Roselle Bank Reminds Consumers: Be Vigilant When It Comes to Protecting Your AssetsROSELLE, N.J. – APRIL 3, 2018 – Coming off the heels of National Consumer Protection Week, Roselle Bank offers important tips and information from the FDIC to help their customers safeguard their possessions from high-tech thieves.Teaming up with the FDIC, here’s what consumers need to know:Safe deposit boxes vs. home safe vs. bank deposit account. Bank safe deposit boxes are good choices to store originals of key documents, such as birth certificates and property deeds, but probably not the right choice if quick access is a must. Also, people are better off stashing their cash in a bank deposit account, like a savings account or certificate of deposit, than in a home safe or a safe deposit box where the money isn't protected by FDIC insurance.Beware of criminals who place hidden recording devices at or near automated teller machines (ATMs) and retailer checkout registers. These devices can "skim" (steal) credit and debit card account numbers and personal identification numbers (PINs) to commit fraud or theft.Know the new standards for credit reporting, which may help consumers improve credit scores and qualify for loans under more favorable terms. Did you know … unpaid medical debts will not appear as negative information on a consumer's credit report until those debts are at least 180 days past due?“Taking some simple steps to protect your data could save you both time and money,” said Roselle Bank President and Chief Executive Officer, Detlef H. [...]
Your home has locks on the doors and windows to protect your family and prevent thieves from stealing cash, electronics, jewelry and other physical possessions. But do you have deterrents to prevent the loss or theft of your electronic assets, including bank account and other information in your personal computers, at home and when banking or shopping remotely online? "Think about all of the access points to and from your computer — such as Internet connections, email accounts and wireless networks," said Michael Benardo, manager of the FDIC’s Cyber Fraud and Financial Crimes Section. "These always need to be protected. Otherwise, it’s like leaving your front door wide open while you are away so that anyone could come in and take what they please." Consider these strategies. For Banking by Computer or Mobile Device Take extra precautions for logging into bank and other financial accounts. These measures include using "strong" user IDs and passwords by choosing combinations of upper-and lower-case letters, numbers, and symbols that are hard for a hacker to guess. Don’t use your birthdate, address or other words or numbers that can be easy for con artists to find out or guess. Don’t use the same password for different accounts because a criminal who obtains one password can then log in to your other accounts. Keep your user IDs and passwords secret, and change them regularly. Make sure to log out of financial accounts when you complete your transactions or walk away from the computer. Consider using [...]
Equifax isn’t calling September 14, 2017 by Lisa Weintraub Schifferle Attorney, FTC, Division of Consumer and Business Education Ring, ring. "This is Equifax calling to verify your account information." Stop. Don’t tell them anything. They’re not from Equifax. It’s a scam. Equifax will not call you out of the blue. That’s just one scam you might see after Equifax’s recent data breach. Other calls might try to trick you into giving your personal information. Here are some tips for recognizing and preventing phone scams and imposter scams: Don’t give personal information. Don’t provide any personal or financial information unless you’ve initiated the call and it’s to a phone number you know is correct. Don’t trust caller ID. Scammers can spoof their numbers so it looks like they are calling from a particular company, even when they’re not. If you get a robocall, hang up. Don't press 1 to speak to a live operator or any other key to take your number off the list. If you respond by pressing any number, it will probably just lead to more robocalls. If you’ve already received a call that you think is fake, report it to the FTC. If you gave your personal information to an imposter, it’s time to change any compromised passwords, account numbers or security questions. And if you’re concerned about identity theft, visit IdentityTheft.gov to learn how you can protect yourself. For more information about the Equifax breach, visit Equifax’s website, www.equifaxsecurity2017.com or contact their call center at 866-447-7559.
Red Flags for Elder Financial Abuse The key to spotting financial abuse is a change in a person’s established financial patterns. Watch out for these red flags: 1. Unusual activity in an older person’s bank accounts, including large, frequent or unexplained withdrawals 2. Changing from a basic account to one that offers more complicated services the customer does not fully understand or need 3. Withdrawals from bank accounts or transfers between accounts the customer cannot explain 4. A new “best friend” accompanying an older person to the bank 5. Sudden non-sufficient fund activity or unpaid bills 6. Closing CDs or accounts without regard to penalties 7. Uncharacteristic attempts to wire large sums of money 8. Suspicious signatures on checks, or outright forgery 9. Confusion, fear or lack of awareness on the part of an older customer 10. Checks written as “loans” or “gifts” 11. Bank statements that no longer go to the customer’s home 12. New powers of attorney the older person does not understand 13. A caretaker, relative or friend who suddenly begins conducting financial transactions on behalf of an older person without proper documentation 14. Altered wills and trusts For more information, visit aba.com/Seniors
How to Avoid Frauds & Scams There are numerous scams presented daily to consumers so you must always exercise caution when it comes to your personal and financial information. The following tips may help prevent you from becoming a fraud victim. Be aware of incoming e-mail or text messages that ask you to click on a link because the link may install malware that allows thieves to spy on your computer and gain access to your information; Be suspicious of any e-mail or phone requests to update or verify your personal information because a legitimate organization would not solicit updates in an unsecured manner for information it already has; Confirm a message is legitimate by contacting the sender (it is best to look up the sender’s contact information yourself instead of using contact information in the message); Assume any offer that seems too good to be true, is probably a fraud; Be on guard against fraudulent checks, cashier’s checks, money orders, or electronic fund transfers sent to you with requests for you to wire back part of the money; Be wary of unsolicited offers that require you to act fast; Check your security settings on social network sites. Make sure they block out people who you don’t want seeing your page; Research any “apps” before downloading and don’t assume an “app” is legitimate just because it resembles the name of your bank or other company you are familiar with; Be leery of any offers that pressure you to send [...]
There are several steps you can take regularly to help prevent infection. Tip 1: Enable Passwords on ALL your devices – both for business and personal use Securing ALL devices, both personal and corporate, is highly recommended. In the event a device is lost or stolen this can mitigate risk of your confidential information being utilized to compromise systems. RECOMMENDATION: Use strong passwords – 10 or more characters with upper/lower case letters, numbers and special characters. Increase difficulty – do not use passwords that can be easily guessed – birthdays, child’s name, many of these can be easily mined from sites such as Facebook, Instagram, Twitter, etc. Unique Password – use unique passwords for all websites, do not use your same password on multiple sites. Don’t Share! – never share your password even with friends and family, they may inadvertently disseminate your security. Security Verification – when setting security or password verification questions, choose questions that are unlikely to be mined from social media sites such as Facebook, Instagram, Snapchat, and others. Tip 2: Empty Temporary Internet Files & Cache Folders Any information you displayed or entered into your computer could possibly be temporarily stored in the browser memory storage area. RECOMMENDATION: After you have finished your internet browsing session, close your browser completely and erase any information that may have been stored in your browser. Internet Explorer: Open Internet Explorer and go to → Internet Options. Under Browsing history check the box Delete browsing history on exit, click Apply. Before exiting Internet Options select Delete… under [...]