Presentation is loading. Please wait.

Presentation is loading. Please wait.

TRIAD Seniors Presentation Frauds and Scams

Similar presentations


Presentation on theme: "TRIAD Seniors Presentation Frauds and Scams"— Presentation transcript:

1 TRIAD Seniors Presentation Frauds and Scams
Presented by Lynn Gordon AVP/Branch Manager Union First Market Bank March 26, 2013 Good Morning! I hope the information I am about to share with you today will help enlighten you and possibly prevent you from being a victim of fraud. Prepared by Scott Nininger, CRCM, CFSSP, SVP, Director of Risk Management

2 Today’s Agenda Why are we vulnerable?
Why has white collar crime increased? Overview of various frauds, scams and security risks. How to protect yourself Overview of other vulnerabilities and considerations in protecting your valuables Questions and answers I have also given you some handouts that we will review a little later in the program. Today’s Agenda we will discuss: Why are we vulnerable? Why has white color crime increased? Overview of various frauds, scams and security risks. How to you protect yourself Overview of other vulnerabilities and considerations in protecting your valuables. Then we will have time for questions. If you have a question during the presentation please feel free to ask it.

3 Types of Frauds, Scams, and Security Risks
Viruses, Spyware, Spam Protecting your Account Facebook Security Sweepstakes/Lottery fraud Cashiers Check Fraud Secret Shopper Scam Repairman Scam Mobile Phone Security ATM Security Skimming Counterfeit Currency Physical Security at Home Check Fraud Alteration Counterfeiting Forgery Returned Deposited Items Credit Card Fraud Skimming Do’s and Don’ts Pretext Phone Calls Internet What is it? Navigation Best Practices Computer Security Settings Phishing Ok lets take a look at some of the different types of frauds, scams & security risks we will be talking about. Check Fraud Alteration Counterfeiting Forgery Returned Deposited Items Credit Card Fraud Skimming Do’s and Don’ts Pretext Phone Calls Internet What is it? Navigation Best Practices Computer Security Settings Phishing Viruses, Spyware, Spam Protecting your Account Facebook Security Sweepstakes/Lottery fraud Cashiers Check Fraud Secret Shopper Scam Repairman Scam Mobile Phone Security ATM Security Counterfeit Currency Physical Security at Home

4 DUCK CASH SCAM My goal in speaking with you today is to help you “Duck Cash Scams” In most cases a thief is putting something cute & fuzzy in front of you while the scammer is taking your money right behind your back.

5 Why are we vulnerable? Fraud – Misrepresentation of a material fact.
Scam artists prey on two forms of human bias: Confirmation (provides just enough information to pique our interest) Optimism (this is my lucky day, or I am due) People tend to feel overconfident in their ability of knowing more than they actually do. Many people feel that they are protected against fraud by law and the government. Best advice? If someone comes to you with a deal too good to be true, trust your instinct and walk away or be suspicious and perform due diligence. Lets start by defining what fraud is - -Fraud is a Misrepresentation of material facts. Scam artist prey on two forms of human bias- Confirmation-provides just enough information to pique our interest Optimism – this is my lucky day, or I am due! People tend to feel overconfident in their ability of knowing more than they actually do. Many people feel that they are protected against fraud by law & the government BEST ADVICE – If someone comes to you with a deal too good to be true, it probably is so trust you instinct and walk away or be suspicious and perform due diligence.

6 Causes for Increase in White Collar Crime
Safer, easier, less chance of getting caught Less stringent punishment through the courts Leniency of the courts bears on willingness of prosecutors Diminishing Role of Federal Law Enforcement Officials Must meet certain dollar thresholds Changing Morality Many people believe it is right to “rip off the establishment” Expanding International Technology Recent advances in computer hardware, software, and communications technology have increased the complexity and severity in types of fraud Lets first define “White Collar Crime” *White Collar Crime- is a financially motivated nonviolent crime committed for illegal monetary gain.** Causes for an increase in White Collar Crime Safer, easier, less chance of getting caught Less stringent punishment through the courts – Leniency of the courts bears on willingness of prosecutors Diminishing Role of Federal Law Enforcement Officials – Must meet certain dollar thresholds Changing Morality- Many people believe it is right to “rip off the establishment” Expanding International Technology- recent advances in computer hardware, software, and communications technology have increased the complexity and severity in types of fraud.

7 Check Fraud Alterations
If a change is authorized by the maker and it does not affect the obligation then there is no fraud. A date that does not exist (i.e. June 31st). Unauthorized change to words or numbers are alterations. Take care in writing checks (i.e. use ink, fill in all blank areas, watch your statement) Ok lets take a look at Check Fraud First we have Alterations- If a change is authorized by the maker and it does not affect the obligation then there is no fraud. Ex: A date that does not exist (i.e June 31st) Unauthorized change to works or numbers ARE alterations. Take care in writing checks- use ink, fill in all blank areas and watch your statements!

8 Check Fraud Counterfeiting
Fastest growing segment of check fraud with the greatest loss exposure How? Desktop publishing, inexpensive high-quality computer and printing equipment, and check paper stock (at office supply stores) enables the fraudster to produce checks that may exactly match the original check(s). I have some examples to show. The second type of check fraud is Counterfeiting This is one of the fastest growing segments of check fraud with the greatest loss exposure. How? We have desktop publishing, inexpensive high-quality computer and printing equipment, and check paper stock you can buy right at office supply stores. This enables the fraudster to produce checks that may exactly match the original checks. I have a couple examples on the following slides.

9 Images from www.ckfraud.org
This is an example of a Cashiers Check that is a counterfeit. Notice the different sizes of the font in the name vs the numerical dollar amount and the typed out dollar amount. Images from

10 Images from www.ckfraud.org
Here is another image of a check and as you can see the name is typed in a bold font in all caps and the dollar amount is typed in a smaller size font with a slant to it. Images from

11 Check Fraud Types of Forgery
Forged endorsement – someone signs your name on the back of the check made payable to you to obtain payment. Bank liable to its customer unless customer’s negligence substantially contributes to the forgery (i.e. stolen checks is typical scenario) Forged maker’s signature – someone steals your check(s) and sign’s your name as an authorized signature The drawee bank is liable for forged maker’s signature, unless customer’s negligence substantially contributed to forgery (i.e. you leave checks readily available for someone to steal) They 3rd type of check fraud is forgery. We have Forged Endorsement- someone signs your name on the back of the check made payable to you to obtain payment. In this case the bank is liable to its customer UNLESS the customer’s negligence substantially contributes to the forgery. Ex. Stolen checks is a typical scenario Then there is a Forged Makers Signature – someone steals your checks and signs your name as an authorized signature. The drawee bank is liable for forged makers’ signature unless customer’s negligence substantially contributed to the forgery. Example you leave checks readily available for someone to steal .

12 Check Fraud Returned Deposited Items
Most bank account agreements indicate that you are liable for any account shortage resulting from charges or overdrafts, whether caused by you or another with access to your account. Beware that unexpected checks that you deposit can come back to haunt you… And last but not least we have Returned Deposit items Most bank account agreements indicated that “you are liable for any account shortage resulting from charges or overdrafts, whether caused by you or another with access to your account. Please beware of that unexpected checks that you deposit can come back to haunt you. We will touch on this a little more when we get to the Scam section of this presentation.

13 Check Fraud US Patriot Act – requires banks to identify their customers. The better a bank knows you, the less likely you will be subjected to fraud. Funds Availability Regulation – Allows banks to place holds on your account. Not only helps banks but protects you. Privacy Rules– Seek to understand a bank/company’s handling of your personal information. The banking industry does have safeguards in place to try to help deter fraud. US Patriot Act- requires banks to identify their customer. The better a bank knows you, the less likely you will be subjected to fraud. Funds Availability Regulation- Allows banks to place holds on your account. Not only helps banks but protects you too. Privacy Rules- Seek to understand a bank/company’s handling of your personal information. We want to keep you personal information as secure as possible.

14 Credit Card Fraud Card Readers
In merchant locations a criminal can gain access to certain credit card readers and tap into them, capturing the data sent through them to the bankcard collection point. Next we will touch on Credit Card Fraud- There are a few different ways that credit card fraud can happen. In merchant locations a criminal can gain access to certain card readers and tap into them, capturing the data sent through them to the bankcard collection point.

15 Credit Card Fraud - Skimmers
Sometimes identity thieves can defeat even your best efforts to protect your credit card information by a hi-tech method called skimming, using a tiny data-collection device (known as a "skimmer"). These skimmers are easy to carry, easy to hide and easy to buy over the Internet. A typical skimming device is about the size of a pager, connected in the phone-line between the phone-jack and credit card machine. A typical "skimmer" costs about $200, compared to the cost in equipment needed to make a counterfeit credit card. Sometimes identity thieves can defeat even your best efforts to protect you credit card information by a hi-tech method called skimming, using a tiny data-collection device (know as a “skimmer”). These skimmers are easy to carry, easy to hide and easy to buy over the internet. A typical skimming device is about the size of a pager, can be connected in the phone line between the phone jack and credit card machine. A typical “skimmer” cost about $200, compared to the cost in equipment needed to make a counterfeit credit card.

16 Protect your Credit Card: Do’s
Sign your cards as soon as they arrive or write “See ID” on signature line. Keep a record of your account numbers, their expiration dates, and the phone number and address of each company in a secure place. Keep an eye on your card during the transaction, and get it back as quickly as possible. Save receipts to compare with billing statements. Open bills promptly and reconcile accounts monthly, just as you would your checking account. Report any questionable charges promptly and in writing to card issuer. Notify card companies when you change your address. May consider a RFID shield for your cards. Source: Federal Trade Commission Lets take a look at the do’s and dont’s of protecting your credit cards DO Sign your cards as soon as they arrive or write “See ID” on the signature line. DO Keep a record of your account numbers, their expiration dates, and the phone number and address of each company in a secure place. DO Keep an eye on your card during the transaction, and get it back as quickly as possible. DO Save receipts to compare with billing statements. DO Open bills promptly and reconcile accounts monthly, just as you would your checking account. DO Report any questionable charges promptly and in writing to card issuer. DO Notify card companies as soon as possible when you change your address. You may consider a RFID (Radio Frequency Identification) shield for your cards – (Special sleeve you can place your cards in and it will block the card from being read electronically from a distance)

17 Protect your Credit Card: Don’t
Lend your card(s) to anyone. If you do and the person conducts a transaction, they will be considered authorized. Leave cards or receipts lying around. Sign a blank receipt. When you sign a receipt, draw a line through any blank spaces above the total. Write your account number on a postcard or the outside of an envelope. Give out your account number over the phone unless you're making the call to a company you know is reputable. If you have questions about a company, check it out with the Better Business Bureau. Source: Federal Trade Commission Don’t lend your card to anyone because if you do and the person conducts a transaction, they will be considered an authorized user. Don’t leave cards or receipts lying around Don’t sign a blank receipt. When you sign a receipt, draw a line through any blank spaces above the total. Don’t write you account number on a postcard or the outside of an envelope Don’t give out your account number over the phone unless you are making the call to a company you know is reputable. If you have questions about a company, check it out with the Better Business Bureau.

18 Pretext Phone Calls There is tremendous demand for information about individual’s bank accounts. This rising demand has led to the establishment of “account information brokers”. Brokers gather financial information and sell this to anyone wiling to pay for it. Typical scenario: A broker may pose as a representative of a company suggesting something is wrong with your account. He/she may ask you to provide missing account information or update their database so your account will become active again. The next type of fraud we are going to look at is Pretext Phone Calls. There is a tremendous demand for information about individuals bank accounts. This rising demand has led to the establishment of “Account Information Brokers” These brokers gather financial information and will sell this to anyone willing to pay for it. A typical scenario: A broker may pose as a representative of a company suggesting something is wrong with your account. He/she may ask you to provide missing account information or they may say they are going to update their database so your account will become active again.

19 What is the Internet? Collection of computers connected to an underlying communication network. Each PC has an ID number and communicates with each other by means of protocols. Application layer protocols are the standard sets of rules that determine how computers communicate across the Internet. One of the most familiar is HTTP (Hyper Text Transfer Protocol), facilitates the movement of text and messages. Each government, company, and organization is responsible for maintaining its own network. No gov’t regulation and no one censors information made available. It is not secure. It lacks organization. No one owns or controls the Internet. No one is responsible for its reliability. What is one to do? Maintain system protection, safeguard access and records, proceed cautiously. Next we have the Internet What is the Internet? Collection of computers connected to an underlying communication network. Each PC has an ID number and communicates with each other by means of protocols. Application layer protocols are the standard sets of rules that determine how computers communicate across the Internet. One of the most familiar is HTTP (Hyper Text Transfer Protocol) this facilitates the movement of text and messages. Each government, company, and organization is responsible for maintaining its own network No government regulation and no one censors information made available It is not secure. It lacks organization. No one owns or controls the Internet. No one is responsible for its reliability. What is a person to do?? Maintain system protection, safeguard access and records, proceed cautiously.

20 Navigating best practices
Do not use public computers when conducting financial transactions or having to provide personal information. Watch what you download. While there are many free games, utilities, or other software on the Internet, many are laden with viruses and spyware. Don’t assume that a site that is certified is safe. A secure connection is typically achieved when you have “https” before the web address and a padlock or other icon on your browser, however please understand that it is no guarantee the website is reputable. Best advice: read the fine print and researching a site by reading online reviews, talk with friends to see if they have used the site before revealing your credit card or personal information. Avoid hyperlinks in . Hyperlinks can show one address but unknowingly take you to another. Before clicking on links within web pages, hover your cursor over the URL and confirm whether the address that appears at the bottom of your browser appears to a page you expect to visit. . Do not use public computers when conducting financial transactions or having to provide personal information Watch what you download- While there are many free games, utilities, or other software on the internet, many are laden with viruses and spyware. Don’t assume that a site that is certified is safe. A secure connection is typically achieved when you have “https” before the web address and a padlock or other icon on your browser, however please understand; that it is no guarantee the website is reputable. Best advice: read the fine print and researching a site by reading online reviews, talk with your friends to see if they have used the site before revealing your credit card or personal information. Avoid hyperlinks in Hyperlinks can show one address but unknowingly take you to another. Before clicking on links within web pages, hover your cursor over the URL and confirm whether the address that appears at the bottom of your browser appears to a page you expect to visit.

21 Computer Security Settings
Periodically review and adjust your settings as necessary Where do I find the settings? Click Start - Control Panel – Security Center Firewalls – Turn to “On”. If you have a router this may serve as another firewall. Automatic Updates – Turn to “Automatic” during the overnight hours to obtain security patches and Windows updates. Virus Protection – Turn to “On”. Make sure it is updated using a free or paid subscription program. Internet Options – Browsing history should be deleted periodically. Under security select the default. Under Privacy use at least the medium setting. Periodically review and adjust your settings as necessary Where do I find the setting?? You will Click Start- Control Panel-Security Center Firewalls– Turn to “ON” If you have a router this may serve as another firewall. Automatic Updates- Turn to “Automatic” during the overnight hours to obtain security patches and Windows updates Virus Protection– Turn to “On” Make sure it is updated using a free or paid subscription program. Internet Options– Browsing history should be deleted periodically. Under security select the default. Under Privacy use at least the medium setting.

22 Computer Security Settings
This is a screen shot of the Security Center on our computers and as you can see we are able to click on the Internet Options, Firewalls and Automatic Updates.

23 Phishing As in “fishing” for confidential information.
Consumers are deceived normally via deceptive s, fake (spoofed) websites, or both. Encompasses fraudulently obtaining and using an individual’s personal and/or financial information. If you receive any phishing s you can forward the to the Anti-Phishing Working Group Let’s look at an example… The next type of fraud we are going to look at is Phishing for confidential information. Consumers are deceived normally via deceptive s, fake(spoofed) websites, or both. Encompasses fraudulently obtaining and using an individuals personal and/or financial information. If you receive any phishing s you can forward the to the Anti Phishing Working Group Lets look at an example on the next slide.

24 Phishing Example As you can see this is an received supposedly from the IRS saying that you are eligible for a tax refund of $ The IRS would not be sending you an to let you know this information. You would be probably be receiving a letter in the regular mail. It is asking you to click this hyper link to access the form for your tax refund. If you click this link you could possibly provide private information to a scammer or it could attach a virus to your computer. Just delete these types of s.

25 Viruses A computer virus is a parasitic, self-duplicating, Trojan horse program (embedded inside another program that is never exposed to any threats) containing a logic bomb (delays the onset of “symptoms”). When an infected program is run, the virus attaches a copy of itself to yet another unaffected program. Subsequently, whenever either program is run, the virus will be duplicated, thus spreading quickly. Use antivirus programs to quarantine and prevent the spread of virus-laden files. A computer virus is a parasitic, self-duplicating, Trojan horse program (embedded inside another program that is never exposed to any threats) containing a logic bomb ( delays the onset of “symptoms”). When an infected program is run, the virus attaches a copy of itself to yet another unaffected program. Subsequently, whenever either program is run, the virus will be duplicated, thus spreading quickly. Use antivirus programs to quarantine and prevent the spread of virus-laden files

26 Spyware Information necessary to hijack accounts is obtained by inserting malicious software, often referred to as spyware, on a consumer’s home or public computer. Spyware can be loaded when a user opens a seemingly innocuous attachment or clicks on a pop-up advertisement. The spyware collects selected information (i.e. user ID, passwords, account numbers) and forwards it to the fraudster. A common type is a keystroke logger, a program that records what the user types on the keyboard and sends that information to the person who installed the program. Use an antispyware program to block spyware. free.avg.com is a user friendly option that also protects against malware and viruses. It scans and updates your computer daily. Information necessary to hijack accounts is obtained by inserting malicious software, often referred to as spyware, on a consumer’s home or public computer. Spyware can be loaded when a user opens a seemingly innocuous attachment or clicks on a pop-up advertisement. The spyware collects selected information (i.e. user ID, passwords, account numbers) and forwards it to the fraudster. A common type is a keystroke logger, a program that records what the user types on the keyboard and sends that information to the person who installed the program. Use an antispyware program to block spyware. free.avg.com is a user friendly option that also protects against malware and viruses. It scans and updates your computer daily.

27 Spyware Note: Union First Market Bank does not endorse this or any other security protection program it is mentioned for illustrative purposes. This is just a screen shot of a free Anti-Virus page at free.avg.com

28 Spam Marketers are increasingly using messages to pitch their products and services. The flooding of unsolicited commercial messages is called SPAM. FTC CAN SPAM Rule: Controlling the Assault of Non-Solicited Pornography and Marketing Act of Marketing headers may not be misleading, “from” line must accurately identify the sender, must not disguise its origin. Must provide opt-out. Sender has 10 business days to process. Forward SPAM that is phishing for information to and any company impersonated in phishing . Your host provides spam filters. Use “disposable” s such as Google or Yahoo which provide a free service. Next in our internet discussion is Spam Marketers are increasingly using messages to pitch their products and services. The flooding of unsolicited commercial messages is called SPAM. FTC CAN SPAM Rule: Controlling the Assault of Non-Solicited Pornography and Marketing Act of Marketing headers may not be misleading, “from” line must accurately identify the sender, must not disguise its origin. Must provide opt-out. Sender has 10 business days to process. Forward SPAM that is phishing for information to and any company impersonated in phishing . Your host provides spam filters. Use “disposable” s such as Google or Yahoo which provide a free service.

29 Spam - FTC This is a screen shot of OnGuardOnline.gov which gives you good tips on reducing the amount of spam you receive and reporting it.

30 Protect your E-mail Account
To maintain the highest level of account ID and password protection, consider the following: Password Complexity – Utilize special password character requirements and limits to ensure a greater degree of password security. For example: A minimum of: one uppercase or lowercase letter, one numeric, and/or one special character such as: and ?. A minimum length of 8 characters would provide a reasonably strong password. Password Expiration - To further increase the level of security, periodically change your passwords. Consider changing it at least every 180 days. What if someone has hacked into your account? Get your computer scanned and cleaned by a reputable 3rd party such as Geek Squad at Best Buy for spyware/malware. Change the password to – Immediately. Consider the vulnerability of the information accessed. Next we want to make sure we protect our accounts To maintain the highest level of account ID and password protection, consider the following: Password Complexity – Utilize special password character requirements and limits to ensure a greater degree of password security. For example: A minimum of: one uppercase or lowercase letter, one numeric, and/or one special character such as: and ?. A minimum length of 8 characters would provide a reasonably strong password. Password Expiration - To further increase the level of security, periodically change your passwords. Consider changing it at least every 180 days. What if someone has hacked into your account? Get your computer scanned and cleaned by a reputable 3rd party such as Geek Squad at Best Buy for spyware/malware. Change the password to – Immediately. Consider the vulnerability of the information accessed.

31 Consider Online Banking
This service allows customers to conduct financial transactions (such as view account balances, transfer funds, or pay bills) on a secure website operated by their retail bank. The customer typically enters a user identification log-in such as a name or combination of letters and numbers along with a password. Enhanced Multifactor Authentication: Once you have logged-in, you be prompted to enter a phone number where you will receive either a text message, automated voice message, or at initial log-in or when you use a computer that is not recognized by the bank’s system. (IP address to log-in info) To help you keep a closer eye on your finances you may want to consider online banking. This service allows customers to conduct financial transactions (such as view account balances, transfer funds, or pay bills) on a secure website operated by their retail bank. The customer typically enters a user identification log-in such as a name or combination of letters and numbers along with a password. Enhanced Multifactor Authentication: Once you have logged-in, you be prompted to enter a phone number where you will receive either a text message, automated voice message, or at initial log-in or when you use a computer that is not recognized by the bank’s system. (IP address to log-in info)

32 Online Banking Continued
Online banking aids the user in fraud detection as he/she is able to view their account activity on a real time basis and securely pay bills without using the postal service. Online banking aids the user in fraud detection as he/she is able to view their account activity on a real time basis and securely pay bills without using the postal service.

33 Consider Online Banking
Image of our Union First Market Bank Webpage

34 Review of Facebook Privacy Settings
To review your Privacy Settings on Facebook: Select Home then Privacy Settings under the dropdown box. Please remember as you establish or review your settings, how much do you really want someone to know about you and/or of your whereabouts? The more transparent you are, the greater the possibility that you may be at risk. Control your default privacy: Selecting Friends will limit what is shared. To review your Privacy Settings on Facebook: Select Home then Privacy Settings under the dropdown box. Please remember as you establish or review your settings, how much do you really want someone to know about you and/or of your whereabouts? The more transparent you are, the greater the possibility that you may be at risk. Control your default privacy: Selecting Friends will limit viewing of what you post just to your friends.

35 Suggested Facebook Privacy Settings
Image of Facebook page

36 Review of Facebook Privacy Settings
How you connect: Options include friends, friends of friends, and everyone. How tags work: Select from an “On or enable” or “Off or disable” setting. Limit the audience for past posts: Be careful because if you use this tool, the content on your profile you've shared with more than your friends (ex: Public posts) on your Wall will change to Friends. Blocked People and Apps: Limits selected individuals access to your information. Always Remember to Log Out! How you connect: Options include friends, friends of friends, and everyone. How tags work: Select from an “On or enable” or “Off or disable” setting. Limit the audience for past posts: Be careful because if you use this tool, the content on your profile you've shared with more than your friends (ex: Public posts) on your Wall will change to Friends. Blocked People and Apps: Limits selected individuals access to your information. Always Remember to Log Out!

37 Suggested Facebook Privacy Settings
This is a screenshot of the page on Facebook which allows you to edit your settings.

38 Sweepstakes/Counterfeit Cashier’s Check/Advance Fee Fraud
See handout for examples of letter and counterfeit cashier’s check. Recent Scams: #1 All State Financial #2 Reader’s Digest Now we will take a look at a few types of scams that are out there. See handout for examples of letter and counterfeit cashier’s check. Recent Scams: #1 All State Financial #2 Reader’s Digest

39 Lottery/Counterfeit Cashier’s Check/Advance Fee Fraud
See handout for example of letter and counterfeit cashier’s check. Recent Scam: #3 Atlantic Lottery Corporation See handout for example of letter and counterfeit cashier’s check. Recent Scam: #3 Atlantic Lottery Corporation

40 Secret Shopper Scam/Survey
See handout for example of letter and counterfeit cashier’s check. Recent Scam: #4 Consumer Media Agency See handout for example of letter and counterfeit cashier’s check. Recent Scam: #4 Consumer Media Agency

41 Repair Scam’s When you are approached by a so called repair person for a repair of your home, car, or appliance you need to be aware of these con artists. Never agree to a solicitor’s offer unless you check them out first. Are they licensed/bonded? Do they have a business card – call the number? What does their job/repair vehicle look like -- professional or dirty and worn out? Does the tech have credentials? Have you checked BBB? Is the offer in writing? Is there a warranty? Always get another couple of bids to compare. If it is an emergency, you initiate the call. Seek names in advance. Sometimes people will come to your home posing as Repairmen or women. When you are approached by a so called repair person for a repair of your home, car, or appliance you need to be aware of these con artists. Never agree to a solicitor’s offer unless you check them out first. Are they licensed/bonded? Do they have a business card – call the number? What does their job/repair vehicle look like -- professional or dirty and worn out? Does the tech have credentials? Have you checked BBB? Is the offer in writing? Is there a warranty? Always get another couple of bids to compare. If it is an emergency, you initiate the call. Seek names in advance.

42 Mobile Smartphone's Lock down your mobile phone
Use a Password or PIN to protect data that you have stored. Used by only 20%! On an iPhone, set a password Look for the “Location & Security Option” Some smart phone makers offer free security services Remote Phone locating and/or locking Over-the –air back-up Erasing of data Lock down your mobile phone Use a Password or PIN to protect data that you have stored. Used by only 20%! On an iPhone, set a password Look for the “Location & Security Option” Some smart phone makers offer free security services Remote Phone locating and/or locking Over-the –air back-up Erasing of data

43 ATM Security Best Practices
Be aware that someone could rob you at or near an ATM. Have your ATM card ready and fill our forms before arriving at the machine During hours of darkness, have someone come with you to the ATM. Park your car in a well lit area near the ATM. Keep car doors locked and perform transactions quickly when using a drive-up ATM. If you notice suspicious activity, cancel your transaction, take your card, and leave the area. Report suspicious activity and crimes immediately to the police and the bank. Be aware that someone could rob you at or near an ATM. Have your ATM card ready and fill our forms before arriving at the machine During hours of darkness, have someone come with you to the ATM. Park your car in a well lit area near the ATM. Keep car doors locked and perform transactions quickly when using a drive-up ATM. If you notice suspicious activity, cancel your transaction, take your card, and leave the area. Report suspicious activity and crimes immediately to the police and the bank.

44 ATM Security Best Practices
If followed after a transaction, go to the nearest public area. Commit your PIN to memory and do not write the PIN on your card. Keep your ATM card in a secure place. Report a lost or stolen card immediately. If you leave your car to walk to the ATM, lock the car. Quickly put your money and ATM card away. Count your money later. If followed after a transaction, go to the nearest public area. Commit your PIN to memory and do not write the PIN on your card. Keep your ATM card in a secure place. Report a lost or stolen card immediately. If you leave your car to walk to the ATM, lock the car. Quickly put your money and ATM card away. Count your money later.

45 ATM Skimming The equipment used to capture your ATM card number and PIN is cleverly disguised to look like normal ATM equipment. A “skimmer” is mounted to the front of the normal ATM card slot that reads the ATM card number and transmits it to the criminals sitting in a nearby car. The equipment used to capture your ATM card number and PIN is cleverly disguised to look like normal ATM equipment. A “skimmer” is mounted to the front of the normal ATM card slot that reads the ATM card number and transmits it to the criminals sitting in a nearby car.

46 ATM Skimming Once installed the device appears normal. Upon closer inspection however one can see the device has been placed there. Once installed the device appears normal. Upon closer inspection however one can see the device has been placed there.

47 ATM Skimming At the same time, a wireless camera is disguised to look like a leaflet holder and is mounted in a position to view ATM PIN entries. At the same time, a wireless camera is disguised to look like a leaflet holder and is mounted in a position to view ATM PIN entries.

48 ATM Skimming The thieves copy the cards and use the PIN numbers to withdraw thousands from many accounts in a very short time directly from the bank ATM. The thieves copy the cards and use the PIN numbers to withdraw thousands from many accounts in a very short time directly from the bank ATM.

49 ATM Skimming "Shoulder surfers" aren't limited to checkout stands and lines. Near ATMs, some sophisticated thieves will watch the victim use the card (perhaps using high-powered binoculars, or even hidden cameras) and learn the victim's personal identification number (PIN) and even the card number. Later, they'll steal the card or make their own and use ATMs to withdraw cash from your account. Watch for one or more persons loitering around an ATM. "Shoulder surfers" aren't limited to checkout stands and lines. Near ATMs, some sophisticated thieves will watch the victim use the card (perhaps using high-powered binoculars, or even hidden cameras) and learn the victim's personal identification number (PIN) and even the card number. Later, they'll steal the card or make their own and use ATMs to withdraw cash from your account. Watch for one or more persons loitering around an ATM. Keep a close lookout around you for people who might be interested in what you are doing.

50 Counterfeit Currency The Secret Service suggests that you examine:
Portrait. The genuine portrait appears lifelike and stands out distinctly from the background. The counterfeit portrait is usually lifeless and flat. Details merge into the background which is often too dark or mottled. Federal Reserve and Treasury Seals. On a genuine bill, the saw-tooth points of the Federal Reserve and Treasury seals are clear, distinct, and sharp. The counterfeit seals may have uneven, blunt, or broken saw-tooth points. Border. The fine lines in the border of a genuine bill are clear and unbroken. On the counterfeit, the lines in the outer margin and scrollwork may be blurred and indistinct. Learn more at: The Secret Service suggests that you examine: Portrait. The genuine portrait appears lifelike and stands out distinctly from the background. The counterfeit portrait is usually lifeless and flat. Details merge into the background which is often too dark or mottled. Federal Reserve and Treasury Seals. On a genuine bill, the saw-tooth points of the Federal Reserve and Treasury seals are clear, distinct, and sharp. The counterfeit seals may have uneven, blunt, or broken saw-tooth points. Border. The fine lines in the border of a genuine bill are clear and unbroken. On the counterfeit, the lines in the outer margin and scrollwork may be blurred and indistinct.

51 Counterfeit Currency The Secret Service suggests that you examine: Serial Numbers. Genuine serial numbers have a distinctive style and are evenly spaced. The serial numbers are printed in the same ink color as the Treasury Seal. On a counterfeit, the serial numbers may differ in color or shade of ink from the Treasury seal. The numbers may not be uniformly spaced or aligned. Paper. Genuine currency paper has tiny red and blue fibers embedded throughout. Often counterfeiters try to simulate these fibers by printing tiny red and blue lines on their paper. Close inspection reveals, however, that on the counterfeit note the lines are printed on the surface, not embedded in the paper. Learn more at: The Secret Service suggests that you examine: Serial Numbers. Genuine serial numbers have a distinctive style and are evenly spaced. The serial numbers are printed in the same ink color as the Treasury Seal. On a counterfeit, the serial numbers may differ in color or shade of ink from the Treasury seal. The numbers may not be uniformly spaced or aligned. Paper. Genuine currency paper has tiny red and blue fibers embedded throughout. Often counterfeiters try to simulate these fibers by printing tiny red and blue lines on their paper. Close inspection reveals, however, that on the counterfeit note the lines are printed on the surface, not embedded in the paper.

52 Physical Security at Home
Always keep your doors and windows locked – whether or not you are home. Use a wooden dowel for sliding glass doors. Use a bank safe deposit box to secure important documents. Alternatives include a fire proof safe (to secure checkbooks, etc.) or electronic storage for tax papers. Use deadbolt locks on exterior doors for an extra layer of protection. Grades 1 to 3; 1 is the best. Make sure doors and frames are strong. Before opening your door to a stranger or unexpected visitor, ask for identification. If he/she fails to provide it or you are suspicious, do not let the person in your home. Always keep your doors and windows locked – whether or not you are home. Use a wooden dowel for sliding glass doors. Use a bank safe deposit box to secure important documents. Alternatives include a fire proof safe (to secure checkbooks, etc.) or electronic storage for tax papers. Use deadbolt locks on exterior doors for an extra layer of protection. Grades 1 to 3; 1 is the best. Make sure doors and frames are strong. Before opening your door to a stranger or unexpected visitor, ask for identification. If he/she fails to provide it or you are suspicious, do not let the person in your home.

53 Physical Security at Home
When you leave your home at sunset or later, leave a light on. Also consider a timer if you are away for any length of time. If you are away on travel or vacation: Have your mail held at the post office. Have your newspaper stopped. Have a neighbor keep an eye on your property (see if a paper or mail was delivered, trash not picked-up etc.). Consider video surveillance or alarm monitoring for your property. If you see someone suspicious or suspicious activity, do contact the police. When you leave your home at sunset or later, leave a light on. Also consider a timer if you are away for any length of time. If you are away on travel or vacation: Have your mail held at the post office. Have your newspaper stopped. Have a neighbor keep an eye on your property (see if a paper or mail was delivered, trash not picked-up etc.). Consider video surveillance or alarm monitoring for your property. If you see someone suspicious or suspicious activity, do contact the police.

54 Thank you Thank you for coming out and participating today.
My goal was to create awareness, understand the risks, provide some simple solutions and considerations, and perhaps help you keep a few dollars in your pocket. If you would like to learn more or receive a copy of this presentation, please contact Lynn Gordon at Union First Market Bank – Warsaw Branch Thank you for coming out and participating today. My goal was to create awareness, understand the risks, provide some simple solutions and considerations, and perhaps help you keep a few dollars in your pocket. If you would like to learn more or receive a copy of this presentation, please contact Lynn Gordon at Union First Market Bank – Warsaw Branch

55 Questions?


Download ppt "TRIAD Seniors Presentation Frauds and Scams"

Similar presentations


Ads by Google