a gentleman holding his head because he was scammed

Don't get Scammed


Protecting yourself starts with being Cyber Security smart.

Below are some ways and simple steps everyone can take to help prevent online fraudulent activity. 
  • Do not open email from people you don’t know.
If you are unsure whether an email you received is legitimate, try contacting the sender directly via other means. Do not click on any links in an email unless you are sure it is safe.

  • Be careful with links and new website addresses.
Malicious website addresses may appear almost identical to legitimate sites. Scammers often use a slight variation in spelling or logo to lure you. Malicious links can also come from friends whose email has unknowingly been compromised, so be careful.

  • Secure your personal information.
Before providing any personal information, such as your date of birth, Social Security number, account numbers, and passwords, be sure the website is secure.

  • Stay informed on the latest cyber threats.
Keep yourself up to date on current scams. The Cybersecurity and Infrastructure Security Agency (CISA) can provide you with Alerts.

  • Use Strong Passwords.
Strong passwords are critical to online security.
Keep your software up to date and maintain preventative software programs. Keep all of your software applications up to date on your computers and mobile devices. Install software that provides antivirus, firewall, and email filter services.

  • Update the operating systems on your electronic devices.
Make sure your operating systems (OSs) and applications are up to date on all of your electronic devices. Older and unpatched versions of OSs and software are the target of many hacks.
Simple Tips
• Use a long passphrase. According to National Institute of Standards and Technology (NIST) guidance, you should consider using the longest password or passphrase permissible. For example, you can use a passphrase such as a news headline or even the title of the last book you read. Then add in some punctuation and capitalization.

• Don’t make passwords easy to guess. Do not include personal information in your password such as your name or pets’ names. This information is often easy to find on social media, making it easier for cybercriminals to hack your accounts.

• Avoid using common words. Substitute letters with numbers and punctuation marks or symbols. For example, @ can replace the letter “A” and an exclamation point (!) can replace the letters “I” or “L.”

• Get creative. Use phonetic replacements, such as “PH” instead of “F”. Or make deliberate, but obvious misspellings, such as “enjin” instead of “engine.”

• Keep your passwords on the down-low. Don’t tell anyone your passwords and watch for attackers trying to trick you into revealing your passwords through email or calls. Every time you share or reuse a password, it chips away at your security by opening more ways with which it could be misused or stolen.

• Unique account, unique password. Having different passwords for various accounts helps prevent cyber criminals from gaining access to these accounts and protect you in the event of a breach. It’s important to mix things up—find easy-to remember ways to customize your standard password for different sites.

• Double your login protection. Use multi-factor authentication (MFA) to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. Enable MFA by using a trusted mobile device, such as your smartphone, an authenticator app, or a secure token—a small physical device that can hook onto your key ring. Read the Multi-Factor Authentication How-to-Guide for more information.

• Utilize a password manager to remember passwords. The most secure way to store all your unique passwords is by using a password manager. With just one password, a computer can create and save passwords for every account that you have – protecting your online information, including credit card numbers and their three-digit codes, answers to security questions, and more.

Money Mules
Scammers use people as “money mules” to receive or move money obtained from victims of fraudulent activities. Scammers proactively recruit people to be part of fraudulent activity without their knowing it. If a stranger asks you to open a bank account, or asks for access to your bank account or debit card, be extremely guarded. A scammer may ask you to move money and direct you to deposit funds into your bank account, or ask you to purchase virtual currency or gift cards for someone else’s benefit. In these scenarios, you may be unknowingly hiding someone else’s money for them. Be very cautious if a stranger asks you to receive or forward packages containing money or goods, which may also be part of a similar fraudulent scheme.
If you believe you have engaged in, or contributed to, money mule activities, stop transferring money or merchandise, and stop communicating with the person giving you direction. Then, immediately report your concern to your bank. Your banker can assist you with the appropriate steps toward protecting your bank account and money. You should also report the suspected activity to law enforcement.

Online Dating
Romance scammers, as they are often called, create fake profiles and try to develop relationships with their targeted victims through online dating apps or social networking websites. Once the relationship develops and they have earned your trust, the scammer makes up a story and asks for your money. Be aware that scammers are lurking in these areas, so you can keep yourself and your money safe. 

Impostors
Impostor scams are when a scammer pretends to be someone you know or trust to convince you to send them money. They may even claim they are with the FDIC or another government agency. These scams are communicated through emails, phone calls, letters, text messages, faxes, and social media. The messages might ask you to “confirm” or “update” confidential personal financial information, such as bank account numbers. In other cases, the communication might be an offer to help victims of current or previous frauds with an investigation or to recover losses. Some scams request that you file official looking forms, such as insurance claims, or pay taxes on prize winnings. They might claim that you have an unpaid debt and threaten you with a lawsuit or arrest if you don’t pay. Other recent examples include check endorsements, bankruptcy claimant verification forms, stock confirmations, and investment purchases.
The FDIC or other government agencies do not send unsolicited correspondence asking for money or sensitive personal information, and we will never threaten you, or demand that you pay by gift card, wiring money, or digital currency. FDIC Consumer News: Scammers Pretending to be the FDIC has more information on impostor scams.

Mortgage and Foreclosure Scams
Watch out for scammers who falsely claim to be lenders, loan servicers, financial counselors, or representatives of government agencies who can help with your mortgage. These criminals prey on vulnerable, desperate homeowners.
Foreclosure scams usually come from multiple advertisements stating that a company wants to save you from foreclosure. This scam allows fraudsters to take the equity out of your home. They may even try to evict you from your home and sell it. 
  • Place a fraud alert on your credit report.
  • Close out accounts that have been tampered with or opened fraudulently.
  • Report the identity theft to the Federal Trade Commission.
  • File a report with your local police department.
This checklist will help victims of identity theft navigate the recovery process.





man holding card labeled credit score

Check your credit.

You have the right to request one free copy of your credit report each year from each of the three major consumer reporting companies (Equifax, Experian and TransUnion) by visiting