Today’s youth have grown up surrounded by computers, smartphones, the internet and social media. It’s no surprise they are internet and tech savvy and have a lot of confidence navigating online. Along with their tech knowledge, young kids and teens may also be more...
What Are Tax Scams & How to Identify Them
Tax season is a prime time for fraudsters. Taxes are often mystifying, leaving people with questions about their tax returns. And because the IRS does not carry a perfect reputation with Americans, many are left on edge about receiving IRS communications. These...
Cybersecurity Tips: Protect Yourself Against Student Loan Forgiveness Scams
Some people seeking student debt forgiveness may not understand the process or know which sources to trust to see if they qualify. Unfortunately, loan scammers take advantage of those individuals. In doing so, they create fake student loan forgiveness applications to...
Fraud Prevention: Tips & Red Flags You Should Know
Fraud has become increasingly more common in today’s digital age. Fraudsters have more ways to target individuals than ever before, such as email, text and social media. As a financial institution, our responsibility is to educate our members about fraud and how to...
Protect Yourself From Credential Stuffing
If you are reusing the same username and password for multiple apps and websites—you may be at risk of a potential cyber threat called credential stuffing. What is credential stuffing? Credential stuffing occurs when hackers use stolen information, such as usernames...
Identity Theft and Fraud: The Differences
By Jamie Wagner, Ph.D. Protecting Your Identity In today’s world of data breaches, compromised passwords and credit card fraud we’ve become accustomed to the idea of identity theft and identity fraud. It’s become so status quo that those two phrases are interchanged...
Identity Theft: How to Safeguard Your Personal Information
Understanding Identity Theft When someone uses your personal information (name, address, Social Security number, bank account numbers or medical insurance account numbers) without your permission they are committing identity theft. This serious crime is happening more...
Cybersecurity: How to Protect Your Personal Information
What is Cybersecurity? Today’s technology is innovative, interactive and beneficial on many levels; however, it also lends itself to major security risks. Think of all the electronic devices you use on a daily basis. All of these devices are susceptible to threats on...
Elderly Financial Abuse: Identifying the Types and How To Prevent It
Understanding the Impact of Elderly Financial Abuse According to the Federal Trade Commission (FTC), millions of older Americans are financially abused. Records show that 84 percent of cases go unreported. Older Americans can fall victim to elderly financial abuse...