Safety & Fraud Prevention

How to Avoid Text Fraud 😭

The Federal Communications Commission (FCC) reports sharply rising numbers of text scams in recent years. The FCC notes that scammers are taking advantage of the fact that today’s consumers are more likely to respond to a text than a phone call. Here are some tips they offer to help avoid being duped by a fraudulent text:

Mobile Phone Texts: Spam and Scams | FCC

Cell phone with warning that says Scam!

FinCEN Aims to Reduce Fraud with New Business Reporting Rules in 2024

The Financial Crimes Enforcement Network (FinCEN) published its first set of guidance materials to aid the public, and in particular the small business community, in understanding upcoming beneficial ownership information (BOI) reporting requirements taking effect on January 1, 2024.

The following materials are now available on FinCEN’s beneficial ownership information reporting webpage, www.fincen.gov/boi:

FAQs: https://www.fincen.gov/boi-faqs

Key Filing Dates: https://www.fincen.gov/sites/default/files/shared/BOI_Reporting_Filing_Dates-Published03.24.23_508C.pdf

Key Questions:
https://www.fincen.gov/sites/default/files/shared/BOI_Reporting_Key_Questions_Published_508C.pdf

An Introductory Video: https://youtu.be/nx48tPUbRK0

A More Detailed Informational Video: https://youtu.be/qP5V9k3ypl0

Read the entire news release at https://www.fincen.gov/news/news-releases/fincen-issues-initial-beneficial-ownership-information-reporting-guidance.

Don’t Let Crooks
Kidnap
Your Data.

Ransomware is a type of malware crooks use to infect computers and encrypt files until a ransom is paid. Cybersecurity & Infrastructure Security Agency (CISA.gov) offers helpful tips on how to identify potential ransomware and provides suggestions on ways to protect your data: Protecting Against Ransomware | CISA

Hand shadows over a laptop
Scam tax document ripped in half

File These Tips to Spot & Stop Tax Fraud. 

The IRS estimates that Tax Fraud costs the US $1 trillion a year. Tax Fraud takes many forms, including:

If you suspect possible tax fraud, you can do something about it! The IRS has an online form you can submit to report suspected tax fraud: How Do You Report Suspected Tax Fraud Activity? | Internal Revenue Service

Learn more about how to spot and avoid Tax Fraud at:
Tax Fraud Alerts | Internal Revenue Service
Tax Return Preparer Fraud – Taxpayer Advocate Service

There’s Nothing Sweet About Sweetheart Scams. 

The author of Red Flags of Love Fraud shared 7 tips to help spot a Romance Scam Artist in a recent Reader’s Digest article. The story also includes steps to take if you think you may be a victim of a romance scam: How to Spot Romance Scams in 2022: Signs You’re Dating a Scammer (rd.com)

Heart-shaped candy with words Sweetheart Scams printed
Comedy and Tragedy theater masks

Friendly or Phony? 

ProPublica shares tips to help you avoid ‘friendly’ online chats that are crafted to lure unsuspecting consumers into fraudulent online investment get-rich-schemes.

It’s a scam technique known as ‘Pig Butchering’, in reference to fattening livestock before slaughter:

How Pig Butchering Scams Work | ProPublica

You Better Watch Out for
Holiday Scams. 

The FBI wants shoppers to be on the lookout for holiday scams.

Here are some of their top tips to help you stay safe throughout the season:

Holiday Scams 2022

Santa Claus doing a thumbs down and holding sign that reads Fraud Alert next to Ho Ho Uh-Oh?
Real Deal or Fake Steal - Black Friday shopping bags

Reduce Your Risk of
Shopping Scams. 

Black Friday and Cyber Monday can offer shoppers a deal, but thieves use the opportunity to steal information. The Better Business BureauÂŽ warns of fake survey scams popping up around holiday shopping:

Survey scam gets a holiday twist | BBBÂŽ

Cell Phone Security is
Always a Good Call. 

The Cybersecurity & Infrastructure Security Agency (CISA) has a checklist to help cell phone users reduce exposure to mobile device spam and fraud:

CISA Capacity Enhancement Guide. Mobile Device Cybersecurity Checklist for Consumers 

Cell Phone Spam Risk
Laptop open with ransom note reading want your data back?

It Pays to Protect Yourself from Ransomware.

Think of ransomware as digital ‘kidnapping’ of device files. Criminals install malware that makes your information unusable until you pay a ransom for them to decrypt your data. The National Institute of Standards & Technology (NIST) provides a list of steps you can take now to help keep your information from being ‘snatched’ by cyber thieves.

Learn more at: Tips and Tactics: Ransomware | NIST.gov

Fraud Alert: Smishing
and Vishing.

Bank of Labor wants to inform you of two scams (known as “smishing” and “vishing”) that are on the rise.

Smishing involves fraudsters sending text messages containing a link that look as though they have been sent by the bank. Once the link is selected, fraudsters call pretending to be from the bank (this is known as “vishing”) and ask for online banking credentials (login ID/Password) and the One Time Passcode sent to your phone.

Bank of Labor will never ask you to provide this information through a text, email, or phone call. Be extremely cautious when responding to text messages, emails and phone calls that ask for personal information and/or banking credentials/account numbers.

Learn more at: Threat Advisory: Online Banking Advanced Social Engineering | SBS Cybersecurity

Cell phone with exclamation alert
Bank on Better Account Security. Umbrella protecting person from wrecking ball that say Account Fraud.

Customer Account Security.

Banks go to great lengths to ensure the security of customer accounts but there are measures customers themselves can also take to further reduce risk of any account fraud. Here are 5 tips from AARPÂŽ to help improve your account security: How to Prevent Bank Fraud and Secure Your Bank Account (aarp.org)

Brush up on School Safety Tips.

SchoolSafety.gov is a government program created to provide guidance and resources to help keep school communities safe. The website includes information on how schools and families can prevent, mitigate, respond to, and recover from a range of school safety threats, hazards, and emergency situations.

Learn more at: Find School Safety Resources | SchoolSafety.gov

Girl holding school books above head. Graphic reads Do your School Safety Homework
Outsmart Elder Fraud - Smart Elderly Man

Tips to Avoid Scams Targeting the Elderly.

Financial predators often zero-in on older adults. But Consumer Financial Protection Bureau’s free “Money Smart for Older Adults” can help older adults, family caregivers and others outsmart and fight back against financial exploitation.

Protecting Older Adults from Fraud and Financial Exploitation | Consumer Financial Protection Bureau (consumerfinance.gov)

AARP also offers tips on how to recognize and report elder abuse fraud:
Protecting Yourself Against Consumer Fraud | AARP

Slam Email Scams.

The federal agency CISA (Cybersecurity & Infrastructure Security Agency) offers tips to help rescue you from email scams plus seven steps you can follow to zap other villainous email fraud attempts you may encounter down the road.

Recognizing and Avoiding Email Scams (cisa.gov)

Slam Email Scams Pop Art
FBI-Internet-Crime-Complaint-Commission-2021-Chart-Data

FBI Releases 2021 Internet Crime Report

In the past year, there’s been a 7% increase in internet crime with close to 6.9 billion in reported losses, according to the FBI’s recently released 2021 Internet Crime Report The top three cyber crimes reported by victims in 2021 were phishing scams, non-payment/non-delivery scams, and personal data breach. Victims lost the most money to business email compromise scams, investment fraud, and romance and confidence schemes. To report an online crime or view IC3’s annual reports and public service announcements, visit ic3.gov.

Disconnect From Phone Scams

Scissors cutting phone cord

Ready to pull the plug on phone scammers? The Federal Trade Commission offers tips to help you recognize phone fraud and steps you can take to disconnect yourself from future phone fraudsters:

Phone Scams | FTC Consumer Information

The IRS “Dirty Dozen”

The IRS Dirty Dozen with donuts spread on table

Every year, the IRS compiles the “Dirty Dozen” – the top 12 scams that taxpayers may encounter during peak filing season. Learn how to spot and avoid tax scams:

Link to IRS YouTube Video:Dirty Dozen Video

Link to IRS.gov:
Dirty Dozen Webpage

Phone Scams | FTC Consumer Information

 

Cupid or Con Artist?

Woman with hearts swirling around her next to phone with burglar holding flowers

Romance scams have been going on for centuries but online and mobile technology have helped spur a record number of cases in recent years. Scam artists create a fake online identity to gain a victim’s affection and trust. Then Rotten Romeos (and Lawless Lolitas) use the illusion of a romantic or close relationship to manipulate and/or steal from the victim.

The FBI offers tips on how to spot and steer clear of romance scams:  Romance Scams | FBI

Additional Resources:

It’s Not True Love If They Ask For Money | FTC Consumer Information

The Lies Romance Scammers Tell | FTC Consumer Information

Staying Safe on Social Networking Sites | CISA

Your Bank Helps Keep You Covered.

Lock symbol floating in cloud

Today’s banks use a mix of good customer service, federal regulations and high-tech tools to help reduce fraud and safety risks.

These days, algorithms, artificial intelligence authentication and biometric security measures are just a few of the tech tools banks across the country are using to help protect millions of dollars from con artists.

In addition, Patriot Act legislation and ongoing communications like scam alerts and notices reminding clients to stay in touch if they notice unusual account activity also help reduce fraudulent activity.

To learn more visit: How Banks Are Working to Protect You From Fraud | Banking Advice | US News

Don’t let your cloud storage security float away.

Lock symbol floating in cloud

WiredÂŽ Magazine offers 9 tips for keeping your cloud storage safe & secure:

  1. Use Strong Passwords and Two-Factor Authentication Activate two-factor authentication (2FA) and choose long and unique passwords that are difficult to guess, use a password manager and be wary of any attempts to get you to part with them (in an unexpected email, for example).
  2. Audit Your File and Folder Shares Be careful who you share files and folders with, and add passwords and expiry dates to your shares, if these features are available, and run a regular audit of all the shares that are currently active on your account.
  3. Clear Out Your ‘Deleted’ Files While many cloud storage services run a recycle bin of sorts, keeping deleted files around for a few days or weeks just in case you want them back, you might want to make sure certain sensitive files are completely obliterated and no longer able to be recovered.
  4. Check Your Connected Apps and Accounts Even if hackers can’t get into your accounts through the front door, they might try and gain access through a side window—in other words, through another account that’s connected to your cloud storage. Make sure you’re regularly checking which third-party applications have access to your cloud storage and remove any that you’re not actively using (you can always add them again if you need to).
  5. Turn on Account Alerts Most cloud storage services will be able to send you alerts about significant account events, such as new sign-ins, and it’s important to make sure these are switched on. You might also be able to subscribe to alerts about activity inside your accounts, such as new shares that have been created, or files and folders that have been removed.
  6. Deactivate Old Devices That Still Have Access Most cloud storage services let you sync files from multiple devices, so if you upgrade your phone or switch jobs and use a new laptop, it’s important that you properly disconnect and deactivate the old ones
  7. Enable Account Recovery Options Your cloud storage account is only as secure as the weakest link attached to it, which means you need to keep the account recovery options as well protected as your login credentials.
  8. Sign Out When You’re Not Using Your Accounts It’s important that you sign out to stop anyone else gaining access to your files—especially if you’re on a computer that’s shared with other people (such as the rest of your household).
  9. Protect Your Devices, Too Physical security is important too. Keep the phones, laptops, and other devices where you use your cloud storage accounts guarded against unauthorized access.
For more information visit: 9 Tips to Keep Your Cloud Storage Safe and Secure | WIREDÂŽ

‘Tis The Season to Watch Out for Swindlers!

Gloved hand reaching for wrapped gift boxes

Don’t let swindlers snatch away your holiday joy. AARP® shares 4 common holiday season scams to watch for:

  • Charity scams: Network for Good, a leading charitable fundraising organization, reports that 1/3 of all charitable giving is done in December. Scammers set up sham charities to exploit the ‘season of giving’ via fake websites and pushy telemarketers so be sure to use caution when you receive donation requests.
  • Delivery scams: As holiday packages crisscross the country, scammers send out phishing emails disguised as UPS, FedEx or U.S. Postal Service notifications of incoming or missed deliveries. Links lead to phony sign-in pages asking for personal information, or to sites infested with malware.
  • Travel scams: According to a recent survey, 27% of Americans plan to travel during the holidays in 2021. Spoof booking sites and incredible email offers proliferate. When travel deals look too good to be true, they probably are.
  • Letter from Santa scams: A custom letter from jolly old St. Nick makes a holiday treat for the little ones on your list, and many legitimate businesses offer them. But so do many scammers looking to scavenge personal information about you or, worse, your kids or grandkids, who may not learn until many years later that their identity was stolen and their credit compromised.
For more information visit: How to Protect Yourself From Holiday Scams (aarp.org)

Score a Secure Credit Report

Meter Dial with caption Avoid Credit Report Scams. Meter Dial says Very High, High, Low and Very Low with arrow point to Very Low

Here are some Better Business Bureau recommendations published in USA Today that can help you avoid getting caught up in ‘Free Credit Score’ phishing scams:

  1. Always check the domain name. Government agencies usually communicate through the mail, not text or email. (One common scam involves a fake email claiming to be from the Internal Revenue Service and requesting information.)
  2. Use the official free credit report website, AnnualCreditReport.com. The only free credit report service BBB recommends is https://www.annualcreditreport.com/. The government requires that consumers have access to their credit report once every 12 months from each of the three credit bureaus: Equifax, Experian and TransUnion.
  3. Avoid links and attachments. If you receive any unsolicited attachments or links, the BBB recommends avoiding them. If you want to log into your bank, for example, type in the url directly on your browser instead of clicking on any embedded hyperlink, which could take you to an impostor site.
  4. Don’t provide your credit card. If a credit score site does require your credit card information before sharing your credit score, it could be a sign that it plans to charge you or enroll you in a monthly service.
  5. Skip sites that are not secure. The BBB also recommends never entering your personal information, including your Social Security number, address or banking information, on websites that are unfamiliar or non-secure. The url should include “https” in it. If you are ever suspicious , turn to a more traditional mode of communication – the telephone – to check on it. But don’t call the numbers included in emails, which could be fake.
  6. Password-protect your phone. Your phone probably contains a lot of personal data, which is why you should password-protect it, just in case you lose it. You wouldn’t want a stranger having access to all your emails and accounts.
You can report suspected scams at: Report Scams and Frauds | USAGov and BBB Scam Tracker℠ | Find and Report a Scam | Better Business Bureau

Download these mobile device security tips.

Hand holding mobile phone with various security symbols

The Cybersecurity & Infrastructure Security Agency (CISA) has some helpful guidance on how to improve mobile device and app security and reduce exposure to fraud: Privacy and Mobile Device Apps | CISA

What are the risks associated with mobile device apps? Applications (apps) on your smartphone or other mobile devices can be convenient tools to access the news, get directions, pick up a ride share, or play games. But these tools can also put your privacy at risk. When you download an app, it may ask for permission to access personal information—such as email contacts, calendar inputs, call logs, and location data—from your device. Apps may gather this information for legitimate purposes—for example, a ride-share app will need your location data in order to pick you up. However, you should be aware that app developers will have access to this information and may share it with third parties, such as companies who develop targeted ads based on your location and interests. How can you avoid malicious apps and limit the information apps collect about you?

Before installing an app

  • Avoid potentially harmful apps (PHAs). Reduce the risk of downloading PHAs by limiting your download sources to official app stores, such as your device’s manufacturer or operating system app store. Do not download from unknown sources or install untrusted enterprise certificates. Additionally—because malicious apps have been known to slip through the security of even reputable app stores—always read the reviews and research the developer before downloading and installing an app.
  • Be savvy with your apps. Before downloading an app, make sure you understand what information the app will access. Read the permissions the app is requesting and determine whether the data it is asking to access is related to the purpose of the app. Read the app’s privacy policy to see if, or how, your data will be shared. Consider foregoing the app if the policy is vague regarding with whom it shares your data or if the permissions request seems excessive.

On already installed apps

  • Review app permissions. Review the permissions each app has. Ensure your installed apps only have access to the information they need, and remove unnecessary permissions from each app. Consider removing apps with excessive permissions. Pay special attention to apps that have access to your contact list, camera, storage, location, and microphone.
  • Limit location permissions. Some apps have access to the mobile device’s location services and thus have access to the user’s approximate physical location. For apps that require access to location data to function, consider limiting this access to when the app is in use only.
  • Keep app software up to date. Apps with out-of-date software may be at risk of exploitation of known vulnerabilities. Protect your mobile device from malware by installing app updates as they are released.
  • Delete apps you do not need. To avoid unnecessary data collection, uninstall apps you no longer use.
  • Be cautious with signing into apps with social network accounts. Some apps are integrated with social network sites—in these cases, the app can collect information from your social network account and vice versa. Ensure you are comfortable with this type of information sharing before you sign into an app via your social network account. Alternatively, use your email address and a unique password to sign in.

What additional steps can you take to secure data on your mobile devices?

  • Limit activities on public Wi-Fi networks. Public Wi-Fi networks at places such as airports and coffee shops present an opportunity for attackers to intercept sensitive information. When using a public or unsecured wireless connection, avoid using apps and websites that require personal information, e.g., a username and password. Additionally, turn off the Bluetooth setting on your devices when not in use. (See Cybersecurity for Electronic Devices.)
  • Be cautious when charging. Avoid connecting your smartphone to any computer or charging station that you do not control, such as a charging station at an airport terminal or a shared computer at a library. Connecting a mobile device to a computer using a USB cable can allow software running on that computer to interact with the phone in ways you may not anticipate. For example, a malicious computer could gain access to your sensitive data or install new software. (See Holiday Traveling with Personal Internet-Enabled Devices.)
  • Protect your device from theft. Having physical access to a device makes it easier for an attacker to extract or corrupt information. Do not leave your device unattended in public or in easily accessible areas.
  • Protect your data if your device is stolen. Ensure your device requires a password or biometric identifier to access it, so if is stolen, thieves will have limited access to its data. (See Choosing and Protecting Passwords.) If your device is stolen, immediately contact your service provider to protect your data. (See the Federal Communications Commission’s Consumer Guide: Protect Your Smart Device.)

Don’t Let a Scam Artist Do a (PIN) Number on You.

Man at ATM covering buttons while typing in PIN

Here are tips to prevent Personal Identification Number Scams.

Taking a few simple steps can help keep scam artists from using your ATM, phone or other login PINs (Personal Identification Numbers) and accessing your money or other personal information. Remember to NEVER write a PIN down where others may see it (on the card, on a paper kept in your wallet, or on a paper in general) and try to make the numbers easy for you to remember and difficult for others to guess. Avoid variations on your (or a family member’s) birthdate, sequential numbers, any part of your social security number, address, or phone number. Other tips include:

  • Stand between the ATM keypad and the person around you so that they don’t see you in-putting your PIN.
  • Guard your PIN as you enter it in the machine.
  • If the ATM does not appear to be working correctly, contact bank staff. Don’t let a stranger assist you.
  • Do not give your ATM PIN to someone else to run a quick errand for you. You give out your ATM PIN, you’ve just given access to your bank account.
  • Do not leave your ATM card unattended.
  • Use an ATM with adequate lighting.
  • Never give out your PIN over the phone.
  • Use the Word Method for PIN selection. Convert the digits of a word to the keys on the telephone. For example, if your word is DOGS, the equivalent from the keypad on your phone would be 3647.
  • As soon as you’ve completed a Drive-Thru ATM transaction, get your receipt, roll up your windows and pull away from the machine. Do not sit in the area counting money or using your cell phone.

Report Identity Theft to the Federal Trade Commission (FTC) online at IdentityTheft.gov or by phone at 1-877-438-4338

Tips to Prevent ID Theft

Magnifying glass showing thumbprint with word Identity Theft

IDENTITY THEFT happens when someone uses your personal information (name, Social Security number, credit card number, etc.) without your permission to commit fraud or other crimes. This is a serious crime that can have devastating consequences as some victims must spend hundreds of dollars and many hours repairing their good name and credit record.

Bank of Labor will do whatever it takes to keep your online identity safe.  The following are some helpful tips that will assist you in preventing identity theft. Tips to Prevent Identity Theft

Beware of Phishing

Phishing is a scam where online criminals try to lure personal information such as credit card numbers or bank account information from unsuspecting victims. Be aware of spoofed email or websites that look like they come from your bank or another trusted source in an attempt to deceive you.

If you contact us we may verify your information to confirm your identity but we will never contact you and ask for your debit/credit card number. If we need to contact you, it will always be done in a manner that protects your personal, confidential information and we will clearly identify ourselves.  If you are unsure, contact us directly using our contact information on your card, statement or our website.

Protect Yourself Online

  • Install anti-malware software including virus and spyware protection and be sure to keep it up to date.
  • Ensure your mobile device and computer are updated with the latest software patches for your installed programs and Operating System.
  • Be sure and use a firewall when browsing. Firewalls help prevent unauthorized internet users from accessing private networks.
  • Never click on links in unsolicited emails.
  • Don’t surf to pages you are unsure of.

Check Your Credit Report

Make a habit of checking your credit report. You can get a free copy of your credit report from the big three reporting agencies each year. Visit www.annualcreditreport.com to learn more.

Practice ATM Safety

As with all financial transactions, please exercise discretion when using an automated teller machine (ATM) or night deposit facility. For your own safety, be careful. The following suggestions may be helpful.

  • Prepare for your transactions in advance (for instance, by filling out a deposit slip) to minimize your time at the ATM or night deposit facility.
  • Mark each transaction in your account record, but not while at the ATM or night deposit facility. Always save your ATM receipts. Don’t leave them at the ATM or night deposit facility because they may contain important account information.
  • Compare your records with the account statements you receive.
  • Don’t lend your ATM card to anyone.
  • Remember; do not leave your card at the ATM. Do not leave any documents at a night deposit facility.
  • Protect the secrecy of your Personal Identification Number (PIN). Protect your ATM card as though it were cash. Don’t tell anyone your PIN. Don’t give anyone information regarding your ATM card or PIN over the telephone. Never enter your PIN in any ATM that does not look genuine, has been modified, has a suspicious device attached, or is operating in a suspicious manner. Don’t write your PIN where it can be discovered. For example, don’t keep a note of your PIN in your wallet or purse.
  • Prevent others from seeing you enter your PIN by using your body to shield their view.
  •  If you lose your ATM card or if it is stolen, promptly notify us. You should consult the other disclosures you have received about electronic fund transfers for additional information about what to do if your card is lost or stolen.
  • When you make a transaction, be aware of your surroundings. Look out for suspicious activity near the ATM or night deposit facility, particularly if it is after sunset. At night, be sure to use a facility (including the parking area and walkways) that is well lit. Consider having someone accompany you when you use the facility, especially after sunset. If you observe any problem, go to another ATM or night deposit facility.
  • Don’t accept assistance from anyone you don’t know when using an ATM or night deposit facility.
  • If you notice anything suspicious or if any other problem arises after you have begun an ATM transaction, you may want to cancel the transaction, pocket your card and leave. You might consider using another ATM or coming back later.
  • Don’t display your cash; pocket it as soon as the ATM transaction is completed and count the cash later when you are in the safety of your own car, home or other secure surrounding.
  • At a drive-up facility, make sure all the car doors are locked and all of the windows are rolled up, except the driver’s window. Keep the engine running and remain alert to your surroundings.
  • We want the ATM and night deposit facility to be safe and convenient for you. Therefore, please tell us if you know of any problem with a facility. For instance, let us know if a light is not working or there is any damage to a facility. Please report any suspicious activity or crimes to both the operator of the facility and the local law enforcement officials immediately.

Call (913) 321-4242 if you notice suspicious account activity or experience customer information security-related events.

NOTE: You can find additional ID Safety Tips from the American Bankers Association

DATA PRIVACY

For tips to protect your data privacy, visit: Protecting Your Privacy | CISA

Contact Us

Need to reach us? Please contact us at the number below and our team will gladly assist you. If you would like to open an account or speak to a personal banker visit us at any of our locations located in the Greater Kansas City Metro Area.

Telephone

+1 913 321 4242

Address

(Interim Location)
8325 Lenexa Dr Suite 300,
Lenexa, KS 66214Â