As your partner in protecting yourself, check back often for updates on protecting your identity.
The following information is from FDIC.GOV
Warning: Internet Pirates are Trying to Steal YOUR Personal Financial Information
Here's the Good News—YOU have the Power to Stop Them
There's a new type of Internet piracy called "phishing." It's pronounced "fishing," and that's exactly what these thieves are doing: "fishing" for your personal financial information. What they want are account numbers, passwords, Social Security numbers, and other confidential information that they can use to loot your checking account or run up bills on your credit cards.
In the worst case, you could find yourself a victim of identity theft. With the sensitive information obtained from a successful phishing scam, these thieves can take out loans or obtain credit cards and even driver's licenses in your name. They can do damage to your financial history and personal reputation that can take years to unravel. But if you understand how phishing works and how to protect yourself, you can help stop this crime.
Here's how phishing works:
In a typical case, you'll receive an e-mail that appears to come from a reputable company that you recognize and do business with, such as your financial institution. In some cases, the e-mail may appear to come from a government agency, including one of the federal financial institution regulatory agencies.
The e-mail will probably warn you of a serious problem that requires your immediate attention. It may use phrases, such as "Immediate attention required," or "Please contact us immediately about your account." The e-mail will then encourage you to click on a button to go to the institution's Web site.
In a phishing scam, you could be redirected to a phony Web site that may look exactly like the real thing. Sometimes, in fact, it may be the company's actual Web site. In those cases, a pop-up window will quickly appear for the purpose of harvesting your financial information. In either case, you may be asked to update your account information or to provide information for verification purposes: your Social Security number, your account number, your password, or the information you use to verify your identity when speaking to a real financial institution, such as your mother's maiden name or your place of birth.
If you provide the requested information, you may find yourself the victim of identity theft.
How to Protect Yourself
You Can Fight Identity Theft – Here’s How:
What to do if you fall victim:
A message from the federal bank, thrift and credit union regulatory agencies
*Information from www.fdic.gov
Do not give out financial information, such as account numbers, unless you know the person or organization.
Watch for websites that contain (https:) to indicate it is a secure site.
Notify your bank of any suspicious phone inquiries asking for personal account information.
Shred financial information and bank statements before disposing of them.
Check bills regularly for questionable charges and contact the company if a bill fails to reach you.
If you think you may be a victim of Identity Theft please contact one of our Personal Bankers for assistance.
ALERT: Waumandee State Bank will not contact a customer to verify name, address, account number, or other personal information. If you receive a call asking for information, please contact your Personal Banker.
IF YOU HAVE GIVEN OUT ANY INFORMATION, PLEASE CONTACT YOUR LOCAL WAUMANDEE STATE BANK TO GET THE CARD DEACTIVATED IMMEDIATELY!
Waumandee State Bank has learned that criminals have launched a major e-mail campaign to deploy the infamous ZeuS Trojan e-mail, which will send spam messages disguised as fraud alerts from the Internal Revenue Service (IRS), Twitter account hijack warnings, or salacious Youtube.com videos.
The fraudulent IRS e-mail uses the verbiage "Notice of Underreported Income" as the Subject Line and encourages the recipient to click a hyperlink to review their tax statement. All of the latest e-mails use a variety of URL shortening services.
Do not open the attachments or download information from unexpected or spam e-mails.