Security Center

At RCB Bank, we know high-level security isn't just important, it's crucial. We are always making a continuous effort toward providing the highest standard of information security.

We're dedicated to protecting your financial information.

Our security center will help you understand the variety of methods we use to keep your information and money safe.  When we work together, we can prevent, identify and resolve fraud faster. Click each tab to learn more.

Unemployment insurance fraud is on the rise nationwide.

The following two main methods are being used:

  1. Individuals committing wire fraud. People who are victims of romance or phishing scams unknowingly allow their accounts to be used as a mule to transfer funds. The person would receive multiple ACH deposits from an unemployment benefit program in different names with no connection to their account. This is a red flag. If it has happened to you, follow the steps below.
  2. Fraudulent claims filed in employees’ names. In this case, fraudsters use personal identification information to file unemployment claims on the behalf of individuals to companies they may or may not work at or may have never worked at. If your company receives an unemployment claim letter, follow the steps below.

 

Tips to prevent unemployment fraud:

  • Never provide personal information, such as passwords, bank account or credit card information in response to unsolicited email or telephone requests.
  • Keep items with personal information in a safe place.
  • Destroy old personal information such as checks, expired credit cards, items with account numbers and preapproved credit card solicitations in a shredder.
  • Provide your Social Security number only when necessary.
  • Do not carry your Social Security card in your wallet.
  • Minimize the number of credit cards you carry and cancel inactive accounts.
  • Sign the back of credit and debit cards with permanent ink.
  • Take outgoing mail to the post office, rather than placing in your home mailbox. Place a hold on your mail with the post office, while on vacation.
  • Review account statements regularly to ensure all charges are accurate.

It’s Tax Fraud Season. Be Aware

The IRS doesn’t initiate contact with taxpayers by email, text messages or social media channels to request personal or financial information. Recognize the telltale signs of a scam.

Small Businesses Are Being Targeted By Fraudsters

Hackers are infiltrating small and and large businesses with social engineering tactics, such as phishing & vishing, customer account compromise and vendor management intrusion. The National Institute of Standards and Technology offers a framework to help businesses protect their work spaces. Each business has unique risks and will require tailored security measures and training. We can help.

Email Extortion Scam

An email extortion scam in the form of a bomb threat is making its way to inboxes of several businesses, namely financial institutions. The hoax suggests a bomb has been planted in the building and will only be detonated if a bitcoin ransom is not paid by the end of the workday. Read more.

ATM Skimmer Security Alert

Fraudsters can compromise a merchant’s system by use of malware or by attaching a physical device, such as a skimmer, which reads the data in the magnetic stripe and can be used to produce a fake card. Find out how RCB Bank protects you and how you can protect yourself.

Travel Fraud Security Tips

Before you leave for vacation, check out these travel planning tips to prevent fraud while on vacation.

Caution About Wire Fraud

Wiring money is a quick way to send and receive money. It’s also a prime target for fraud. Find out what you need to know about wire fraud.

Protect Yourself:

Identity theft is a crime in which a thief will use your stolen identity to obtain credit, commit fraud, or take other actions that can harm your reputation. Thieves will use credit card numbers, Social Security numbers, addresses or phone numbers to open a credit card or bank account, allowing for fraudulent purchases and other criminal activities. For the victim, correcting the damage can be costly and time consuming.

General Guidelines:

  • Never provide personal information, such as passwords, bank account or credit card information in response to unsolicited email or telephone requests. RCB Bank will never contact you and ask for your personal information.
  • Keep items with personal information in a safe place.
  • Destroy old personal information such as checks, expired credit cards, items with account numbers and preapproved credit card solicitations in a shredder.
  • Provide your Social Security number only when necessary.
  • Do not carry your Social Security card in your wallet.
  • Minimize the number of credit cards you carry and cancel inactive accounts.
  • Sign the back of credit and debit cards with permanent ink.
  • Take outgoing mail to the post office, rather than placing in your home mailbox. Place a hold on your mail with the post office, while on vacation.
  • Review account statements regularly to ensure all charges are accurate.

Limit unwanted calls

Add your home and cell phone numbers to the National Do Not Call Registry. To sign up visit www.donotcall.gov or call 1.888.382.1222

Limit unwanted emails

  • Use an email filter. Check your email account to see if it provides a tool to filter out potential spam or to channel spam into a bulk email folder.
  • Limit your exposure. Try not to display your email address in public. That includes blog posts, chat rooms and social networking sites. Spammers use the web to harvest email addresses.

Reduce paper mail

Reduce the amount of mail you receive by calling the national credit bureaus’ opt-out line at 1.888.5.OPT.OUT (1.888.567.8688) or visiting their website at www.optoutprescreen.com. This action will reduce the number of pre-approved credit offers you will receive. There is an option to make this temporary or permanent and we recommend making this option permanent. You will see credit offers diminish after you choose this option.

Monitor your credit report

Check your credit report at least once a year at www.annualcreditreport.com. If you do not have access to the internet call 1.877.322.8228. We recommend making three separate requests during the year (one request per year from each credit reporting agency is free).

Online Safety

  • Firewalls. Utilize a firewall to help screen out hackers, viruses and worms that try to reach your computer over the internet. Your internet service provider often offer this as a bundled service.
  • Anti-Virus Software. To protect your computer from viruses, you should be using anti-virus software. You can buy such software online or from a computer store. Make sure your software is set to update automatically to keep up with the updates and best protection.
  • Patching. Keeping your software current with patches is an important step in protecting your computer. Flaws or weaknesses in software can lead to your computer being compromised.
  • Strong Passwords. Do not use passwords that are easily guessed, or include names of family members or pets. Passwords should be a combination of upper and lower case letters, numbers and symbols. Change your passwords regularly.
  • Do not use public computers or public or unknown Wi-Fi, to access your accounts.
  • Never log in to online accounts from an email; type the URL in the browser bar.

How to Recognize Signs of Identity Theft:

The following may be signs of identity theft:

  • New accounts on your credit report that are not yours
  • Not receiving an expected bill or statement in the mail
  • Receiving calls from creditors or debt collectors regarding services or merchandise that you did not purchase
  • Credit card or billing statements on accounts for which you did not apply
  • Being denied credit or offered less than favorable terms for no reason

What To Do If You’re a Victim:

If the identity theft has seriously and substantially affected you financially, or through criminal impersonation, contact the local law enforcement agency that has jurisdiction where the crime was committed.

Fill out the ID Theft Affidavit online at the FTC site and send it to each credit reporting agency and to any affected creditors immediately: Call 1.877.ID.THEFT (877.438.4338) or go to www.identitytheft.gov.

Report the identity theft immediately to one of the credit reporting agencies and ask them to place a fraud alert on your account. The alert will remain on your report for about 90 days unless you choose to extend the alert or ask for a security freeze.  If you call one agency, they will forward the fraud alert to the others:

  • TransUnion: 1.800.680.7289 or www.transunion.com
  • Equifax: 1.800.525.6285 or www.equifax.com
  • Experian: 1.888.397.3742 or www.experian.com
  • Close any affected accounts and stop payment on any stolen checks.  Consider putting additional layers of security on any accounts that might be vulnerable.
  • Do not use the same passwords and personal identification numbers that were on the compromised accounts – choose new ones.
  • Notify the Department of Motor Vehicles if your driver’s license is stolen.
  • If your checkbook is stolen notify your financial institution and check approval agencies:
  • Telecheck, 1.800.710.9898, www.telecheck.com
  • Certegy, Inc. (previously Equifax Check Systems), 1.800.437.5120
  • Notify the postal inspector and your carrier if mail is involved.
  • Call the Social Security fraud hotline 1.800.269.0271 if you believe your Social Security information has been compromised.
  • If an identity thief has used your personal information to create tax problems call the IRS at 877.777.4778, or go to their website at www.irs.gov/advocate.

How We Protect You:

Our firewalls protect our computer systems interacting with the Internet against unauthorized access by outside individuals or networks.

SSL stands for “Secure Socket Layer.” This technology allows users to establish sessions with secure Internet sites, meaning they have minimal risk of external violation. Once inside the Internet Banking site, our use of SSL technology keeps you and your account information secure. Only browsers supporting the SSL security protocol with 128-bit encryption can connect to our system.

To gain access to our online banking system, users must authenticate to access their accounts via online banking.  We lock out online banking user ID’s to prevent unauthorized access after three-failed log in attempts.  In addition, our online banking system performs an automatic log off after 10 minutes of inactivity during an Internet Banking session.

Encryption turns words and phrases into coded language. All of your online activities during an Internet banking session become a string of unrecognizable numbers before entering the Internet.

We mask account and sensitive information online.  We reveal only the last few digits of your account number during internet and mobile banking sessions.

How We Protect Your Business:

Some business services require an additional security layer in the form of One-Time Use PIN/Token technology. Each user issued a token is also issued a password to access this token which generates a random password to be entered into the Cash Management System allowing Cash Users to access additional services.  This provides a double layer of login and password security.

RCB Bank does not send emails asking for personal or account information. RCB Bank does not send emails to customers or other users that contain links to click on.

What You Can Do:

  • Install antivirus and firewall software on your computer and keep it up-to date.
  • Make sure you have applied the latest security patches for your computer.
  • Before you initiate an online transaction, make sure your personal information is protected by looking for indicators that the site is secure. URLs for secure sites typically begin with “https” instead of “http” and display a lock in the lower right corner of your browser.
  • Be creative with your passwords. Never use your pet’s name, your child’s name or anything else that a fraudster could easily find out. The most secure passwords combine letters and numbers.
  • Keep your username and password safe. Never share your online and mobile banking credentials with others.
  • Be suspicious of any e-mail with urgent requests for personal financial information. RCB Bank will never call you or email you requesting any sensitive personal or account information.
  • Be cautious about opening any attachments or downloading any files from e-mails, regardless of who sent them.
  • Regularly log into your online accounts to verify that your bank, credit, and debit card statements and transactions are legitimate.
  • Call us quickly if you think you have mistakenly given out your username/password so we can help secure your account.

 

Additional Tips for Mobile Banking:

  • Always use official app stores to purchase apps.
  • Avoid tampering with your phone’s operating system, often referred to as “jailbreaking” or “rooting”.
  • Never store your passwords on the device or in other apps such as the note-taking app.
  • Keep the phone’s operating system and the mobile bank app up-to-date.

How We Protect You:

EMV Chip Technology

The chip in your debit card provides another layer of security when used at terminals and ATMs that are chip-enabled. This added security provision makes it difficult to copy or counterfeit the card data stored in the chip.

Fraud monitoring

We are committed to protecting your money. Our fraud department is continuously monitoring for suspicious card activity and we will contact you immediately, if we suspect fraud is occurring.  Also, if you suspect fraudulent activity or if your card is ever lost or stolen, contact us immediately.

Fraud Department Customer Service: 7 days A week (excluding holidays) 8 a.m. – 8 p.m. Call 877.361.0814. 

Deactivating Your Card

Deactivate your card anytime by using our automated telephone system.

  • 918.343.2265 Claremore
  • 580.767.7777 Ponca City
  • 918.825.5566 Pryor
  • 405.842.4129 Oklahoma City
  • 877.812.4663 Toll Free & Kansas
    Press “2” at the main menu for this option.

What You Can Do:

  • If traveling out-of-state or internationally, it is important that you notify us so we can provide continued usage of your card. If you are planning to travel, please call 877.361.0814 prior to your departure
  • Never share your PIN number with anyone
  • Keep your PIN number safe, never write it on the card or store it in your wallet
  • Make sure to notify the bank of any address, telephone number or email address changes
  • Review account activity often
  • Please respond immediately to calls from our Fraud department for confirmation of suspicious attempts or transactions

Safe ATM Tips

  • Always pay close attention to your surroundings. Don’t select an ATM at the corner of a building — corners create a blind spot. Use an ATM located near the center of a building. Do your automated banking in a public, well-lit location that is free of shrubbery and decorative partitions or dividers.
  • Be wary of people trying to help you at the ATM. Hit the “cancel” button and leave if a person makes you feel threatened. Be aware of anyone sitting in a parked car nearby. When leaving the ATM make sure you are not being followed. If you are, go immediately to a police/fire station, or to a crowded, well-lit location or business.
  • Don’t use an ATM that appears unusual, tampered with or offers options which you are not familiar or comfortable with.
  • Don’t allow people to look over your shoulder as you enter your PIN, even if the people are known to you. Memorize your PIN; never write it on the back of your card.
  • If you are on foot, turn your back towards the machine while waiting for cash and take a quick look around before removing it.
  • Never count cash at the machine or in public. Wait until you are in your car or another secure place.
  • When using a drive-up ATM, keep your engine running, your doors locked and leave enough room to maneuver between your car and the one ahead of you in the drive-thru line.
  • Closely monitor your statements, as well as your balances, and immediately report any problems to us.
  • If you are involved in a confrontation with an assailant who demands your money, COMPLY.

Important for Travel:

Because out of state and foreign card transactions can appear as suspect fraud, it is important that you notify us if you are traveling so we can ensure continued use of your card. Please note that all embargoed OFAC countries are blocked. To see a current listing of blocked OFAC countries, please visit the U.S. Department of the Treasury site.

Steps to protect your money when traveling:

  • Notify the bank of any upcoming travel, whether foreign or domestic
  • RCB Bank offers pre-paid VISA cards and credit cards as an alternative payment method

Tips to keep your bank account safe from fraud:

  • Please respond immediately to requests for confirmation of suspicious attempts or transactions
  • Be aware of ATM skimmers, gas pump skimmers and other related fraud devices
  • Please keep the bank updated on current contact information
  • Always carry an alternative method of payment with you
  • Never share your PIN with anyone
  • Monitor your account activity often

Call the Fraud hotline number if you suspect fraud has occurred on your card: 877.361.0814

Phishing Scams:

Phishing is an email scam used to steal your personal information. The email will claim to be from your bank or credit card company and may appear authentic. Be careful! Any email requesting personal information or asking you to verify account information is usually a scam. Do not respond to it and do not click on any link from the email.

How to spot a Phishing email scam

  • Fails to address you by name.
  • Requests for personal information. The email asks you to provide personal information such as your bank account number, an account password, credit card number, PIN number, mother’s maiden name, or social security number.
  • Instructs you. To click on link or call a phone number to update your account or even claim a prize.
  • Urgent appeals. The emails warns that your account will be shut down unless you reconfirm your financial information. Or states you have been a victim of identity theft.
  • Obvious typos and other errors. These are often the mark of fraudulent emails and websites. Be on the lookout for typos or grammatical errors, awkward writing and poor visual design.

These are clear signs that someone is “phishing” for your information. If you receive a suspicious email that uses RCB Bank’s name, forward it to us immediately at abuse@bankrcb.net.net.

Phishing Email Examples

 

In this phishing email, they want you to click on what looks like a “Health.com” link. In reality if you hover over the link, Loyarmtime.com is where you would be redirected and possibly open up a virus on your mobile device. If you aren’t sure of links in an email, delete it. You can hover over links to see if it actually takes you to the website it shows.

How We Protect You:

We do not solicit any account information through email. If you receive an email from someone who claims to be a bank representative and requests confidential information, do not respond and contact RCB Bank immediately at 855.226.5722.

What You Can Do:

Never respond to any email asking for confidential information, even if it appears urgent.

  • Never click on a link from an email. Instead type the known website address into your internet browser.
  • Do not call any phone number provided in a suspicious email.
  • Always use anti-virus and anti-spyware on your computer and keep them up-to-date.
  • Notify us immediately at 855.226.5722 if you have given out your information, so we can help protect your account

Fraud Prevention Tips

  • Maintain current virus protection software and complete regular scans of your computer. Make certain the virus protection will also detect spyware/malware.
  • Consider all email requests for personal information to be suspicious.
  • Use your pop-up blocker. Never provide information in a pop-up box.
  • Never click a link in an email unless you completely trust the sender.
  • Make certain there is a lock symbol where you type in the web address or that the VeriSign symbol is displayed where you key in your account information. Also, make certain that “https:” shows in the website address, rather than “http:”.
  • If you must be active on a social networking site, please use caution in what you post. Fraudsters and scammers watch the information that is posted and can use it in devious ways to steal your identity.
  • Ignore emails from senders you do not know. Remember that the bank will never ask you to email your Social Security Number or other sensitive information!
  • Create strong passwords using a mix of alpha/numeric/characters, etc.
  • Do not download files on sites that you do not know.
  • Always delete texts and messages from unknown individuals.
  • Be wary of possible scammers on auction sites and sales sites.
  • Never respond to online or phone surveys requesting personal information.

News & Announcements:

Find the latest Scams and Alerts here.

What is Ransomware?

Ransomware, a type of malicious software, known as “malware”, that is designed to hold data hostage, is a tangible, growing concern for both individuals and businesses alike. This malware encrypts, or conceals access, to the victim’s files in attempt to get them to pay a ransom to regain access.

Who is Targeted?

Anyone. Everyone. Though, the most common earmarks are small to medium businesses, school districts, municipalities, energy companies, healthcare institutions, and financial institutions.

Small to medium-sized businesses made up 71% of the ransomware target vector compared to the remaining 29% categorized as middle market.1

More recently, attackers have targeted more school districts, municipalities, and energy companies. In 2019 alone, nine different major American cities were hit by ransomware attacks.2

What is There to Lose?

What do you have?

Money? Data? Trade Secrets? Intellectual Property? Personal information? Customer records?

You name it, they want it.

The ultimate goal of ransomware is for the attacker to gain something of value. Generally, there is a proposal of exchange: Your data for a sum of money. Unfortunately, there is no actual guarantee that once you have paid the attacker will release your information back to you.

In some cases, if you choose to pay the ransomware, you may just be losing on both fronts.

  • Ransomware downtime costs organizations more than $64k on average.3
  • Ransomware is costing businesses more than $75 billion per year.4
  • After getting hit by the SamSam ransomware attack in March 2018, Atlanta, Georgia has spent more than $5 million rebuilding its computer network, including spending $3 million hiring consultants and crisis managers.5

Is it Preventable?

Yes and no. While as there is no “boxed” solution, there are preventative measures that can be taken in order to help mitigate such an attack.

  • Follow an Information Security Framework.
    The below items are all aspects of a strong security posture. There are several resources available to build from. (See cited sources below.)
  • Educate yourself.
    Know what a legitimate email looks like verses a phishing attempt. Perform self-checks and be sure not to arbitrarily provide personal information over email, especially if you are not sure or do not trust the sender. Have an information security training program in place for your employees.
  • Limit internet connectivity and define user accessibility.
    If you have genuinely critical data, keep your network as inaccessible to the public as possible. Regular users on your network should not have administrative rights and should be given as little access as possible on a strictly “need” basis.
  • Employ proper network segmentation.
    Keep more valuable data sequestered and safe from public reach. This helps limit the data an attacker might access.
  • Use reputable anti-virus software, email filtering, and a firewall.
    Maintaining a strong, properly-configured firewall, filtering incoming email messages, and keeping your endpoint protection up to date are critical. It’s important to use software from a credible company because there are plenty of fake software packages available online.
  • Apply early threat detection systems.
    There exists software and applications that act as an overlay in which can detect unusual behaviors within your infrastructure. Such software can also help manage current vulnerabilities, inventory management, as well as user behavior analytics.
  • Enforce strong password security and practices.
    Utilize a password management strategy that focuses on length as complexity, such as implementing a 16-character minimum passphrase. Never have passwords in plain text or written down to where it could be accessed by someone else.
  • Use Multi-Factor Authentication.
    If available, the use of MFA can add an extra layer of security in accessing user accounts or system-critical data.
  • Keep your software up-to-date and patched.
    Many exploits come from out-of-date software that has become vulnerable. Regular patching of software is necessary to help prevent infection. This also includes removing deprecated software.
  • Set up viewable file extensions and limit executable files.
    Windows allows you to set up your computers to show the file extensions when you look at a file. Limit users to viewable files and keep them from being able to download or run executable files.
  • Back up your information.
    In the event of a disaster or ransomware attack, having reliable backups are imperative. Create restore and recovery points periodically. This simple step could help ensure that you have a quick recovery from any potential problem.
  • Invest in Cyber Insurance.
    This can help cover the costs of an attack. Most Cyber Insurance companies will pay out the ransom, but the deductible is usually around $10k.6
  • Use VPN when traveling.
    The use of a Virtual Private Network is a great security measure to make certain that your traffic is encrypted.
  • Limit internet connectivity and define user accessibility.
    If you have genuinely critical data, keep your network as inaccessible to the public as possible. Regular users on your network should not have administrative rights and should be given as little access as possible on a strictly “need” basis.
  • Employ proper network segmentation.
    Keep more valuable data sequestered and safe from public reach. This helps limit the data an attacker might access.

If I Get Attacked What Should I Do?

Experts suggest not to pay the ransomware.7 Not only does it encourage future attacks, but there is no guarantee that the hacker will comply once the payment is received.

Organizations should invest in capable, educated, information security team and/or an incident response team that is prepared to react in the event of an attack. Unplug the Ethernet cable from the affected device and contact the experts. Explain exactly what happened and do not leave out any details.

What is the Possible Impact of Ransomware?

Ransomware can result in many different negative consequences, including:

  • Temporary or permanent loss of sensitive or proprietary information.
  • Disruption to regular operations.
  • Financial losses incurred to restore systems and files.
  • Potential harm to the organization’s reputation.

 

Sources Cited

Superscript:

  1. https://www.beazley.com/news/2019/beazley_breach_briefing_2019.html
  2. https://www.msspalert.com/cybersecurity-breaches-and-attacks/ransomware/attack-list-cities-government-agencies/
  3. https://www.datto.com/news/datto-releases-global-state-of-the-channel-ransomware-report
  4. https://www.datto.com/news/american-small-businesses-lose-an-estimated-75-billion-a-year-to-ransomware
  5. https://statescoop.com/atlanta-was-not-prepared-to-respond-to-a-ransomware-attack/
  6. https://www.darkreading.com/operations/average-breach-falls-below-cyber-insurance-policy-deductible-study-shows/d/d-id/1324652
  7. https://krebsonsecurity.com/2016/12/before-you-pay-that-ransomware-demand/

Security Framework Resources:

  1. https://www.nist.gov/cyberframework
  2. https://www.cisecurity.org/controls/

No More Ransomware Security Project:

https://www.nomoreransom.org/en/index.html

What You Can Do To Protect Your Business

You have worked hard to build your business. That’s why we want to help you protect it. Fraudsters target businesses because they know it can be lucrative if their fraud scheme works. Let’s look at some common fraud types that target businesses.

 

Corporate Account Takeover (CATO)

CATO is a type of identity theft in which a criminal steals a business’s online banking credentials and then uses those credentials to initiate funds transfers out of the account via ACH, Wire or Bill Payment.

Business Computer Security

  • Setup a Firewall and actively manage it.
  • Purchase and install Anti-Spyware/Malware
  • Website, Application & Pop-Up Blocking. Your firewall and anti-spyware/malware as well as your end-point protection software can each be setup to block web sites or applications that may represent a greater risk for malware or fraud.
  • Isolate One Computer for Banking Use. If possible, setup one PC and limit that PC to only conduct banking activity and DO NOT allow this PC to be used for general web browsing, email and social networking. This will reduce the threat of being infected.
  • Patch All Systems. Enable automatic updates for operating system patches.
  • Avoid connecting to public Wi-Fi networks with your business computers.
  • Be ultra-cautious when clicking on links. Take the time to open a browser and manually type the URL if you have any questions about the link.

Online Banking User Security

  • Do Not Share User IDs or Passwords. Each user should have their own user ID and password, which should be secured and not visible or accessible to others.
  • Use Dual Control. When conducting funds transfers such as Wires or ACH and require two users to complete the transaction. One employee to create the wire request and another to approve it before processing transactions.
  • Keep Your Businesses Contact Information Current. This is important in the event RCB should need to contact the user to confirm any suspicious transaction.
  • Enroll in Alerts. Sign up for transaction and balance alerts.

If you suspect your business has experienced a Corporate Account Takeover attack, contact RCB immediately! The sooner you detect an attack and report it to us, the quicker we can react to stop losses and potentially recover funds. Call us at 855-226-5722

Business E-Mail Compromise (BEC)

BEC is a sophisticated fraud that targets businesses that regularly perform wire transfer payments. The fraud is conducted by compromising legitimate business e-mail account through social engineering or computer intrusion techniques to conduct unauthorized transfer of funds.

Here are just a few examples:

Fake Invoice or Modified Invoice Scam

Criminal will impose as familiar supplier and contact business to wire funds for invoice payment to alternate fraudulent account. Criminals often spoof the email request so it appears very similar to legitimate supplier. Request may come from telephone, fax or email.

Business Executive/CEO Imposter Fraud

Occurs when e-mail accounts of high-level business executives (CFO, CTO, etc.) are compromised. The account may be spoofed or hacked. A request for a wire transfer from the compromised account is made to a second employee within the company who is normally responsible for processing these requests.

Attorney Impersonation

Fraudster will claim to be handling time sensitive or confidential matters requesting urgency and secrecy on sending funds. Contact made typically by phone or email.

Business Email Compromise

  • Establish a multi-person approval process for transactions above a certain amount
  • Set up a system that requires a valid purchase order and approvals from a manager and a finance officer to spend money.
  • Authenticate requests to make a payment or change payment instructions by vendors, and independently verify change in payment instructions.
  • Remember-email is never a secure way to send financial information. Question any emailed payment requests that include account information.
  • Slow down. Take time to verify any request, even an urgent one. Be suspicious of any request for secrecy.
  • Use a shredder to destroy sensitive information.

Other methods used to steal information include the following and educating your employees will help prevent user and account information ending up in the wrong hands.

Phishing

This fraud involves a fake e-mail; instant message or social media message that looks like it comes from a legitimate source like the bank, or a government agency or online services such as Paypal, Facebook etc. The message will ask you to update, validate or confirm your account information including password-any may even threaten to terminate the account if there is no response from you. The e-mail typically include a link to a fake website that looks like it is the legitimate organization.

SMiShing

This is the cell phone version of “Phishing”. Using fake company emails, scammers send text messages that appear to be from legitimate well-known companies but contain counterfeit links to websites that ask for personal and sensitive information. The text will indicate there is an urgent need to take action and update your personal information.

Vishing

Telephone fraud that uses a technique called caller ID spoofing, which makes it look like calls are coming from a legitimate or known phone number and the caller proceeds to ask for card numbers or other sensitive information. If in doubt, call the supposed company back from a known number from your system or telephone book. Never rely on caller ID.

Please feel free to contact us with any questions you may have. Additionally, visit other tabs in this security center to learn more.

Fraud Scams: Quick Reference Guide

Use this quick reference guide to learn about scams and how to recognize the warning signs.

Business Email Compromise (BEC)

What is it?

Business Email Compromise targets a business or commercial client to
initiate a large funds transfer to an account under the fraudster’s control.

Who are the victims?

Individuals within a business or corporation who can initiate a funds transfer, such as CEOs, CFOs, Accountants, Bookkeepers, or Accounts Payable.

How does it work?

Fraudsters begin by conducting research on individuals, often in high-level corporate positions. They use online sources of information, including LinkedIn profiles and bios included on a company’s web site. Once individuals are identified, fraudsters will use targeted techniques such as spear phishing to gain access to corporate systems. The fraudster will monitor and research how financial transactions are conducted before initiating their attack. Fraudsters will generally initiate an urgent and time-sensitive request for a funds transfer. This request will appear to come from a senior officer of the company. The email, which appears to be from a senior officer, instructs the receiver to urgently transfer significant funds to an account within the fraudster’s control (either directly or through a money mule). Fraudsters are adapting to new corporate controls by requesting smaller domestic transfers. Fraudsters often initiate their transfer request when the senior officer is profiled, such as when on vacation or traveling, to reduce the ability of the person receiving the fraudulent email to verify the request.

Employment Scams

What is it?

Employment Scams target individuals with the promise of a job that,
typically, involves processing financial transactions for the employer.

Who are the victims?

Job seekers, college students, underemployed, stay-at-home parents, or retirees may be susceptible to these scams.

How does it work?

Fraudsters will post ads on online forums and social networks such as Craigslist and Facebook, as well as send out emails and text messages to large groups of random individuals, promising high paying jobs that can be done from home. If the fraudster believes a specific institution has controls that can be exploited, they may request the victim open an account at a targeted institution. Otherwise, the fraudster will use the existing accounts of the victim to conduct the fraud. The fraudster uses the victim’s financial information to either initiate ACH credits or perform mobile deposits to the account. They then instruct the victim to forward the funds into an account the fraudster controls, less a processing/administrative fee that is meant as payment to the victim. When the unauthorized ACH or fraudulent check returns, the victim is typically held responsible for the loss.

Lottery Scams

What is it?

Lottery Scams promise large lottery winnings in return for an initial
processing fee from the victim.

Who are the victims?

General public, but typically elderly persons, and those who may be financially vulnerable.

How does it work?

Fraudsters will use mass phishing techniques to identify victims, and lure them in with the prize of a large lottery win. Victims are requested to forward a processing fee to the fraudster before receiving their winnings. If the victim does forward a fee, then the fraudster will make additional requests for funds — often under the guise of withholding tax fees or administration fees. This will continue until the victim catches on or runs out of money.

Online & Payday Loan Scams

What is it?

A fraud targeting individuals with the promise of a loan in exchange
for a fee.

Who are the victims?

College students, underemployed, individuals facing some form of addiction (gambling,
substance abuse).

How does it work?

Fraudsters will post ads on online forums and social networks such as Craigslist and Facebook, as well as send out emails and text messages to large groups of random individuals. These ads promise access to loans regardless of credit history or employment status. Once the victim responds, the fraudster will request financial details from the victim such as account information or online/mobile login credentials. The fraudster will use this information to either initiate ACH credits or perform mobile deposits to the account with instructions for the victim to then return a portion of the funds as part of a processing fee.

Romance Scams

What is it?

A fraud that targets victims who may be emotionally vulnerable with
companionship and friendship, with the goal of having the victim send
funds for travel, medical care, or a business opportunity.

Who are the victims?

Those who are widowed, retired, divorced or are single.

How does it work?

Fraudster will make contact with the victim through social media networks, online forums, or dating sites. The fraudster is typically located overseas but may portray themselves as an American (military, business professional, etc.). This fraud may takes months to develop as the fraudster builds trust with the victim. At some point the fraudster will make a request for money. Typical requests include travel expenses to see the victim; emergency medical expenses for the fraudster or a family member — usually a child; or a business opportunity that will allow them to get enough money to live together. The fraudster will generally begin by requesting a small amount of money, and increase the requests over time.

To report a fraudulent claim as an individual in Kansas, take the following steps: 

  1. Email the KDOL at KDOL.Fraud@ks.gov. Include your name, the claim number (if it appeared on the information you received) and your email address. Scan and attach any documentation. OESC will immediately put a STOP on any reported claim.
  2. If you have received any Way2Go cards from the KDOL, notify your bank that you received them. After notifying KDOL and your company’s HR, it’s important to destroy the cards.
  3. Check with your financial institution and credit card companies to ensure your personal information has not been compromised further. You may also obtain a free copy of your credit report from www.ftc.gov/faq/consumer-protection/get-my-free-credit-report.
  4. Consider filing a credit freeze or extended fraud alert because you are a victim of ID theft. Details on both, as well as how to file, can be found at Consumer.ftc.gov.
  5. The Kansas Department of Labor has also created a form to complete to report unemployment fraud. Information can be found at www.dol.ks.gov/ui-faqs/unemployment-fraud. At the bottom of that page you will see “How do I report my suspicions of UI fraud” where you will access the form.

To report a fraudulent claim as a business in Kansas, take the following steps: 

  1. Email the KDOL at KDOL.Fraud@ks.gov. Scan and include all documentation, including the claim form you received. You will receive an auto-reply email but may not receive a callback.
  2. You must file the protest within 10 days of the date of mailing on claims you received. In that filing, you give the reason for that protest.
  3. File a report with Kansas Department of Labor online as well. Information can be found at www.dol.ks.gov/ui-faqs/unemployment-fraud. At the bottom of that page you will see “How do I report my suspicions of UI fraud” where you will access the form.

To report a fraudulent claim as an individual in Oklahoma, take the following steps: 

  1. Email the OESC at fraud@oesc.state.ok.us and also the OESC supervisor at crystal.anglin@oesc.state.ok.us. Include your name, the claim number (if it appeared on the information you received) and your email address. Scan and attach any documentation. OESC will immediately put a STOP on any reported claim.
  2. If you have received any Way2Go cards from the Oklahoma Employment Security Commission, notify your bank that you received them. After notifying OESC and your company’s HR, it’s important to destroy the cards.
  3. Check with your financial institution and credit card companies to ensure your personal information has not been compromised further. You may also obtain a free copy of your credit report from https://www.ftc.gov/faq/consumer-protection/get-my-free-credit-report.
  4. Consider filing a credit freeze or extended fraud alert because you are a victim of ID theft. Details on both, as well as how to file, can be found at www.consumer.ftc.gov.
  5. The Oklahoma attorney general has also created a form he encourages you to complete to report unemployment fraud. Information can be found at www.oag.ok.gov/attorney-general-hunter-launches-new-effort-to-assist-victims-of-unemployment-fraud. At the bottom of that page you will see “to access the form, click here,” where you will access the form.

To report a fraudulent claim as a business in Oklahoma, take the following steps: 

  1. Email the OESC at fraud@oesc.state.ok.us and the OESC supervisor at crystal.anglin@oesc.state.ok.us. Scan and include all documentation, including the claim form you received. You will receive an auto-reply email but may not receive a callback.
  2. You must file the protest within 10 days of the date of mailing on claims you received. In that filing, you give the reason for that protest
  3. File a second report with the Oklahoma attorney general. Information can be found at www.oag.ok.gov/attorney-general-hunter-launches-new-effort-to-assist-victims-of-unemployment-fraud. At the bottom of that page, you will see “to access the form, click here,” where you will access the form.