Always Remember: Family Savings Credit Union and all other financial institutions will never call you asking for any personal/identifying information. DO NOT Give personal information such as account numbers, PIN numbers, and social security numbers over the phone unless you initiate the call to the institution first. We have that information from when you opened your account with us.


Protecting the financial information of our members is top priority at Family Savings. Whether you are using online, mobile or telephone banking, or simply shopping online, we all have a role to play in keeping your personal and financial information secure. If you suspect fraudulent activity has occurred on your account, please contact our Fraud Analyst, Paula Knowles, at 256-439-5915 or 888-311-3728 Ext. 5915. 


If you suspect fraud on your Family Savings Visa® Debit/ATM card, you may block your card by calling 256-543-9530 (toll free at 888-311-3728) or by using NetTeller Online Banking . Our Visa® Fraud after-hours line may be reached by calling 1-844-484-0049.


News on the Recent EQUIFAX Data Breach

If you have a credit report , there’s a good chance that you’re one of the 143 million American consumers whose sensitive personal information was exposed in a data breach at Equifax, one of the nation’s three major credit reporting agencies.

Here are the facts, according to Equifax. The breach lasted from mid-May through July, 2017. The hackers accessed people’s names, Social Security numbers, birth dates, addresses and, in some instances, driver’s license numbers. They also stole credit card numbers for about 209,000 people and dispute documents with personal identifying information for about 182,000 people. And they grabbed personal information of people in the UK and Canada too.

There are steps to take to help protect your information from being misused. Visit Equifax’s website, www.equifaxsecurity2017.com . (This link takes you away from our site and is not controlled by FSCU.)

  • Find out if your information was exposed. Click on the “Potential Impact” tab and enter your last name and the last six digits of your Social Security number. Your Social Security number is sensitive information, so make sure you’re on a secure computer and an encrypted network connection any time you enter it. The site will tell you if you’ve been affected by this breach.
  • Whether or not your information was exposed, U.S. consumers can get a year of free credit monitoring and other services. The site will give you a date when you can come back to enroll. Write down the date and come back to the site and click “Enroll” on that date. You have until November 21, 2017 to enroll.
  • You also can access   f requently asked questions at the site.

Here are some other steps to take to help protect yourself -

  • Closely monitor all credit accounts and loans, to catch and report any suspicious activity on any one of those accounts.
  • Immediately report any suspicious credit or loan account activity – no matter how remote the suspicion – to the financial institution and/or lending institution.
  • Sign up for the fraud alerting services offered by the three credit bureaus to to receive notifcations about potentially fraudulent activity: 
  • Sign up for free credit monitoring services, to monitor and report unauthorized activity.
  • Place a freeze on all three credit bureau accounts to prevent fraudsters from opening new accounts.
  • Sign up for email/text alerts with live card activity through the financial institution and through the card issuer’s website:
  • Visit the FTC’s page on the Equifax breach to learn about what happened and what to do.
  • Visit the FTC’s identity theft website to learn what steps to take in response to proven identity theft.

We will continue to keep you updated with any new information as we continue to monitor the Equifax cyber security breach.


Beware of Bogus Chartitable Solicitations Produced by Jay Slagel, VP of Risk Management at Allied Solutions

It is a sad, but real fact that charity fraudscams spike in the wake of a tragic event or natural disaster, such as therecent hurricanes. 


The culprits of these heinous crimes typically use email and social mediaploys to lure victims to visit a bogus website or download malicioussoftware so they can then gain access to the private information on consumers'devices.


The perpetrators may also try to obtain money from individuals throughsoliciting donations to a bogus charity. The following are steps that can betaken by your consumers to prevent exposure to charity scams:

  • Do not respond to any unsolicited incoming e-mails, and do not click links contained within those messages, because they may contain viruses.
  • Be skeptical of individuals representing themselves as members of charitable organizations or officials asking for donations via e-mail or social networking sites.
  • Beware of organizations with copy-cat names similar to - but not exactly the same as - those of reputable charities.
  • Rather than follow a purported link to a website, use online resources to confirm the group’s existence and its non-profit status.
  • Be cautious of e-mails that claim to show pictures of the disaster areas in attached files because the files may contain viruses. Only open attachments from known senders.
  • To ensure contributions are received and used for intended purposes, make contributions directly to known organizations rather than relying on others to make the donation on your behalf.
  • Do not be pressured into making contributions; reputable charities do not use such tactics.
  • Be aware of whom you are dealing with when providing your personal and financial information. Providing such information may compromise your identity and make you vulnerable to identity theft.
  • Avoid cash donations, if possible. Pay by credit card or write a check directly to the charity. Do not make checks payable to individuals.
  • Do not respond to any charities soliciting donations via money transfer services, because no charity would request fund that way. 
  • Be especially wary of organizations with websites ending in ".com" claiming to be charities. Most legitimate charities have websites ending in ".org".

Report suspicious e-mail solicitations orfraudulent websites to your financial institution and to the FBI’s InternetCrime Complaint Center: www.ic3.gov


Steps to Protect Yourself: Online, Mobile, Debit Cards and Email


Online Security

Change your Password regularly. Family Savings CU recommends this be done every 60-90 days.

Never give your passwords to anyone. Family Savings CU will NEVER ask for your password in an email, over the phone, in a text or any other communication method.

Do not reuse passwords. Do not use the same password you have set for Family Savings Online Banking for any other account.

Use a password manager. If you use a password manager, you do not have to remember all your passwords; only the one to the password manager. This allows you to use long, complex and unique passwords for all your accounts. Be sure to make the password to your password manager a strong one. Macs have a password manager built in (Keychain) and there are many available for Windows.

Do not send sensitive information via e-mail. Never e–mail passwords, account numbers, social security numbers or other sensitive information to anyone.

Use a “two factor” method for authenticating to sites if available. This is especially important for email since email is often used to reset passwords, confirm actions and as additional method for identity verification.

Install protection software on your home computers such as anti-virus, anti-spyware and anti-fraud protection software and keep them up to date.

Use a personal firewall. Firewalls are built into virtually all computer operating systems. Click here for more information: Windows , Mac

Use a physical home router/firewall between your computer and your cable or DSL modem.

Turn on automatic updates for your operating system ( Windows , Mac ) and applications that you have installed, especially your web browser, Adobe Reader, Adobe Flash, Adobe Shockwave and Oracle Java.

Create a second, non-privileged operating system account, for normal, everyday use and use your privileged (administrator) account only when needed, like when installing software. ( Windows , Mac )

Use a pop-up blocker. Set your browser preferences to block pop–ups as pop-ups can contain malicious code.

Use a browser add-on that blocks advertisements (an ad blocker)

Use a browser add-on that blocks scripts such as No-Script, uBlock or use a sandboxing technology like Sandboxie.

Conduct online banking and make financial transactions only with a trusted computer (one owned by you or someone you trust) on a trusted network—wired or wireless.

Never use a public computer for online banking. If you must bank while away from a trusted computer, use the F amily Savings Mobile App .

Turn off your computer when not in use.

Review your account and transaction information regularly —least once a week. If you notice any changes to your account that you didn't make, contact us immediately at 1-888-311-3728.

Set up account alerts to receive alerts on your cell phone or in e-mail so you can stay updated on your account activity. Set up account alerts using NetTeller Online Banking.

Freeze your credit report. A security freeze prevents potential creditors from being able to pull your credit file. When your credit file is frozen, ID thieves can apply for credit in your name, but not be able to establish new lines of credit. Few creditors will extend credit without determining the risk of doing so (i.e., view your credit file). You can unfreeze your credit file any time.

If you do not freeze your credit report, check it regularly. Ensure you recognize all the accounts listed. Contact one of the three major credit-reporting agencies (Equifax, Experian, and Transunion) for a copy of your credit report.

Sign out of accounts and websites.  When you have finished using an Internet service that you logged into, sign out and do not just close the browser. It is possible that some sites may not close your session (log you out) when the browser window is closed.

Check certificates. When visiting secure sites that have a padlock, green or orange address bar or a URL that begins with “https”, view the site certificate and verify that it is for the site you believe you are visiting. This can be done by clicking on the padlock and then “view certificate” or “more information”. This will display the details about the certificate including the owner and issuer.


Mobile Security

Do not root or jailbreak your mobile device to get around limitations set by your carrier or device manufacturer. It removes protections built into the device to defend against mobile threats.

Only download Apps from official stores such as iTunes or Google Play.

Avoid connecting your smart phone to an unsecured wireless network.


Phishing Scams

Far more hacks are accomplished with words than technical knowledge. This is called Social Engineering, and the goal is to convince you to help the attacker do all the work for them!

How does the attacker trick you into doing this? They rely on four general strategies… appealing to greed, appealing to fear, appealing to authority or relying on human kindness.

  • Appeal to greed: an attacker will offer you some method to make some easy money.
  • Appeal to fear: the hacker will tell you, your bank account has been hacked, or tell you your computer has been filled with malware and must be cleaned immediately.
  • Appeal to authority: a hacker will attempt to mimic someone in charge and ask you to do something because of their position.
  • Appeal to human kindness: they may send an email stating they really need your help to do “X”. It may even appear to be from someone you know.

Every one of these scenarios can occur over email, chat, text, the phone or even in person.

In all of these situations, you can avoid being caught out with a few strategies.

  • Take your time. Don’t let them force you to make a decision. Spend a few minutes asking yourself if this is a good idea.
  • Verify their identity. Verify they are who they say they are through an outside channel.
  • Be very careful with email attachments. If you were not expecting it, verify that the sender intended to send it to you.
  • Do not click on a link in an email until you’ve hovered your mouse over it to reveal where it truly leads and it is where you expected it to go.


ATM/Debit and Credit Card Security

Memorize PINs & Passwords - do not write them down. If you must write them down, keep them in a password manager or on paper nowhere near your credit or debit cards.

Protect your card information Do not provide it online unless you are making a purchase from a website you trust. Secure sites typically will direct you to a secure page with a URL starting with “https://” whenever you are making purchases or are being asked to provide confidential information.

Don’t store credit card numbers and other financial data on your cell phone or PDA.

If you have a card with RFID, use an RFID blocking (Faraday) wallet , purse or other container to protect your card from unauthorized reading.

Beware of Skimmers . Skimmers are small devices that are designed to fit over card slots and keypads to collect card data and card PINs. Common places for these are ATMs and gas pumps. Some are virtually impossible to identify. If the card reader is loose or you see exposed wires, do not use it.

 

SPOTTING IDENTITY THEFT

Identit y theft can happen even if you've been very careful with your personal information. Below are some potential indicators of identity theft.

  • Failing to receive bills or other mail.
  • Receiving cards or billing statements on accounts for which you did not apply.
  • Receiving calls from debt collectors or companies about merchandise or services you didn't buy.
  • You see withdrawals from your bank account that you can’t explain.
  • Merchants refuse your checks.
  • You find unfamiliar accounts on your credit report.
  • The IRS notifies you that more than one tax return was filed in your name, or that you have income from an employer you don’t work for.
  • You get notice that your information was compromised by a data breach at a company where you do business or have an account.

If you are using a screen reader and are having problems using this website, please call 888-311-3728 for assistance.