CREDIT UNION SECURITY
FMCU’s Digital Services offer members a convenient way to bank online. However, with that convenience comes the threat of fraud. Fort McClellan Credit Union wants to help you take the steps to keep your accounts safe.
Remember, Fort McClellan Credit Union will never ask for your personal information, account number, PIN, or any sensitive account information via email.
If you receive an e-mail that appears to be from FMCU and asks for account information, you should consider it to be a fraudulent attempt to obtain your personal account data for an illegal purpose, and you should not follow the instructions in the email.
To verify any requests, please call us at (256) 237-2113, and our staff can help you.
FRAUD PREVENTION BEST PRACTICES
Don’t provide your card number to anyone over the phone unless you made the call and you know the company to be reputable.
Secure your accounts with strong and unique passwords.
Use multi-factor authentication to login to your accounts. Multi-factor authentication requires two or more credentials to log in to your account.
Choose security questions only you know the answer to.
Notify your card issuer of travel dates and destinations. If your card gets used in an unusual destination, the transaction may be declined.
Report any questionable charges to your card issuer immediately.
Social Engineering involves tricking people into breaking normal security procedures and providing confidential information. Through social engineering, attackers exploit a person’s natural inclination to trust instead of attempting to hack your software. Examples of social engineering techniques include the following:
Spoofing – Spoofing is when someone disguises an email address, sender name, phone number, or website URL—often just by changing one letter, symbol, or number—to convince you that you are interacting with a trusted source.
Phishing – Phishing schemes use spoofing techniques to lure you in and get you to take the bait. These scams are designed to trick you into giving information to criminals that they shouldn’t have access to.
Vishing – Vishing schemes involve using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
Smishing – Smishing schemes involve using SMS (text) messaging as a way to scam the user into giving out private information that can be used for identity theft.
Pharming – Pharming scams happen when malicious code is installed on your computer to redirect you to fake websites.