This document provides information on various fraud awareness topics such as ATM safety, card and cheque fraud, identity theft, money laundering, and common scams. It outlines best practices for protecting personal information and financial accounts. Key recommendations include memorizing PINs instead of writing them down, reporting lost cards immediately, reviewing statements for unauthorized transactions, and being wary of unsolicited communication promising money transfers that ask for personal details.
The document provides information about various types of scams and fraud, including local scams, investment scams, internet scams, telemarketing fraud, fraud targeting senior citizens, and advance fee schemes. It describes common tactics used in phone scams, Nigerian letter fraud, impersonation/identity fraud, and advance fee schemes. The document encourages vigilance and provides tips to avoid becoming a victim, such as being wary of pressure sales tactics, never sending money to unknown persons or charities without research, and reconciling bank accounts monthly.
As India braces for a future of digital payments, how secure is your account from payment frauds? Here is a list of such frauds that you must watch out for!
1. The document discusses various cyber crimes and scams, including receiving fake calls pretending to be from banks, receiving lottery or job scams requiring deposits, matrimonial frauds, and fake mobile tower or insurance agent calls.
2. It warns not to share personal information like bank or ID details with strangers or deposits money in specified accounts in response to such calls or proposals.
3. Frequent password changes and caution is advised when using ATMs, debit cards, and social media to avoid being targeted by cyber criminals.
The document discusses the lottery scam, also known as the Jamaican lottery scam or 876 area code scam. It begins with victims receiving unsolicited notifications that they have won a large prize or lottery. Scammers then demand money for fees like taxes or shipping before the victim can receive their winnings. The scammers prefer payment through money transfer services like Western Union or Green Dot cards. Victims never receive any winnings and are often targeted by additional scams after being initially victimized. The lottery scam is estimated to generate $300 million annually and is linked to hundreds of murders in Jamaica where many of the scams originate from.
This document discusses fraud targeting seniors and identifies common scams. It notes that identity theft is the fastest growing crime in North America, affecting 1 in 6 Canadians. Seniors are particularly vulnerable targets for fraudsters seeking savings and personal information. Common scams outlined include grandparent scams, lottery scams, and fraudulent impersonations of bank inspectors or CRA officials seeking sensitive details. The document provides tips for protecting personal information and reporting fraud.
A Real Person will travel, on your behalf, to validate an item, property or person's existence by completing a personalized report including current photos, videos and more. Includes preventative measures that will assist you in being informed prior to entering into transactions over
the Internet.
The document provides information about common scams targeting students, including dating, housing, job, and immigration scams. It describes signs that may indicate a scam, such as requests for money or personal information without meeting in person. The document advises students to be wary of unsolicited messages, offers that seem too good to be true, and provides contact information for authorities to report scams.
The document provides information about various types of scams and fraud, including local scams, investment scams, internet scams, telemarketing fraud, fraud targeting senior citizens, and advance fee schemes. It describes common tactics used in phone scams, Nigerian letter fraud, impersonation/identity fraud, and advance fee schemes. The document encourages vigilance and provides tips to avoid becoming a victim, such as being wary of pressure sales tactics, never sending money to unknown persons or charities without research, and reconciling bank accounts monthly.
As India braces for a future of digital payments, how secure is your account from payment frauds? Here is a list of such frauds that you must watch out for!
1. The document discusses various cyber crimes and scams, including receiving fake calls pretending to be from banks, receiving lottery or job scams requiring deposits, matrimonial frauds, and fake mobile tower or insurance agent calls.
2. It warns not to share personal information like bank or ID details with strangers or deposits money in specified accounts in response to such calls or proposals.
3. Frequent password changes and caution is advised when using ATMs, debit cards, and social media to avoid being targeted by cyber criminals.
The document discusses the lottery scam, also known as the Jamaican lottery scam or 876 area code scam. It begins with victims receiving unsolicited notifications that they have won a large prize or lottery. Scammers then demand money for fees like taxes or shipping before the victim can receive their winnings. The scammers prefer payment through money transfer services like Western Union or Green Dot cards. Victims never receive any winnings and are often targeted by additional scams after being initially victimized. The lottery scam is estimated to generate $300 million annually and is linked to hundreds of murders in Jamaica where many of the scams originate from.
This document discusses fraud targeting seniors and identifies common scams. It notes that identity theft is the fastest growing crime in North America, affecting 1 in 6 Canadians. Seniors are particularly vulnerable targets for fraudsters seeking savings and personal information. Common scams outlined include grandparent scams, lottery scams, and fraudulent impersonations of bank inspectors or CRA officials seeking sensitive details. The document provides tips for protecting personal information and reporting fraud.
A Real Person will travel, on your behalf, to validate an item, property or person's existence by completing a personalized report including current photos, videos and more. Includes preventative measures that will assist you in being informed prior to entering into transactions over
the Internet.
The document provides information about common scams targeting students, including dating, housing, job, and immigration scams. It describes signs that may indicate a scam, such as requests for money or personal information without meeting in person. The document advises students to be wary of unsolicited messages, offers that seem too good to be true, and provides contact information for authorities to report scams.
Louise hunt.com-faceless fraudsters 5 helpful tips (1)Louise Hunt
We don’t know these fraudsters, these faceless people with no name or shame. What we do know is: they want our money. £7 in every £10 of attempted fraud is being stopped. Fraud is big business and if the figures tell us one thing – We need to be more vigilant than ever.
This document provides tips to avoid foreclosure scams. It warns that scam artists may appear legitimate and helpful but will often ask for money upfront without providing services or make unrealistic promises. Key signs of a potential scam include lack of credentials, pressure to act quickly without review, requests to sign incomplete documents or engage in improper behavior. Staying informed about the foreclosure process and asking questions can help avoid being victimized.
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
The document provides information on various fraud and identity theft topics, including how to protect yourself from common scams. It discusses signs of identity theft, how criminals obtain personal information, and what to do if you are a victim. Tips are given on safeguarding information online and over the phone, checking credit reports, and reporting identity theft. Resources for more information from organizations like the FTC are also listed.
Phishing is a form of identity theft where criminals try to trick people into providing sensitive information like bank account numbers or passwords by pretending to be from a legitimate institution. It usually comes in the form of emails that appear authentic but contain spelling errors or links that don't go where promised. If you receive a suspicious email, don't provide any information or click on links. Instead, contact the institution directly. If you do become a victim, contact the institution where information was given and consider changing passwords.
Financial exploitation of vulnerable adults, particularly elders, is a widespread problem. It can take many forms, such as misappropriating assets, charging excessive fees, fraud, or scams. Perpetrators are often acquaintances or relatives of the victim and exploit their trust. Reported cases represent only a fraction of the actual number, as many cases likely go unreported. It is important for elders to protect their personal information and be wary of giving money or property to anyone without proper legal protections.
This document discusses bank frauds and money laundering. It defines fraud as a deliberate act that results in wrongful gain. The main types of frauds are liability frauds, card frauds, internal frauds, and asset frauds. Liability frauds include account opening and cheque frauds. Card frauds involve lost, stolen or cloned cards. Internal frauds involve staff sharing customer information or funds. Asset frauds require customers to be vigilant when taking loans. Money laundering is disguising illegally obtained money to appear legitimate. Suspicious transactions that seem complex, lack economic purpose or could finance terrorism must be reported. Preventing fraud requires vigilance, policy compliance and monitoring suspicious activities.
The document discusses identity theft and provides tips to prevent it. It describes how identity thieves obtain personal information to fraudulently use victims' credit cards, bank accounts, loans, and more. It advises people to be cautious sharing information, check financial records regularly, request credit reports periodically, and maintain financial records. Victims are generally only liable for $50 if reported within two days, and the document provides reassurance and steps for addressing identity theft.
The document discusses common fraud schemes and how to avoid becoming a victim. It covers telemarketing fraud, advanced fee schemes like Nigerian letter scams and lottery scams, work from home scams, and romance scams. The key advice is to be skeptical of unsolicited offers, never send money or personal information to strangers, research companies independently, and talk to a trusted advisor before engaging in any financial activities with unknown parties.
Common identity theft scams include lottery scams, bogus charity scams, and phishing scams. Hackers can also steal personal information through pharming and by obtaining dumpster-dived documents, stolen mail, or public records. Stolen identities may be used to open new accounts, make purchases, or commit crimes. It is important to protect personal information by shredding documents, using secure websites, and reviewing credit reports regularly. If identity theft occurs, actions should be taken such as filing a police report and placing fraud alerts on credit reports.
The document discusses credit card fraud and provides tips to help consumers protect themselves. It covers types of fraud like unauthorized charges, counterfeit cards, identity theft, dumpster diving, skimming, and phishing. It recommends securing credit cards and account information, monitoring statements for unauthorized activity, and promptly reporting any fraud. Steps are outlined for disputing charges and information is provided about resources for consumer assistance.
Phishing is a technique where hackers send fake emails or messages prompting users to click links and enter personal information on mock websites, stealing passwords and credit card numbers. To prevent phishing, users should think before clicking links, install anti-phishing tools, regularly check accounts, and never give out private details to unknown parties online or in messages.
The document describes how ATM thieves are able to steal cards and PIN numbers using a "trap" placed inside the ATM card slot. The trap is made of x-ray film and has slits cut into it to capture cards. A thief puts the trap in the slot while pretending to make a transaction. When the next victim inserts their card, it gets stuck in the trap. An accomplice then pretends to help the victim, tricking them into providing their PIN number. With the card and PIN, the thieves are able to withdraw money from the account.
The document describes how ATM thieves are able to steal cards and PIN numbers using a "trap" placed inside the ATM card slot. The trap is made of x-ray film and has slits cut into it to capture cards. A thief puts the trap in the slot while pretending to make a transaction. When the next victim inserts their card, it is confiscated in the trap. An accomplice then poses as a good Samaritan to trick the victim into providing their PIN, allowing the thieves to steal money from the account. After the coast is clear, the thief returns to retrieve the trapped card and any stolen funds.
Phishing involves deceiving users into providing sensitive information such as passwords or credit card details by sending fraudulent emails appearing to come from legitimate sources. These emails contain links directing users to spoofed websites that mimic real websites to steal information. SIM swapping, or SIM swopping, is a related fraud where criminals contact mobile providers pretending to be the user to transfer their phone number to a new SIM card, intercepting account login notifications. Users should be wary of unsolicited requests for information and ensure their devices and accounts have strong security protections in place.
Be alert for two recent scams revolving around the payment of utility bills. This alert from David Lerner Associates has the details of what to watch for.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Safety4you Escrow Frauds - Pre & Post Transaction InvestigationAnshu Sharma
Safety4you brings personalized cyber protections for individuals and businesses. Scan the QR code and reach out and message your needs for Pre & Post verification and investigation services.
This document provides information to Niagara College students about common scams and fraud, how to identify them, and how to report scams. It describes various types of scams like telemarketing scams, online scams, housing scams, job scams, dating scams, and immigration fraud. It provides tips for identifying scams and warns students not to provide personal information or send money in response to suspicious requests. Students are advised to contact their Student Advisor or local authorities if they feel they have been scammed or want to report a scam.
This presentation will look at the different kinds of frauds and scams prevalent in our society today. We will show you how to identify them. We will give you some advice on how to avoid them. And we will show you what to do if you are the victim of one of these crimes.
Louise hunt.com-faceless fraudsters 5 helpful tips (1)Louise Hunt
We don’t know these fraudsters, these faceless people with no name or shame. What we do know is: they want our money. £7 in every £10 of attempted fraud is being stopped. Fraud is big business and if the figures tell us one thing – We need to be more vigilant than ever.
This document provides tips to avoid foreclosure scams. It warns that scam artists may appear legitimate and helpful but will often ask for money upfront without providing services or make unrealistic promises. Key signs of a potential scam include lack of credentials, pressure to act quickly without review, requests to sign incomplete documents or engage in improper behavior. Staying informed about the foreclosure process and asking questions can help avoid being victimized.
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
The document provides information on various fraud and identity theft topics, including how to protect yourself from common scams. It discusses signs of identity theft, how criminals obtain personal information, and what to do if you are a victim. Tips are given on safeguarding information online and over the phone, checking credit reports, and reporting identity theft. Resources for more information from organizations like the FTC are also listed.
Phishing is a form of identity theft where criminals try to trick people into providing sensitive information like bank account numbers or passwords by pretending to be from a legitimate institution. It usually comes in the form of emails that appear authentic but contain spelling errors or links that don't go where promised. If you receive a suspicious email, don't provide any information or click on links. Instead, contact the institution directly. If you do become a victim, contact the institution where information was given and consider changing passwords.
Financial exploitation of vulnerable adults, particularly elders, is a widespread problem. It can take many forms, such as misappropriating assets, charging excessive fees, fraud, or scams. Perpetrators are often acquaintances or relatives of the victim and exploit their trust. Reported cases represent only a fraction of the actual number, as many cases likely go unreported. It is important for elders to protect their personal information and be wary of giving money or property to anyone without proper legal protections.
This document discusses bank frauds and money laundering. It defines fraud as a deliberate act that results in wrongful gain. The main types of frauds are liability frauds, card frauds, internal frauds, and asset frauds. Liability frauds include account opening and cheque frauds. Card frauds involve lost, stolen or cloned cards. Internal frauds involve staff sharing customer information or funds. Asset frauds require customers to be vigilant when taking loans. Money laundering is disguising illegally obtained money to appear legitimate. Suspicious transactions that seem complex, lack economic purpose or could finance terrorism must be reported. Preventing fraud requires vigilance, policy compliance and monitoring suspicious activities.
The document discusses identity theft and provides tips to prevent it. It describes how identity thieves obtain personal information to fraudulently use victims' credit cards, bank accounts, loans, and more. It advises people to be cautious sharing information, check financial records regularly, request credit reports periodically, and maintain financial records. Victims are generally only liable for $50 if reported within two days, and the document provides reassurance and steps for addressing identity theft.
The document discusses common fraud schemes and how to avoid becoming a victim. It covers telemarketing fraud, advanced fee schemes like Nigerian letter scams and lottery scams, work from home scams, and romance scams. The key advice is to be skeptical of unsolicited offers, never send money or personal information to strangers, research companies independently, and talk to a trusted advisor before engaging in any financial activities with unknown parties.
Common identity theft scams include lottery scams, bogus charity scams, and phishing scams. Hackers can also steal personal information through pharming and by obtaining dumpster-dived documents, stolen mail, or public records. Stolen identities may be used to open new accounts, make purchases, or commit crimes. It is important to protect personal information by shredding documents, using secure websites, and reviewing credit reports regularly. If identity theft occurs, actions should be taken such as filing a police report and placing fraud alerts on credit reports.
The document discusses credit card fraud and provides tips to help consumers protect themselves. It covers types of fraud like unauthorized charges, counterfeit cards, identity theft, dumpster diving, skimming, and phishing. It recommends securing credit cards and account information, monitoring statements for unauthorized activity, and promptly reporting any fraud. Steps are outlined for disputing charges and information is provided about resources for consumer assistance.
Phishing is a technique where hackers send fake emails or messages prompting users to click links and enter personal information on mock websites, stealing passwords and credit card numbers. To prevent phishing, users should think before clicking links, install anti-phishing tools, regularly check accounts, and never give out private details to unknown parties online or in messages.
The document describes how ATM thieves are able to steal cards and PIN numbers using a "trap" placed inside the ATM card slot. The trap is made of x-ray film and has slits cut into it to capture cards. A thief puts the trap in the slot while pretending to make a transaction. When the next victim inserts their card, it gets stuck in the trap. An accomplice then pretends to help the victim, tricking them into providing their PIN number. With the card and PIN, the thieves are able to withdraw money from the account.
The document describes how ATM thieves are able to steal cards and PIN numbers using a "trap" placed inside the ATM card slot. The trap is made of x-ray film and has slits cut into it to capture cards. A thief puts the trap in the slot while pretending to make a transaction. When the next victim inserts their card, it is confiscated in the trap. An accomplice then poses as a good Samaritan to trick the victim into providing their PIN, allowing the thieves to steal money from the account. After the coast is clear, the thief returns to retrieve the trapped card and any stolen funds.
Phishing involves deceiving users into providing sensitive information such as passwords or credit card details by sending fraudulent emails appearing to come from legitimate sources. These emails contain links directing users to spoofed websites that mimic real websites to steal information. SIM swapping, or SIM swopping, is a related fraud where criminals contact mobile providers pretending to be the user to transfer their phone number to a new SIM card, intercepting account login notifications. Users should be wary of unsolicited requests for information and ensure their devices and accounts have strong security protections in place.
Be alert for two recent scams revolving around the payment of utility bills. This alert from David Lerner Associates has the details of what to watch for.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Safety4you Escrow Frauds - Pre & Post Transaction InvestigationAnshu Sharma
Safety4you brings personalized cyber protections for individuals and businesses. Scan the QR code and reach out and message your needs for Pre & Post verification and investigation services.
This document provides information to Niagara College students about common scams and fraud, how to identify them, and how to report scams. It describes various types of scams like telemarketing scams, online scams, housing scams, job scams, dating scams, and immigration fraud. It provides tips for identifying scams and warns students not to provide personal information or send money in response to suspicious requests. Students are advised to contact their Student Advisor or local authorities if they feel they have been scammed or want to report a scam.
This presentation will look at the different kinds of frauds and scams prevalent in our society today. We will show you how to identify them. We will give you some advice on how to avoid them. And we will show you what to do if you are the victim of one of these crimes.
Anyone conducting online transactions runs a risk of being defrauded. This article outlines specific things you can look out for and steps you can take to minimize that risk.
Over 40% of businesses in the UK have experienced fraud in the last year.
This practical guide gives you the information you need to help protect your business against growing threats of fraud.
We show you how and where fraud can take place throughout your business and highlight the "telltale" things to look out for.
We’ve also included key actions you should take to safeguard yourself and your business.
Taking some very basic steps can make a real difference to fraudsters’ success rates.
Whether you are a client of not I do hope that this guide helps business avoid being another statistic of crime this year.
Identity Theft nigerian fraud cross border fraudMatt Smith
This document provides information on various types of identity theft and fraud, including how they work and how to protect yourself. It discusses how criminals obtain personal information through business records, mail theft, phishing, and other means. Specific examples are given of large data breaches at TJX and Heartland Payment Systems that exposed millions of credit card numbers. The document also covers Nigerian fraud scams, cross-border telephone fraud, and recommends precautions like shredding documents, using strong passwords, and being wary of unsolicited calls or emails requesting personal information or money transfers.
This document discusses various types of internet scams and fraud. It describes common scams like Nigerian 419 scams, work from home scams, romance scams, and malware scams disguised as important notifications. It provides tips on how to recognize these scams and advises readers not to provide personal information or money to potential scammers. The document also discusses psychological tricks scammers use and strategies to protect yourself from various internet and phone-based scams.
Online Scams: How To Avoid Getting Fooledlmccorkell
Beware of online scams that try to steal your personal or financial information. Common scams include emails pretending to be from your bank asking you to sign in or update your account information, messages claiming you will receive money from a deceased wealthy person if you provide your details, and schemes promising quick money but that actually steal funds from your bank account once access is granted. To stay safe, do not click links or provide information in unsolicited emails, and only conduct financial business by navigating directly to official websites or searching from your browser.
7 tips to prevent yourself from becoming a victim of Cyber Attackskanika sharma
The document provides 7 tips to prevent falling victim to online scams: 1) Be wary of lotteries promising large rewards and donations to unknown charity organizations. 2) Avoid quick profit investment plans and fake job offers that ask for personal information. 3) Take security precautions like not disclosing financial details when shopping online or looking for dates. 4) Never share passwords or private details with unknown parties contacting you. Following these tips can help protect against revealing private information to scammers online.
This document from the Lucas County Auditor's office provides consumer information and tips about gas pump skimming scams. It warns that thieves can install small electronic devices known as "skimmers" at gas pumps to steal credit and debit card information. It advises consumers to monitor their bank statements for fraudulent charges, use credit instead of debit cards when fueling, and inspect pumps for any signs of tampering. The office also trains weights and measures inspectors to look for skimmers during gas station inspections but advises that consumers should also be vigilant to avoid becoming victims.
1. The document provides tips on how to prevent identity theft, including not letting credit cards out of sight during purchases, shredding pre-approved loan applications, checking bank statements as soon as they arrive, and ordering a credit report at least once a year.
2. It recommends not carrying birth certificates or social security cards, using drive-thru ATMs or those in well-lit areas, not writing PIN numbers on cards, and not giving out personal information over the phone.
3. If identity theft is suspected, the document advises to contact the police, credit card companies, bank, and credit bureaus immediately to place fraud alerts.
The presentation is aimed at the elderly (especially those living independently & alone) their carers and aged care staff. It shows how to identify some of the treacherous scams that are targeting senior members of our community, how to avoid scams and what to do if they or someone they know is scammed.
Identity theft occurs when a criminal uses someone else's personal information like name, SSN, or credit card numbers without permission to commit fraud. Thieves can steal information directly by taking wallets, mail, or online data, or indirectly through dumpster diving or changing addresses. Victims should contact credit bureaus, close fraudulent accounts, file a police report, and get more information from the FTC website or brochures. Steps to reduce risk include using passwords, securing personal data, being wary of sharing information, and properly disposing of documents with financial information.
This document provides information on how to protect yourself from identity theft. It discusses how identity theft occurs through stealing personal information from wallets, mail, trash, or online. It outlines steps to take if you become a victim, such as filing a police report and fraud alert. The document stresses the importance of being vigilant with personal information and reviewing credit reports regularly to catch suspicious activity early. Identity theft is a serious crime that can have long lasting impacts, so protecting personal data and responding quickly to suspected theft is key to minimizing harm.
This document summarizes various holiday scams and provides tips to avoid them. It discusses charity scams, telemarketing scams, job and investment scams, travel scams, romance scams, and social media scams. Key tips include donating only to known charities, hanging up on unsolicited calls, verifying job offers, avoiding too good to be true travel deals, being wary of new romantic partners online, and protecting personal information on social media. The document also provides advice on what to do if you think you've been scammed, such as reporting it, contacting your bank or credit card company, and monitoring your credit.
This document summarizes various holiday scams and provides tips to avoid them. It discusses charity scams, telemarketing scams, job and investment scams, travel scams, romance scams, and social media scams. Key advice includes donating only to known charities, hanging up on unsolicited calls, verifying job offers, avoiding too-good-to-be-true deals, using credit cards for travel, and locking down social media privacy settings. The document also provides resources for reporting scams and monitoring credit in case of fraud.
Identity theft involves someone using personal information like Social Security numbers and bank account details to commit fraud. Common types of identity theft are credit card fraud, phone or utility fraud, and bank fraud. If you become a victim, you should file a police report, contact the credit bureaus to place a fraud alert on your accounts, and contact any creditors where fraudulent activity occurred. To reduce risk, be careful with personal information and shred documents with private details before throwing them away.
Fraud takes many forms and costs hundreds of millions annually. Common internet frauds described include Nigerian scams, fake foreign lotteries, work-at-home scams, sweepstakes scams, and spoofing/phishing. To avoid becoming a victim, the document recommends not responding to unsolicited emails, researching offers thoroughly, being wary of requests for personal information, and consulting friends before making financial decisions. Basic security practices and awareness of common schemes can help reduce fraud risks, and victims should report crimes to the appropriate law enforcement.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
1. Fraud Awareness
ATM’S
CARD FRAUD AND SKIMMING
CHEQUE FRAUD
DEPOSIT SLIP SCAMS
IDENTITY THEFT
MONEY LAUNDERING
CELLPHONE BANKING
419 SCAM
CHANGE OF BANKING ACCOUNT DETAILS SCAM
MANY PEOPLE ARE OFTEN USED FOR MONEY LAUNDERING
PURPOSES BY CRIMINALS WITHOUT EVEN BEING AWARE OF THEIR
CIRCUMSTANCES. THE FOLLOWING IS WHAT YOU CAN DO TO
SAFEGUARD YOURSELF FROM BEING INVOLVED IN A SERIOUS
CRIMINAL OFFENCE.
DON’TS
• Do not open a bank account on behalf of another person in your name,
irrespective of the circumstances.
• Do not allow your account to be used directly by another person to
deposit and transfer/withdraw funds.
• Do not accept the proceeds of crime for goods or services rendered.
• If you suspect that the money you are paid may be from the proceeds of
crime, immediately report this matter to the police.
MONEY
LAUNDERING
SABRIC (NPC)
Company Reg No: 2002/017376/08
90 Bekker Street cnr Allandale Road
SABRIC House Hertford Office Park
Vorna Valley, Midrand
1685
Tel: 011 847 3000
www.sabric.co.za
2. DO’S
• If you think the ATM is faulty cancel the transaction IMMEDIATELY, report
the fault to your Bank and try another ATM to transact.
• Have your card ready in your hand before you approach the ATM to
avoid opening your purse, bag or wallet while in the queue.
• Be cautious of strangers offering to help as they could be trying to
distract you in order to get your card or PIN details.
• Follow the instructions on the ATM screen carefully.
• Report suspicious items or people around ATMs.
• Choose familiar and well-lit ATMs where you are visible and safe. Report
any concerns regarding the ATM to the Bank. Toll free numbers are
displayed on all ATMs.
• Be alert to your surroundings. Do not use the ATM if there are loiterers or
suspicious people in the vicinity. Also take note that fraudsters are often
well dressed, well spoken and respectable looking individuals.
• If you are disturbed or interfered with, whilst transacting at the ATM,
your card may be skimmed, by being removed and replaced back into
the ATM without your knowledge. Do not continue with the transaction.
Immediately report the incident using your Banks Stop Card Toll free
number which is displayed on all ATM’s, as well as on the back of your
bank card.
• Should you have been disturbed whilst transacting, immediately change
your PIN number or stop the card, to protect yourself from any illegal
transactions occurring on your account.
• Know what your ATM looks like so that you are able to identify any foreign
objects attached to it.
DON’TS
• Do not ask anyone to assist you with your ATM transaction, not even the
security guarding the ATM or a bank official. Rather go inside the bank
for help.
• Never force your card into the slot as it might have been tampered with.
• Do not insert your card if the screen layout is not familiar to you. (E.g.
if you are requested to enter a 10 digit PIN Number, or an unknown
language is displaying the prompts).
• Don’t use ATMs where the card slot, key pad or screen has been
tampered with. It could be an attempt to get hold of your card
ATM’s
Page 1 Fraud Awareness
Fraud Awareness Page 14
How do you detect a 419 Scam?
Become familiar with the general trends of a 419 letter , which normally
includes one or more of the following:
• Contract funds over-invoiced and a request for you to be the front
person for the exchange of funds to your account. Usually coordinated
by someone posing as a Board Member, providing oversight for the
business industry or some other business concern.
• Cash inherited by a relative, left in a storage company and the daily
storage fees are mounting. Also, if the storage company knows the
contents of the box, the family will never see it again. Usually sent by a
Prince, Chief, wife or son of a well-known military figure.
• A request to pose as the “next of kin” in order to accept money that has
been left in a bank for years. Usually sent by a person posing as a bank
manager or bank official.
• You are advised that you won the Lottery, even though you have never
even entered such a Lottery.
• You can also detect a 419 scam by learning to recognize common signs.
Spoof websites and e-mail scams often have spelling errors, grammatical
errors or use all caps and other non-standard language.
• In some cases, anti-money laundering and tax clearance certificates are
attached to the letter to create a feeling of authenticity.
What should you do when you receive a 419 Scam?
• If you receive a scam e-mail, do not reply. You can however forward a
copy of the e-mail to the Internet Service Provider from where the e-mail
originated. For example:- abuse@hotmail.com; abuse@yahoo.com;
abuse@compuserve.com etc.
• Forward the e-mail to the South African Police Services at 419scam@
saps.org.za.
This is a scam used by syndicates to defraud clients by depositing fictitious
funds into their accounts, and requesting refunds.
The client will be notified of the incorrect deposit by means of a letter. The
letter is sometimes followed by a phone call to confirm receipt of the letter.
How do you protect yourself?
• NEVER reimburse any money until you have verified with your branch,
what type of deposit you have received.
• Report the matter to your Bank immediately.
• If the fraudster insists on a refund, advise him/her
to facilitate this refund through the bank. The
fraudster will more than likely refrain
from approaching the bank for
the refund.
DEPOSIT REFUND
SCAM
3. TIPS ON PROTECTING YOUR PIN
• Your PIN is your personal key to secure banking and it is crucial to
keep it that way.
• Memorise your PIN, never write it down or share it with anyone, not
even with your family member or a bank official.
• Choose a PIN that will not be easily guessed. It is suggested not to use
you date of birth as a PIN Number.
• Memorise your PIN, never write it down or share it, and key it in
personally in such a way that no one else can see it e.g. cover your
PIN when punching the numbers even when alone at the ATM as
some criminals may place secret cameras to observe your PIN.
• Don’t let anyone stand too close to you in order to keep both your
card and PIN safe.
TIPS ON PROTECTING YOUR CASH
• Some fraudsters wait until you’ve drawn your cash to take advantage.
Be wary of people loitering around the ATM and be careful you are not
followed.
• Take your time to complete your transaction and secure your card and
your cash in your wallet, handbag or pocket before leaving the ATM.
• Set a daily withdrawal limit that suits your needs (the default amount
is set at R1000.00), to protect yourself in an event that your card and
PIN are compromised.
• Check your balance regularly and report discrepancies IMMEDIATELY
• Avoid withdrawing cash to pay for goods/services as your Debit Card
can be used for these transactions. You are able to use your Debit
Card wherever the Maestro/Visa Electron logo is displayed.
• After you completed your transaction successfully, leave the ATM
area immediately. Be cautious of strangers requesting you to return to
the ATM to finalise/close the transaction because they are unable to
transact. Skimming may occur during this request.
TELEPHONE NUMBERS FOR REPORTING ATM
RELATED INCIDENTS
ABSA 0800 111 155
AFRICAN BANK 0861 000 555
ALBARAKA BANK
BANK OF ATHENS 011 833 2117
BIDVEST BANK 0860 111 177
CAPITEC BANK 0860 102 043
CITI BANK
FNB 0800 110 132
INVESTEC BANK 011 286 9663
MERCANTILE BANK 0860 119 925
NEDBANK 0800 110 929
STANDARD BANK 0800 020 600
SA POST OFFICE (POST BANK) 0800 535 455
Page 13 Fraud Awareness
Fraud Awareness Page 2
Typical 419 Scam letter
Good Day.
I am a Murder Agent and I have no other job than to kill to survive. You are
about to be betrayed by someone you know and close to you. The person
payed us to kill you. I don’t know what you have done to this person because
the person is so desperate and wants you dead.
Right now your life is at risk, you have just 10 days to live after that me and
my men shall come for your life, presently my men are around your house
right now monitoring your movement and if you do anything stupid you
shall receive a gun shot. This same person also provided us your names,
photograph and other necessary information we needed about you.
If you are in doubt with this I will send you name and where you are residing
in my next mail. I felt very sorry and bad for you that is the main reason why
i decided to contact you quickly that your life is at risk and about to end like
this if you don’t comply, I can help you if you will show appreciation and I can
also tell you who ordered us to kill you, already I have instruct my men to stop
for a while and not to strike immediately because I just felt something good
and sympathetic about you. I decided to contact you first and know why
somebody will want you dead by all means.
Now do you want to LIVE OR DIE? It is up to you. Get back to me as soon
as possible.
General trademarks of a 419 Scam
• The amount of money involved is always substantial, usually millions of
dollars or pounds.
• Letters are generally sent by someone claiming to be in a position of
authority, such as a Government Official, Prince, Chief, Doctor, or the
wife of a General, Barrister, Solicitor, Lawyer or Bank Official.
• They may use emotional bribery, such as claiming someone has died or
is suffering from an illness.
• The impression is given that you alone have been contacted, but the
reality is that the same e-mail/letter/sms/fax was sent to thousands of
people.
• You are always promised either all, or a substantial percentage, of the
money in return for assisting the fraudster in some way.
• You will almost certainly be asked to communicate by e-mail.
4. IMPORTANT TIPS TO AVOID CARD FRAUD
• Review your account statements on a timely basis; query disputed
transactions with your Bank immediately.
• When shopping online, only place orders with your card on a secure
website.
• Do not send e-mails that quote your card number and expiry date.
• Ensure that you get your own card back after every purchase.
• Never write down your PIN or disclose it to anyone.
• Report lost and stolen cards immediately.
• Destroy your credit card receipts before discarding it.
• Never let the card out of your sight when making payments.
• Sign your card on the signature panel as soon as you receive it to stop
anyone else from taking ownership or trying to use it.
• Your credit card is not transferable. Only the person whose name appears
on the front of the card is authorised to use it. This is the same with your
debit cards, even though they don’t contain your name on the front of the
card.
• If you have a debit card, cheque card and credit card, don’t choose the
same PIN for them all, so that if you lose one, the others will still be safe.
• Chip Credit cards also require a PIN for transactions at points of sale
(paying for goods/services).
• Protect your cards as if they were cash. Never let them out of your sight
and ensure that you get them back after every purchase.
• Always check transaction slips for correct purchase amounts before you
sign them.
• Keep your transaction slips and check them against your statement to
spot any suspicious transactions and query them immediately.
• Make a list of all your cards and their numbers and store it in a safe place.
• While transacting always keep an eye on the ATM Card slot to ensure
that your card is not taken out, skimmed and replaced without your
knowledge.
• Should your card be retained by an ATM, contact your Bank and block
your card before you leave the ATM.
• Subscribe to your Banks SMS notification services; this will inform you of
any transactional activity on your account.
THIS IS A SAMPLE OF A
SKIMMING DEVICE, BUT
THERE ARE MANY OTHER
VARIATIONS.
Page 3 Fraud Awareness
CARD FRAUD
Fraud Awareness Page 12
What can you do as a victim of this type of fraud?
• Once you are a victim of this type of fraud then it is always prudent to first
notify the Police.
• You can also commence a civil recovery of these monies against the
fraudster. It may also be necessary to use tracing proceedings to trace
the identity of the fraudsters or even freezing injunctions to freeze their
assets of the fraudsters.
• Finally, check with your insurer to see if it is an insurable loss.
Please remember that electronic payments are made based on the account
number only. Any account name given is not routinely checked as part of the
automated payment process. This is the same for all South African Banks.
It is the responsibility of you to ensure the account details being used are
correct, by conducting an independent verification.
What is a 419 Scam?
A letter/fax/e-mail is sent to a selected recipient (but in actual fact is sent
to many recipients) making an offer that would result in a large pay off for
the recipient (“victim”). The details vary and large amounts of money are
usually involved. Whilst a vast majority of recipients do not respond to
these requests, a very small percentage does, enough to make the fraud
worthwhile. Invariably, the victims’ banking details as well as sums of
money are said to be required in advance in order to facilitate the payment
of the funds. Essentially, the promised money transfer never happens and
in addition the fraudsters may use the victims’ banking details to withdraw
money for themselves.
Some indications that this could be a 419 Scam:
• Letter/e- mail/fax that sounds too good to be true.
• The promise of large sums of money for little or no effort on your part.
• The victim is requested to provide money upfront as a processing/
administration fee.
• The request usually contains a sense of urgency.
• The victim does not know the person who has sent the letter/fax/e- mail.
• The sender at times requests confidentiality.
• The letter usually states that the victim has won a prize/lottery/
inheritance.
• Payments are requested to be made by moneygram.
• Genuine companies’ letterheads are utilised to convince the victim of the
authenticity of their request.
419 SCAM
5. TIPS TO AVOID CARD FRAUD:
MERCHANTS
• Hold the card until the transaction is completed.
• Ensure that the card security features are present.
• Compare the cardholder’s signature on the card to that on the sales
voucher.
• Phone for authorisation if requested to do so by the point of sale device.
• Make an imprint of the card in the case of a manual transaction.
LOOK OUT FOR
• Check the payee, amount in words and figures carefully for alterations.
• Be on the lookout for stamps that are placed over areas that could
conceal alterations.
• Cheques issued in black Koki pens should raise suspicion.
• Spelling mistakes on the printed areas of the cheques such as the
drawer’s details and the Bank Branch name.
• Tampering on the MICR Code line – black shaded areas.
• Be suspicious if the cheque appears faded, as chemicals could have
been used to remove information
• Typed cheques.
• Shaky signatures could indicate that the signature was traced.
• Treat typed or pre-issued cheques with caution.
CHEQUE FRAUD
There are a number of things that you can do to protect yourself against
cheque fraud.
• Write your cheque in such a way that it is difficult to alter.
• Write clearly and neatly using a non-erasable ballpoint pen. The type of
pen you use makes a difference. Most ballpoint and marker inks are dye
based, meaning that the pigments are dissolved in the ink. But, based
on ink security studies, gel pens, like the Uniball 207 uses gel ink that
contains tiny particles of colour that are trapped into the paper, making
cheque washing a lot more difficult.
• Write the full names of the payee and spell them correctly. Avoid the use
of abbreviations.
• Do not make any corrections to the cheque as alterations in any form will
not be allowed on the cheque except for where the words “bearer/
order” has been ruled through. It is best to cancel it and
write out another one.
• Don’t leave large spaces between words and
draw a line through any unused space
to ensure that nothing can be
added to the cheque.
Page 11 Fraud Awareness
Fraud Awareness Page 4
CHEQUE FRAUD
How can you prevent becoming a victim of this type of fraud?
There are a number of basic steps that can make it extremely difficult for your
company to become a victim of this type of fraud. Below we set out some
measures that you and your staff should consider employing to ensure that
you do not become a victim:
• Maintain a good relationship with existing suppliers.
• Know your contacts and be able to liaise with them.
• Always be wary of changing account details. If a request is received,
confirm in writing and by telephone to the supplier.
• If talking to this ‘supplier’ on the telephone beforehand, they may ask
about when you last sent payments to them, looking to see if you are still
an active client. Again, ask to speak to contacts that you recognise and
if necessary ask your contact to call you back.
• Confirm notifications for any changes of banking details via official
correspondence with your suppliers (such as a letter) using their contact
details that you have in your database, preferably before processing the
next payment.
• Beware of supposedly confirmatory e-mails from almost identical e-mail
addresses, such as .com instead of .co.za, or addresses that differ from
the genuine one by perhaps one letter that can be easily missed.
• Instruct staff with the responsibility for paying invoices to scrutinize
invoices for irregularities and escalating suspicions to a known contact.
• It is essential to make sure that you are certain of the identity of the
person your business is dealing with at all times. Consider setting up
designated ‘Single Points of Contact’ with companies to which you
make regular payments.
• Ensure that your company’s private information is not disclosed to third
parties who are not entitled to receive it, or third parties whose identities
cannot be rightfully verified.
• Rather shred your business and suppliers invoices or any communication
material that may contain letterheads, than to discard in rubbish bins.
• Consider reviewing previous requests to change account details to
confirm whether they were genuine or not.
• To avoid your customers acting on an instruction purporting to be from
you, alert them to this type of fraud.
• Ensure that you confirm any change of banking details with someone
you usually deal with at the organisation before making any changes
to beneficiary accounts. When calling the organisation to confirm the
changes to banking details, use a number from the telephone directory
and not the number on the letterhead or fax, as you will in all likelihood
be calling the fraudster.
• Question whether well-known companies would change their banking
details without notifying people through more formal channels.
6. Page 5 Fraud Awareness
Fraud Awareness Page 10
• Write the amount of the cheque in the space immediately after ‘The
sum of’. According to the Bill of Exchange Act the amount in words will
be considered the correct amount if there is a difference between the
amount in words and figures.
• Write the amount in figures as close to the ‘R’ as possible.
• Fill in the correct date.
• Remember to sign your cheque.
What else can you do to keep your cheques safe?
• Keep your chequebook, cancelled cheques and statements safe.
• Never sign a blank cheque.
• Report lost or stolen cheques immediately.
• Provide your Bank with up-to-date signatures of everyone who is entitled
to sign cheques on your account.
• Check your statements every month and do reconciliation.
• It is safest to collect your new chequebook yourself.
The way you make your cheque payable can
protect you
• A ‘cash’ cheque is as good as money so it is not your safest option.
• Cheques where the words ‘Or Bearer’ are not crossed out are as good
as cash and can be cashed by anyone who presents it (even if it was
made out to a person or company). If you do not want the cheque
to be negotiated between various parties you can restrict negotiation
by adding the words “Not Transferable”. This in effect means that the
cheque may only be negotiated by the person/company whose name
appears on the beneficiary field.
• When a cheque is made out to a person or company and ‘Or Bearer’ is
crossed out, it is safer. However, the original payee can still sign the back
of the cheque and make it over to a third party.
How does crossing your cheque protect you?
• Two lines with or without the words ‘non-negotiable’ or ‘non-transferable’
written between them means the cheque cannot be cashed but has to
be deposited into a bank account.
• A crossing cannot be cancelled.
• ‘Non-transferable’ means it must be paid into the account of the person
or company whose name appears on the cheque.
• ‘Non-negotiable’ means it must be paid into a bank account but the
person to whom the cheque was originally made out to may transfer it to
a third party.
The mobility of your cellphone allows you to bank at any time from practically
anywhere. It is a safe way of doing your banking as it relies on encrypted SMS
messages or secure WAP connections. WAP uses similar security as that
used by Internet Banking.
Important Notes
• Memorise your PIN, never write it down or share it with anyone.
• Make sure no one can see you entering your PIN.
• Choose an unusual PIN that is hard to guess and change it often.
• Remember, for your own security you are required to re-enter your PIN
before each transaction.
• If you think your PIN has been compromised visit your nearest branch
and change it immediately.
• Protect your phone content and personal information you saved by using
a PIN or Password to access your phone. Do not leave your phone
unlocked.
• Do not respond to competition SMS’s or MMS’s.
• If you receive a phone call requesting personal information do not
respond and end the call.
• If you use a Smartphone, install an up-to-date anti-virus application to
your cellphone. Most banks provides this free of charge to its customers.
CHANGE OF BANKING DETAILS SCAM
How Does a Change of Banking Detail Scam happen?
The scam operates by the innocent recipient receiving an e-mail or letter
informing them that a particular supplier of theirs is changing their bank
account details. The correspondence will almost certainly include the details
of the new account. The letter/email will ask you to update your records
accordingly with the consequence that future payments will be made to this
account. The details are, of course, fraudulent with the consequence that
monies are paid to the fraudster and not the supplier.
Some of our clients have received telephone calls prior to receiving the
correspondence informing them of the change of details and that a letter
will follow. The telephone call will be used by the fraudster so that they can
ascertain:
• That they are sending the correspondence to the correct contact at
your company and ideally to elicit a contact name and reference.
• When you were last invoiced, to ensure that you still
actively use this service and to find out the likely
date of next payment.
• To use an excuse such as their
systems are down.
CELLPHONE BANKING
SCAMS
7. Page 9 Fraud Awareness
Fraud Awareness Page 6
• According to the Bill of Exchange Act section 81(3) the words “Not
Negotiable” give the drawer/issuer more protection with regard to
obtaining information relating to the deposit of such cheque.
It is not advisable to post a cheque
• If you must send it via post make sure cheques are crossed, marked
‘non-transferable’ and made payable to a specific person or company.
• Send cheques by registered mail and in good time to allow for delivery
delays.
• Staples or paperclips attaching a cheque to a letter are all tell-tale signs
for criminals.
• Avoid envelopes that are transparent or easy to open.
When accepting a cheque make sure that:
• It has not been altered.
• It isn’t post-dated.
• It is signed.
• There are no dirty marks on it.
• The same pen has been used throughout.
• The handwriting is the same on all parts of the cheque.
Be cautious when you notice the following on a
cheque:
• Several stamps that are placed over areas that could conceal alterations.
• Black Koki used to complete the cheque.
• Spelling mistakes on the printed areas such as the drawer’s details and
the Bank Branch name
• Tampering on the MICR Code line – black shaded areas.
• Faded areas, as chemicals could have been used to remove information.
• Shaky signatures which could indicate that the signature was traced.
• Typed or pre-issued cheques.
Important Notes
• When accepting a bank-guaranteed or bank-issued cheque, remember
that the issuer might give you this cheque, wait for you to release the
goods and then quickly cancel the cheque for a false reason.
• When accepting a cheque don’t release goods until the funds have been
paid into your account or request a special clearance from the bank on
the cheque deposit in question.
Is your own PC secure?
• Never do Internet Banking in public areas such as Internet Cafés, as
you never know what software is loaded that may compromise your
transactions.
• Make sure that no one has unauthorised access to your PC.
• Be especially aware that there are no security cameras trained on your
PC and keyboard.
• Make sure that the software loaded onto your PC is correctly licensed.
• Update your operating system and browser with the latest patches.
• Never open suspicious or unfamiliar e-mails or attachments as these
often contain harmful programs.
• Never click on links or attachments within suspicious e-mails.
• Prevent harmful software such as viruses, spyware & Trojans from
infecting your PC by:
- Having the latest anti-virus applications loaded on your PC. Most banks
provides this free of charge to their customers.
- Installing a personal firewall on your PC.
- Being aware of using infected storage devices (such as memory sticks
and portable hard drives).
- Browsing only, and downloading only, from trusted websites.
Are your credit, cheque and debit card details in
safe hands?
• Only make purchases with your credit card on reputable websites that
are verified as secure sites (look for the lock image on the toolbar).
• When receiving promotions or special deals via e-mail or telephone or
from online web-sites, if interested, always verify the validity of the source
before providing your personal and banking details for your account to
be debited.
• Do not send e-mails that contain personal information such as your card
number and expiry date.
• Protect your computer by installing and regularly updating quality
antivirus software.
• Install a spam blocker on your system. This will ensure that fraudsters
find it difficult to send you phishing e-mails.
• Never allow merchants web sites to save your personal and banking
details. When the option present itself, always remember to click No.
• Never save the Password and PIN on your desktop as it may allow
others to access your personal information without your permission.
• To ensure that you are using a secure shopping site, check for a picture
of a closed lock at the bottom of your screen. On the Web page where
you enter your credit card or other personal information, look for an‘s’
after ‘http: //’ in the Web address of that page – it should read: ‘https:
8. Page 7 Fraud Awareness
Fraud Awareness Page 8
What is ID Theft?
Identity theft is when someone steals your personal information to use for
illegal purposes.
What is Personal Information?
• ID
• Passport
• Driver’s license
• Salary advice
• Municipal bill and merchant account statements
• Bank statements
There are people who gather personal information about you in order to
access your funds. Therefore make sure that it is difficult for strangers to
access your personal information.
DON’TS
• Don’t carry unnecessary personal information in your wallet or purse.
• Don’t disclose personal information such passwords and PINs when
asked to do so by anyone via telephone, fax or even e-mail.
• Don’t write down PINs and passwords and avoid obvious choices like
birth dates and first names.
DO’S
• Protect your personal information at all times.
• Manage your personal information wisely.
• When destroying personal information, either shred or burn it (do not tear
or put it in a garbage or recycling bag).
• Store personal and financial documentation safely. Always lock it away.
• Keep PIN number and passwords confidential.
• Pay attention to account cycles.
• Follow-up on account statements not received, they may have been
stolen with the aim of victimizing you.
• Verify all requests for personal information and only give it out when there
is a legitimate reason to do so.
• To prevent your ID being used to commit fraud, if it is ever lost or stolen,
you should alert the SA Fraud Prevention Service immediately on 0860
101 248 or at www.safps.org.za.
• To protect your interests your information will be put on a database used
by banks and retailers.
• Follow-up on account statements not received, they may have been
IDENTITY THEFT
stolen with the aim of victimizing you. Rather have your statements
e-mailed to you. Request that sensitive documents be sent via registered
mail or door-to-door mail, as items can easily be stolen while in the post.
• Verify all requests for personal information and only give it out when
there is a legitimate reason to do so. Install firewall and antivirus software
protection to prevent a computer virus sending out personal information
from your computer.
• Don’t use Internet Cafes or unsecure terminals (hotels, conference
centres etc.) to do your banking.
• Should your ID or driving license be stolen report it to SAPS immediately.
Are you using your PIN and password correctly to
keep your money safe and secure?
• Memorise your PIN and password, never write them down or share
them, not even with a bank official.
• Make sure your PIN and password cannot be seen when you enter
them.
• If you think your PIN and/or password has been compromised, change
it immediately either online or at your nearest branch.
• Choose an unusual PIN and password that are hard to guess and
change them often.
• For your security you only have three attempts to enter your PIN and
password correctly before you are denied access to our services.
• Register for your Bank’s cellphone notification service and receive
electronic messages relating to activities or transactions on your
accounts as and when they occur.
• Inform your Bank should your cellphone number changes so that your
cellphone notification contact number is updated on its systems.
• Regularly verify whether the detail received from cellphone notifications
are correct and according to the recent activity on your account. Should
any detail appear suspicious immediately make contact with your Bank
and report all log-on notification that are unknown to you.
Are you sure you’ve logged on to your Bank’s
authentic Internet Banking website?
• Ensure that you are on your Bank’s secure website and not on a ‘spoof’
site that looks like the real website.
• Log on into your Bank’s website by typing in the web address yourself
instead of accessing via Google search as it might lead you to a spoofed
site.
• Do not use web links that are saved under your favourites.
• Make sure that you are not on a spoof site by clicking on the
security icon on your browser tool bar to see that the
URL begins with https rather than http.
• Remember to log off immediately when
you have finished banking.
INTERNET BANKING