
Your information security is paramount to 1st Century Bank, and there is a great deal to consider in helping minimize your risk. Included in the information below, you will find not only some of the security measures 1st Century Bank is taking, but also a brief description of methods thieves use and what you can do to help protect yourself.
Phishing
Phishing is a scam that uses fraudulent emails and websites to trick recipients into giving away their personal information, such as credit card numbers, Social Security numbers, and online banking user names and passwords. The most common attack is to receive an email appearing to be from a reputable organization with a link that actually takes you to an attacker’s website where your personal information can be recorded. For your safety, 1st Century will never ask for your personal information in an email.
Identity Theft
With identity theft, a thief will use your stolen identity to obtain credit, commit fraud, or take other actions that can harm your reputation. A thief will use credit card numbers, Social Security numbers, addresses or phone numbers to open a credit card or bank account, allowing for fraudulent purchases and other criminal activities. For the victim, correcting the damage can be costly and time consuming.
Software Threats
Software threats like viruses, worms and trojans can attack your computer, rendering it unusable or leaving your information accessible to someone else.
- Viruses: Viruses are programs that either hide inside other programs or move through email messages to infect your system. To protect your computer from viruses, you should be using anti-virus software. You can buy anti-virus software online or from a computer store. Vendors update their software every day, so make sure your software is set to update automatically. Monitor your anti-virus software to be sure it does not lapse.
- Worms: Worms run across networks to find vulnerable systems that they will copy themselves to and begin scanning from that system, infecting more computers.
- Trojans: Trojans pose as legitimate programs, but will actually put your computer and your information at risk.
Spyware
Spyware is a category of program that gathers information about your patterns, such as websites you visit, your bookmarks or search phrases you use. Symptoms of spyware include a change in your homepage, an increase in the number of pop-up windows, being directed to search pages you do not normally use or getting search results that do not match your request. Products from the major anti-virus vendors are usually the safest option to detect spyware, and they can be configured to update automatically when new capabilities are released.
Social Engineering
Social engineering attacks use human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person or researcher and even offering credentials to support that identity. However, by asking questions of several people or over a period of days, they may be able to piece together enough information to infiltrate an organization’s network. These questions may include user identification, passwords, full names, PC numbers or IP numbers. If an attacker is not able to gather enough information from one source, they may contact another source within the same organization and rely on the information from the first source to add to their credibility.
Corporate Account Takeover
Corporate account takeover is the business equivalent of personal identity theft. Hackers, backed by professional criminal organizations, are targeting small-and medium-sized businesses to obtain access to their online banking credentials or remote control of their computers. These hackers will then drain the deposit and credit lines of the compromised bank accounts, funneling the funds through mules that quickly redirect the monies overseas into hackers’ accounts.
The steps of a typical corporate account takeover include:
1. Target victim
2. Install malware
3. Monitor online banking
4. Collect and transmit data
5. Initiate funds transfer
Bogus Check Scams
Bogus or fraudulent check scams involve the use of counterfeit checks to be deposited into your bank account with the intention of collecting the funds before your bank can determine that the items are fraudulent.
Internet-Based Job Opportunities With a Signing Bonus
The fraudulent hiring company claims to not have a United States bank account and asks the new employee to deposit the company’s cashier’s check or a check from a U.S.-based vendor into their personal checking account. The new employee is then instructed to keep the “signing bonus” and possibly the first month’s wages, and wire the remaining funds to an overseas account. The original check is not legitimate, and the scam is discovered after their bank tries to collect from the overseas account.
Internet-Based Auction Sales
The overseas buyer or winning bidder may send a cashier’s check in excess of the sale amount to cover shipping. The seller is instructed to wire the remaining funds to an overseas account. In some cases, the sale is canceled after the payment is deposited but before the merchandise is shipped, with the buyer asking that a full refund be wired back.
Visit 1st Century Bank’s Security Measures for details about what 1st Century Bank does to help keep your information safe. For more information, read about what you can do to Protect Yourself or What To Do If You Are A Victim. Additional Online Resources where you can obtain information regarding computer safety, latest threats, what to do if you are victimized and how to obtain your credit report.