ID Theft ProtectionFirst Federal Savings Bank is committed to protecting and securing your private information here at the bank and we hope the following information will help you do the same in all of your financial transactions. Below are tips on how to reduce your risk and potential damage of Identity Theft, and what to do if you find yourself a victim. |
What is Identity Theft?Identity theft occurs when someone without your permission uses personal information such as your name, Social Security number, credit or debit card number to commit fraud. Criminals use this information to charge purchases to your accounts, withdrawal money, and open new lines of credit in your name. |
How can you become a victim of Identity Theft?Identity thieves have a number of ways in which to get ahold of your personal information. Many times, victims of identity fraud gave the thieves the necessary information unwittingly. The vast majority of the time emails that say "You have won the lottery!" or "The Prince of a foreign country has left you $5 million dollars" are in fact scams designed to get you to respond with valid account information the thieves will then use to defraud you. Another common way Identity Thieves "Phish" for your information is by sending emails or texts saying "There is an issue with your account, please login with your user name and password." The website or phone number these messages lead to is often designed to capture your account information and is never a valid website or number. Fraudsters also look to steal your identity by going through your trash and looking for bank statements and other important documents. A great way to prevent this is to enroll in eStatements for all of your most important financial accounts and remove the paper trail. Another common way you can become a victim is by downloading malware or spyware on your desktop, laptop or mobile device. Malware is a type of malicious software designed to infiltrate a computer system without the operator's knowledge or consent. The malware is then used to capture any personal information entered into or located on the device where it is installed. The more information criminals can acquire about you, the easier it is for them to steal your identity. |
Common Signs of Identity Theft
|
Reduce your risk of becoming a victim of Identity Theft
|
What to do if you are a victim of Identity TheftIf you suspect your personal information has been stolen or compromised you should take action immediately:
|