Optimize the way you protect your personal information and finances.
Did you know that we'll notify you with a text or email if we suspect fraudulent transactions connected to your account? This will enable you to take action quickly to prevent further loss or damage.
We have already included you in these enhanced services as part of our fraud protection services.
U.S. consumers who have service through AT&T, Verizon, Sprint and T-Mobile will not be charged message or data rates for our fraud alerts. We absorb that cost for you!
Transactions that we have identified as potential fraud trigger the alerts.
All you need to do is respond back to the text alert with the word STOP.
The majority of suspected fraud accounts will be blocked, just as they are today. However, some lower risk items may not be declined.
Fraud alerts are not configured through mobile app, but rather through our fraud systems. The standard order of engagement is:
Alerts generated overnight result in an email only until calling and texting hours are available. Texts will be sent from 7am - 10pm CST. Calls will be sent from 8am - 9pm CST. Emails will be sent 24 hours. Texts and voice calls pending from the night before will be triggered the following morning at the times noted.
Yes, though please keep in mind that it could take 5-10 minutes for a block to be removed in some situations.
No, you will not be sent a link or asked for account details. You will only receive a text with a needed reply of YES or NO.
Fraudsters often attempt to gather information or infiltrate computers with dangerous files via email. Always be cautious when opening emails that are unfamiliar and watch out for these red flags.
While it is essential to take steps to prevent phishing and avoid ransomware attacks, it is equally important to ensure you are properly managing your physical security in your place of work or business. Review these tips for optimizing the security of your work environment.
When your workplace is tidy, it is much easier to keep track of important documents or items such as keycards or badges.
Lock systems and devices with smart passwords, and ensure only authorized individuals can access sensitive information or secured areas of a building.
Be aware of your company's security policies so that you can follow and help others uphold them.
Shred or destroy documents properly so that the information cannot be stolen and misused.
Don't leave devices or information unattended in public places, and lock your vehicle when items are kept inside.
Save conversations about sensitive information for locations where details cannot easily be overheard.
When important information is properly backed up, you can have peace of mind that the data won't be lost. Ensure you are following best practices when it comes to keeping the backups secure.