Skip Navigation Download Adobe® Acrobat Reader to view Portable Document Format (PDF).
The First National Bank of Sparta
Man depositing a check with his smartphone.

Fraud Protection

First National Bank of Sparta takes great care to ensure your identity remains safe and have included this information if you want to learn more about some of the types of fraud and what you can do to minimize your risk.

Consumer Protection

Identity Theft and Phishing

One way thieves can steal your identity is through phishing. It is pronounced "fishing," and that is exactly what these thieves are doing: "fishing" for your personal financial information like account numbers, passwords, Social Security numbers, and other confidential information that they can use to loot your checking account or run up bills on your credit cards

With the sensitive information obtained from a successful phishing scam, these thieves can take out loans or obtain credit cards and even driver's licenses in your name. They can do damage to your financial history and personal reputation that can take years to unravel. But if you understand how phishing works and how to protect yourself, you can help stop it from happening to you.

Phishers often send an email that claims to be from a business or organization that you deal with--your Internet Service Provider (ISP), bank, online payment service, or even a government agency. The message usually says that you need to "update" or "validate" your account information. It might threaten some dire consequence if you don't respond. The message directs you to a Web site that looks just like a legitimate organization's site, but it isn't.

The purpose of the bogus site? To trick you into divulging your personal information so the operators can steal your identity and run up bills or commit crimes in your name.

How to Report Identity Theft

Contact your bank representative immediately. If you need to speak to our team, call us at 618-443-2187.

If you have disclosed sensitive information in a phishing attack, you should also contact one of the three major credit bureaus and discuss whether you need to place a fraud alert on your file, which will help prevent thieves from opening a new account in your name. Here is the contact information for each bureau’s fraud division:

Report all suspicious contacts to the Federal Trade Commission at www.consumer.gov/idtheft,  or by calling 1-877-IDTHEFT. 

Tips for Preventing Mail Theft and Fraud

  • Retrieve your mail promptly after delivery.
  • Always deposit your mail in a mail slot at your local post office or hand it to your letter carrier.
  • Sign up for verified online services from your financial providers:
  • Online Bill Pay – eliminates the need to send your checks through the mail.
  • Online Bill Presentment – your bills are sent electronically and not through the mail.
  • eStatements – eliminates paper statements that travel through the mail.

Educational Resources for Consumers

FDIC: Learn How to Protect Yourself from Fraud.

File a Claim with the Internet Crime Complaint Center (IC3) a partnership between the Federal Bureau of Investigation (FBI), the National White Collar Crime Center (NW3C), and the Bureau of Justice Assistance (BJA) designed to serve as a vehicle to receive, develop, and refer criminal complaints regarding cyber crime.

OnGuard Online provides practical tips from the federal government and the technology industry to help you be on guard against Internet fraud, secure your computer, and protect your personal information.

FBI: Common fraud schemes and helpful information to avoid becoming a victim.

Corporate Protection

Corporate Account Takeover

Corporate account takeover is a method by which cyber-thieves gain control of a business’ bank account by stealing the business’ valid online banking credentials. Although there are several methods being employed to steal credentials, the most prevalent involves malware that infects a business’ computer workstations and laptops.

A business can become infected with malware via infected documents attached to an email or a link contained within an email that connects to an infected website. In addition, malware can be downloaded to users’ workstations and laptops when the users visit legitimate websites - especially social networking sites - and click on the documents, videos or photos posted there. This malware can also spread across a business’ internal network.

In common attacks, cyber-thieves send emails purporting to come from reputable, national organizations. This is a common tactic to gain credibility and lure unsuspecting individuals into taking some action. A recipient who clicks on the links within the email may be taken to a fake website, which prompts the recipient to unknowingly download malware to the computer.

The malware installs keylogging software on the computer, which allows the perpetrator to capture a user’s credentials as they are entered at the financial institution’s website. Sophisticated versions of this malware can even capture token-generated passwords, alter the display of the financial institution’s website to the user and/or display a fake Web page indicating that the financial institution’s website is down. In this last case, the perpetrator can access the business’ account online without the possibility that the real user will log in to the website.

The cyber-thieves use the sessions to initiate funds transfers, by ACH or wire transfer, to the bank accounts of associates within the U.S. These accounts may be newly opened by accomplices or unwitting “money mules” for the express purpose of receiving and laundering these funds. The accomplices or mules withdraw the entire balances shortly after receiving the money, and then send the funds overseas via over-the-counter wire transfer or other common money transfer services.

Why are smaller businesses and organizations targeted?

The cyber-thieves appear to be targeting small- to medium-sized businesses, as well as smaller government agencies and non-profits, for several reasons:

  •  Many small businesses and organizations have the capability to initiate funds transfers via ACH or wire. This funds transfer capability is often related to a small business’ origination of payroll payments.

  • Many businesses maintain a type of organization chart online, making spear phishing (targeting a specific employee) for an employee with online banking authorities easier.

  • Small businesses often do not have the same level of resources as larger companies to defend their information technology systems.

  • Many small businesses do not utilize additional banking services, such as password-generating tokens, and do not monitor and reconcile their accounts on a frequent or daily basis.

What can you do?

Protect

  • Ask about multi-factor authentication

  • Ask about dual control features for initiation of payments via Online Banking, with distinct responsibility for transaction origination and authorization.

  • Ask about establishing reasonable exposure limits that are related to transaction origination.

  • Do not respond to or open attachments or click on links in unsolicited emails.

  • If you receive an email from an apparent legitimate source requesting account information or action, contact the sender directly by other means: We will not send customers emails asking for passwords, credit card numbers or other sensitive information.

  • Contact us immediately if you encounter a message stating that the system is unavailable while trying to log in to your account.

  • Conduct Online Banking and payments activity from a dedicated computer that is not used for other online activity, such as general Web browsing and social networking and/or is not connected to an internal network.

  • Ensure that all anti-virus and security software for all computer workstations and laptops is robust and up-to-date.

  • Log/turn off and lock up computers when not in use.

  • Change the default passwords on all network devices.

  • Educate your employees on this type of fraud scheme.

Detect

  • Monitor and reconcile accounts frequently; many small business clients do not reconcile their bank accounts on a daily basis, and therefore may not recognize fraudulent activity until it is too late to take action.

  • Note changes in the performance of your computer such as: loss of speed, changes in appearance, computer locking up, unexpected rebooting or restarting of your computer, unusual pop-up messages, new toolbars and icons or an inability to shutdown or restart.

  • Look out for rogue emails; if someone says they received an email from you that you did not send, you may have malware on your computer.

  • Run regular virus and malware scans of your computer’s hard drive.

Respond

  • If you detect suspicious activity, immediately cease all online activity and remove any computer systems that may be compromised from the network.
  • Immediately contact us so that the following actions may be taken: disable online access to accounts, change online banking passwords, open new accounts as appropriate, request a review all recent transactions and electronic authorizations on the account and ensure that no one has added any new payees or made any other critical changes to account information.

  • File a police report; having a police report on file will often help facilitate the filing of claims with insurance companies, financial institutions and other establishments that may be the recipient of fraudulent activity.

  • In addition, you may choose to file a complaint online at www.ic3.gov. For substantial losses, contact your local FBI field office. (http://www.fbi.gov/)

  • Have a contingency plan to recover systems suspected of compromise.

  • Consider whether other company or personal data may have been compromised. 

Educational Resources for Businesses