Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

FBI Warns About Banking Scams

FBI Warns About Banking Scams

In response to the coronavirus pandemic, many people are avoiding human contact by turning to the Internet and mobile apps. On a national scope, mobile banking alone has seen an increase of 50 percent over just the last few months. In what certainly is no coincidence, the Federal Bureau of Investigation recently put out a warning that identified banking apps as likely targets for hackers.

As was said in the FBI’s announcement:

“As the public increases its use of mobile banking apps, partially due to increased time at home, the FBI anticipates cyber actors will exploit these platforms.”

We recommend that you take a few minutes and read the entire announcement, as it has a lot of information about these threats and quite a few tips that can help protect your mobile banking as well as many other applications.

If you don’t have the chance to go over all of this now, we’ve put together some of the most important tips to abide by if you’re trying to protect yourself and your financial interests.

Use 2FA

2FA, short for Two-Factor Authentication, and often seen nowadays as MFA or Multi-Factor Authentication, is effectively the addition of another identifier to ensure that someone trying to access an account is who they claim to be. Via texting, emailing, or generating a unique code through an application like Google Authenticator, Authy, Duo, or LastPass Authenticator, a user is given the key to open the additional lock on their accounts.

Any account you use should be protected by 2FA/MFA, especially those that deal with your finances or other sensitive information.

You should always set up 2-Factor Authentication on any account you have, especially if it deals with sensitive information or your money.

Be Smart About Your Passwords

Make sure that any passwords you use are sufficiently secure for your purposes. Rather than using common phrases or easy-to-guess combinations, like your birthday or a pet’s name, use a unique string of characters, numbers, and symbols for each account, or a passphrase consisting of unrelated words.

If You Aren’t Sure, Don’t Click on It

In what is probably the best piece of advice you can give someone who does business online in 2020, if you don’t know who sent it or where it will take you, don’t click on it. In fact, if you aren’t 100 percent sure about something, don’t click on it. Chances are your bank has a mobile app. Download that one from a reputable app store. They may have the link on their website, but if it doesn’t take you to the Google Play Store or the Apple App Store, don’t click on any link. Your bank has spent significant resources to make sure that their app has the security needed, don’t risk using any other app. 

Contact the Bank if You Have Questions

Confirmation that it was your bank sending you information, or that their app isn’t working properly at the moment won’t take more than a simple phone call to confirm. Go to their official website and get the customer assistance number.

We’re really glad the FBI covered this tip too, as it’s often glossed over. If you have any suspicion that something is strange or not working correctly, just call your bank. Go to their official website, or use the number on the back of your card or from a statement. You don’t want to be fooled into making a mistake that puts your finances in the crosshairs of hackers or scammers. Your bank will never ask you for your name or password over the phone, so never give that information out. 

Keep your money out of the hands of cybercriminals by being vigilant and understanding the signs of a scam. If you would like any more information about keeping your finances secure, call the IT security professionals at Central Technology Solutions today at 1-844-237-4300. 

Test Your Backup!
Your Eyes Will Thank You if You Try This Microsoft...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, August 05 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.centraltechnologysolutions.com/

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Data Hosted Solutions Network Security IT Services Privacy Email Data Backup Internet Malware Hackers Software IT Support Business Efficiency Outsourced IT Innovation Microsoft Computer Hardware Mobile Devices Productivity Data Recovery Managed IT Services Small Business Upgrade Google Business Continuity IT Support Cybersecurity Cloud Computing Backup Ransomware Phishing Smartphone Collaboration Tech Term User Tips Communication Workplace Tips Managed Service Provider Business Management Managed IT Services Disaster Recovery VoIP Windows 10 Mobile Device Managed Service Smartphones Internet of Things Android Remote Monitoring Social Media Data Management Paperless Office Quick Tips Saving Money communications Facebook Managed IT Network Browser Encryption Server Windows 10 Office 365 Windows Artificial Intelligence Save Money Miscellaneous BDR Business Technology Virtualization Wi-Fi BYOD Risk Management Compliance Covid-19 Passwords Holiday Help Desk Remote Work Healthcare Training Apps Health Office Vendor Management Password Windows 7 Microsoft Office App Automation Mobile Device Management Government Document Management Users Employer-Employee Relationship Bandwidth Robot Data Security Bring Your Own Device Going Green Applications Content Filtering Gmail Analytics Recovery Laptops Big Data Unified Threat Management Firewall Chrome Avoiding Downtime Infrastructure Hosted Solution Website Money Computing Data loss Vulnerability Data storage Telephone Systems SaaS Mobility Regulations Information Technology File Sharing Wireless Processor Computers Two-factor Authentication Information Storage IT Management Redundancy Tip of the week Scam Blockchain Antivirus Apple Project Management Social Customer Service Access Control VPN Downtime Proactive Virtual Reality Customer Relationship Management Employee-Employer Relationship Virtual Private Network Budget Machine Learning IT Service Printing Software as a Service Operating System OneDrive Tablet Hard Drive Router Meetings IoT Maintenance Files Remote Computing Gadgets Settings Company Culture Flexibility Politics RMM Unified Communications Work/Life Balance YouTube Cooperation Hacker Websites Identity Theft WiFi Time Management Networking Mobile Security Patch Management Solid State Drive Licensing Upgrades Current Events Wireless Technology Legal Social Network Managed Services Provider Data Breach Administration Twitter Management LiFi Network Management File Management Education Remote Monitoring and Management Display Assessment Dark Web Server Management End of Support Augmented Reality Payment Cards IT solutions How To Remote Workers Bitcoin The Internet of Things Uninterrupted Power Supply Monitors Co-Managed IT Consultation Outlook Electronic Medical Records Mobile Office Mouse Sports Alert Professional Services Managed Services Smart Technology Net Neutrality Word Search Google Drive Electronic Health Records Employees Private Cloud Monitoring How To Samsung Business Growth Tech Support Internet Exlporer Remote Worker Chromebook Data Storage Recycling Mobile Computing HIPAA Digital Payment Utility Computing Spam Consulting San Diego Backups Proactive Maintenance Digitize Cybercrime Managing Stress Heating/Cooling Instant Messaging IT Consulting Drones Wasting Time Smart Devices OneNote Black Market Managed IT Service eWaste Read Only Deep Learning ROI Telephony WannaCry Tech Terms Writing Emoji CRM Specifications Solid State Drives Credit Cards Sync Permissions Nanotechnology Return on Investment Law Enforcement Cables Hacking Backup and Disaster Recovery Network Congestion Remote Working Legislation IT Technicians Teamwork Public Cloud Break Fix Social Networking Database Management Shadow IT Travel Enterprise Content Management Servers Finance Computer Repair SharePoint Staff Alt Codes Database Sensors Botnet Software Tips Physical Security Unified Threat Management Hotspot Notes Theft Retail Cortana Black Friday Roanoke — Central Technology Solutions Cryptocurrency Options Holidays Mobile Device Managment 3D Printing Fraud Screen Reader Active Directory Gadget Virtual Desktop Disaster Wires Trending Human Error Mirgation Shared resources Windows Server 2008 Automobile Computer Care Cost Management E-Commerce Motherboard Hacks GDPR Outsourcing Vulnerabilities Authentication Technology Laws Downloads Typing Voice over Internet Protocol Connectivity Mail Merge Processors IT Enterprise Resource Planning Touchscreen Bookmarks Techology Office Tips User Error Language Best Practice PowerPoint Value of Managed Services GPS VoIP WPA3 Sponsor Financial Cyber Monday technology services provider 5G Unsupported Software Virus Smart Tech Windows Server Permission Update Peripheral Migration Features Lenovo Data Warehousing Crowdsourcing Video Conferencing Geography Statistics Authorization Operations Telephone Supercomputer Address Save Time Wireless Internet Business Telephone G Suite History Mobile Favorites Disaster Resistance Computing Infrastructure Tracking Marketing Digital Fleet Tracking Obstacle Procurement Social Engineering USB Technology Assurance Group ’s 18 Windows 8 Superfish Mobile Data Security Cameras User Management Taxes Test PCI DSS Technology Tips Chatbots Identities Manufacturing Optimization Google Maps Buisness Cache Microsoft Excel Modem Biometric High-Speed Internet Bluetooth Outsource IT Multi-Factor Security Wearable Technology Transportation Mobile VoIP IT Budget Star Wars Employer/Employee Relationships IT Assessment Cabling Conferencing Proactive IT Dark Data Personal Information Printer Alerts Google Wallet Virtual Assistant Vendor Spyware Asset Tracking Course Safety Distributed Denial of Service Annual Convention Cyberattacks Batteries MSP Shortcut Comparison Identity Hard Drives Google Docs Hard Disk Drives Virtual Machines Cookies Humor Projects Gamification Point of Sale Development Zero-Day Threat Laptop Google Calendar Cyber security Firefox Notifications Web Server Emergency CrashOverride Printers Cameras Motion Sickness CCTV Administrator Relocation Regulation Webcam IT Consultant Hard Disk Drive Students Error