hosted page and asked to allow a seemingly real service, called "Google Docs", to access their email account data.

     

    By granting permission, users unwittingly allowed hackers to potentially access to their email account, contacts and online documents. The malware then e-mailed everyone in the victim's contacts list in order to spread itself.

Important Notice

You're leaving this website

When you click continue you will connect to another website which we do not own or operate.