Beware of Tech Support Scams

How to spot a tech support scam

Tech support scams are growing at a rapid pace.  It seems you’re always putting yourself out on a limb when you call tech support. You dial the number the company gives you, and perhaps after a while of waiting, you’re connected to someone who may be working on the other side of the world in a completely different time zone. Then you’re asked to give this anonymous person identifying details about your phone or computer and the technical problems you’re experiencing.

Of course, you’re fairly certain the speaker works for your device’s company and you believe it’s perfectly safe to share this information. At the very least, they have contracted with this individual and are tracking their service.

All of that gets a little riskier when you’re asked to allow the tech support agent to have remote access to your device. This step is sometimes necessary to fix the glitch, but it can also be unnerving. Suddenly, it’s as if an invisible person has taken over your screen. Letters you haven’t typed are showing up on the display and the cursor is flying all over the screen, even though you haven’t touched the mouse.

You’re essentially letting someone have free access to a device that houses some of your most personal information. Yikes!

And that’s exactly what tech support scam artists are looking for with their nefarious hacks. It’s truly as awful as it sounds: In these scams, fraudsters contact victims and trick them into granting the scammer access to their computers. The crooks may reach out to people through a phone call, insisting the victims have a virus or another problem they’ve somehow detected from the company’s headquarters. Alternatively, they’ll send a popup to the victim’s computer which will flash dire warnings about an impending or existing virus that can be “fixed” by clicking on a link.

There are several outcomes of such tech support scams, none of them good. Sometimes, a scammer will trick you into installing malware on your computer, claiming you have to click on a link in order to heal your computer of its ills. Other times, they might sell you expensive “software” by making the same false claims. Still other times, they’ll direct you to a bogus tech support website where you’ll be asked to input your credit card information. And they’ll oftentimes simply help themselves to the sensitive data they find on your computer and then wreak havoc on your financial life.

Federal Trade Commission (FTC) Scams

Tech support scams are nothing new, but a recent wave of these scams has taken on an ironic twist. The very organization that leads the battle in taking down scammers is being exploited for a particularly heinous hack.

Scammers posing as FTC employees are calling victims, asking for remote access to their computers. They assure victims they can help restore any affected devices to their previous working conditions. Many of them are claiming to represent the FTC’s Advanced Tech Support Refund program.

This program was created to help victims of previous scams collect their refund money from the FTC. The scammers will convince the victims that they are moments away from seeing their money – they just need to provide the alleged FTC employee with remote access to their computer. They may also ask for an upfront payment before the refund can be issued or for checking account information, claiming it’s necessary for the refund to clear.

Of course, none of this is true and the caller has never worked for the FTC. In fact, the FTC will never request remote access to your device or ask you to pay to receive a refund. Also, their refunds are sent in check form via snail mail, and do not require any checking account information at all.

The FTC has alerted the public that the only genuine number to call for information about the Advanced Tech Support Refund program is 877-793-0908. If someone calls you on their own, assume it’s a scam. End the call immediately and report the incident to the FTC.  Check here for more info on the types of tech scams out there.

Recognizing Tech Support Scams

As mentioned, the wave of tech support scams in which fraudsters impersonate the FTC are easy to spot if you know this basic information about the FTC: They will never request remote access to your computer, ask for payment in exchange for a refund, or reach out to you on the phone.

Here’s how to prevent other variations of tech support scams:

  • Never click on a pop-up box that claims your computer has a virus and offers to clean it. This will only infect your computer or grant a scammer remote access to your device.
  • Always call tech support on your own; if they call you, especially if you’re not aware of any problem with your computer, hang up as quickly as you can.
  • Never agree to purchase expensive software online to fix an alleged virus.

Feel free to share this helpful infographic and article with family and friends.

How to spot tech support scams
How to Spot Tech Support Scams

If you think you’ve been scammed, tell everyone you know about it and be sure to alert the FTC.  It’s also a good idea to give us a call or stop by so we can take a look at your account and make sure it’s still secure.  Regularly changing passwords to email and other important personal accounts is always a good idea.  

Let’s do our part to put those crooks out of business for good!

Your Turn: Have you ever been targeted by a tech support scam? Share your experience with us in the comments!  You never know who you might help…

What’s your money persona?

what is your money persona

Personality.  It’s what makes us all a bit different.  Sometimes we relate to someone a little better than another based on how eccentric, laid back or direct they are.

Have you thought about how you’re treating your financial relationships?  Are you taking care of your nest egg, so to speak?  Believe it or not, the way you spend cash says a lot about your personality–well, your money persona, anyway.

So, in between all those really important quizzes we take online to determine who our BFF is or what song best represents our lives, why not take one to help determine whether your money-spending (or hoarding) choices are something to be worked on or shared with the world.

With the help of her friend, Lucy, Jen learned a little about her own money persona.  Watch the video, then take the quiz below.


(Pssst…you may want to grab a pen and scratch paper for this one.)

12_B_Infographic_MembersFirst

So, how did you do?  Were you surprised to learn what your money persona is?  Maybe you fell in multiple categories.  Whatever the case may be for you, you can rest easy knowing there are tons of solutions to help you save, invest, make smarter choices with and even spend your money smarter.  You might try checking out our affordable and convenient savings solutions.

We want to hear from you.  Drop us a comment below and let us know how you did.

 

Brainy Browsing and Purchasing Tactics

user entering credit card on tablet

It seems every time you turn around there’s another item you need—and you needed it, like, yesterday.  A replacement water filter for the fridge, new carpet, an extra garage door opener…

So, what do you do?  If you can’t visit your favorite retail shop, you’ll probably go to your second best option — online shopping.

Whether on your mobile device or a computer, you may have a few of your favorite online shops bookmarked.  Online retail giants like Amazon.com, eBay.com and Zappos.com continually update their safe-purchase policies, but have you checked the security settings of other websites lately?  Are you sure your purchases and personal info is still protected?

There’s plenty you can do to protect your info whether you’re online or out and about.

Spam filters are there for a reason.  Don’t disable (or forget to activate) the spam filter settings on your browser and in email programs.  Though you may not receive notifications each time a suspicious email or a website pop-up is blocked, rest assured the spam filter is doing its job.  If you’re worried it may redirect a legitimate email to the wrong location, just check your spam or ‘junk’ email folder every so often.

Don’t ignore update notifications.  Keep firewall and anti-virus programs up-to-date.  As new malware seems to pop up daily, your computer and mobile device support systems work constantly to keep your content protected by creating new protection policies and pushing them through to you via updates.

Be a skeptic.  If an email or link on a website seems too good to be true, it probably is.  Fraudsters work hard to reach you in various ways.  Don’t assume the email you just received from Aunt Rhonda bragging about the gigantic sum of money she won is legit.  Her email could have been hacked.  Look for phrases that don’t quite make sense, hover over links in emails to see where they point and be leery of shortened URLs that don’t give you clues as to where the link is taking you.

Keep your cards in sight.  Card readers, also known as skimmers, can be present anywhere.  Skimmers retain information when someone runs your card through a smaller machine under a counter or concealed in clothing.  These card readers can even fit over the top of a legitimate card reader at an ATM.  The stolen information can be copied onto another card for use by someone else.  Keeping an eye on your cards at all times and being on the lookout for fake readers can reduce the risk of your information being stolen.

Trust your instincts.  When in doubt, make a purchase from another location or website.  Doing so can save you a lot of time and financial hassle later on.

If you think your personal information has been used by someone other than you or if your cards have been compromised, be sure to alert your financial institution immediately.  The sooner you take back control of your finances, the easier it will be to clean up the mess another may have created for you when unjustly using your information.

If your credit and debit card company don’t come equipped with services like fraud prevention and account monitoring, consider switching to a financial institution like MembersFirst–we take every threat very seriously and will work with you to identify where the information leaks might be.  Don’t put a bandage on the issue; get to the root of the issue by protecting your info as much as you can.

Keeping Identity Thieves at Bay

keeping thieves at bay

When more than just you is concerned with your money.

Remember our post about safe mobile browsing and shopping?  We hope you had a moment to read it and consider the dangers of using a mobile device without following safe web-browsing practices.

But, what about when you’re not coffee shop bound, sipping a latte and checking out the latest technology steals and deals?  Maybe you’re sitting at work or with friends catching the latest Hunger Games installment.  Your cell is likely tucked away in your pocket or purse.  Think your money and personal info are safe?  You may want to think again.  There could be others digging for your personal information and you may not even realize it.

Identity Theft — You’ve heard the term, but do you really know just how easy it could be for someone to steal your identity? Mistakes like using the same password for multiple logins, not shielding your credit card numbers and pins from Nosy Ninas and oversharing on social media are just a few ways you’re putting yourself at risk for financial woes.

In this second installment of Fun Financial Ed, Jen learns just what she’s doing right (and wrong) to protect her identity.  Check it out.

Can’t access the video?  No problem.  Check out the info below.

Looking to make the switch to a Credit Union that understands the unique needs of its members?  Join today and discover what over 24,000 others already have!  We’ll make the process simple and convenient.

join today button
Make the switch to simplify your life and your finances today!

03_B_Infographic_MembersFirst

5 Identity Theft Jackpots (and How You Can Safeguard Against Them)

Identity theft is nothing new, and yet it still manages to cost its victims billions of dollars (yes, that’s billions with a “b”) globally each year—not to mention the time and hassle involved in recovering a stolen identity.

The good news is that there are tons of things you can do to deter identity thieves. The bad news is that many of us do little beyond choosing a decent password—and some people don’t even bother doing that! Here are the top 5 information jackpots for identity thieves, along with helpful tips on what you can do right now to protect yourself.

  1. Your Trash Can

Even if you’re really careful about the information you put online, your trash bags and recycling bin can still be an easy target for identity thieves. Dumpster diving may sound old school, but it’s still an easy way for identity thieves to get access to your personal information.

Get a shredder (a basic model will run you $20 to $30 at a big-box store) and use it!

Get into the habit of shredding things before throwing them out, especially things like bank statements, expired credit cards, utility bills, cellphone bills, paycheck stubs, old boarding passes and travel itineraries, and ATM receipts.

Don’t forget to check your envelopes! Anything with your name and address on it needs to be shredded, too.

  1. Your Phone

Odds are that you’re carrying a lot more in your phone than just your contact list. With smartphone theft on the rise, protect yourself:

Have a password-protected lock on your home screen. This is a standard feature on all smartphones for a reason, so take advantage of it! Bonus points if your smartphone also has location tracking (also known as the “find my phone” feature).

Public Wi-Fi networks are not secure, so avoid checking your bank accounts or doing your online shopping from the local coffee shop or during your layover at the airport.

Do not store sensitive information on your phone—storing passwords or login information in a note-taking app is bad news.

  1. The PIN Pad

It seems like every few months a new point-of-purchase scheme emerges—skimming devices, keystroke loggers, ATM hacking… the list goes on! Here are some good practices for when you’re out and about:

When making a purchase, keep your debit or credit card in sight at all times.

Use your hand to block the buttons when entering your PIN number, even if there’s no one immediately behind you—a camera can always be watching.

Choose a good PIN. Avoid PINs derived from your personal information, like your telephone number, address or birthday. Avoid an easy-to-guess PIN, like the dreaded “1234.”

Change up your PIN, especially if you use the same combination for your debit card and for unlocking your cellphone.

  1. Your Mailbox

Like the trash-picker approach mentioned above, mail tampering is a low-tech but relatively easy way for identity thieves to compromise your personal information. Here’s what you can do:

Familiarize yourself with your billing cycles. A late credit card statement or a bill that never shows up could be a sign of mail tampering.

Identity thieves will sometimes request a change of address to illegally reroute your mail to a different location. If you suddenly stop receiving mail, check with the post office to make sure this isn’t the case.

Use a mailbox with a locking system to deter thieves.

  1. Your Computer

You would think that this one would be common knowledge by now, but every so often a virus or scam comes along that trips us up. Stay one step ahead of scammers:

Keep your firewall, anti-virus and operating system software up-to-date. No matter how new and fast your laptop is, it still needs protection.

Enable spam filters on your email accounts.

Look out for sketchy links and emails. Ignore any suspicious password reset requests, unexpected tracking numbers or anything that asks for your personal information via email.

Don’t overshare on social media. Do your Facebook friends really need to know what year you were born? Can people tell when no one is home based on your Instagram feed? Keep your accounts private and make sure you’re not accidentally broadcasting sensitive information.

By being aware of the top 5 information jackpots and by implementing these simple strategies, you can keep identity thieves at bay.

Online Banking and Bill Pay–it’s just what the doctor ordered.

bill pay tutorial

To Do:

√Take Sarah lunch at school.
√Change batteries in remote.
√Pick up kitty litter.
  Mail Chad cash for uniforms.

Feeling a bit stressed?  Our lives are packed full of random tasks and things we have to remember each day so our days can run a little more smoothly.  While we can’t take little Sarah her forgotten lunch (we wish we could!), we can lend a hand in sending Chad the cash for this season’s football uniform.

Let us help you simplify your day with our easy and convenient Online Banking and Bill Pay services.

With just a little info and a few simple clicks, you can mail payments to a person or business, make bill payments, check balances, monitor savings goals, transfer from one account to another and much more.

Save yourself the stamp and time by enrolling today!  It’s just the thing to relieve a little of the financial worries we tend to pile on ourselves day in and day out.  All you need is a membership and checking account at MembersFirst and a computer, tablet or mobile phone.

Plus, get helpful step-by-step-instructions for scheduling payments, setting up eBill, making transfers and setting up bill pay alerts. See how simple it is to take online banking to a new level of convenience with online bill pay.

bill pay tutorial
Online Bill Pay Tutorial

Not a member?  That’s ok.  Become a member today by opening a membership share account with a minimum deposit of $25 and a valid government issued identification card.  Click here to join or by clicking the Join Today! button below.

Questions before you join?  Give us a call at 404-978-0080 or stop by one of our branch locations.  We’d love to hear from you and begin the process of simplifying your financial life.

join today button