FDIC-Insured—Backed by the full faith and credit of the U.S. Government

Identity Theft and Cyber Security

Computer-related crimes affecting businesses and consumers are frequently in the news and we recognize that these threats continue to evolve over the years. 

At InsurBanc, we strive to provide our customers with up-to-date information to help keep you from becoming the victim of fraudulent scams.  Whether it’s your personal computers and accounts or your business, we hope to create an awareness of signs of suspicious activities and the prevention practices to reduce the risk of these threats.

Be sure to check back often for updates.

Banks Never Ask That
We have joined with the American Bankers Association to fight phishing scams!  Take a moment and test your scam IQ, and get tips and tools on how to stay safe at BanksNeverAskThat.com.

Business - “Top Ten Cyber Crime Risk Reduction Techniques”

As cyber security threats continue to affect small and medium sized businesses with increased severity and costs, Connecticut Community Bank would like to take the opportunity to provide our business clients important and constructive information on common threats and prevention practices. Our goal is to raise awareness of the signs of suspicious online activities and what steps you can take to reduce the risk of your business being compromised.

Consumers - “Top 10 Ways to Improve Cyber Security at Home”

Our personal lives are now more than ever connected to world online.  We shop, watch videos, browse social media, text and email from our laptops and phones.  All these activities provide cyber criminals the opportunity to exploit your online vulnerabilities and compromise your personal identity and data.   Our goal is to raise awareness of the signs of suspicious online activities and what steps you can take to reduce the risk of being compromised.

Identity theft is becoming more sophisticated and the number of new victims is growing. A consumer’s identity can be stolen by simply stealing information from your mail or garbage or through sophisticated phone and online schemes. Identity thieves need only to obtain your name, address, an account number and/or your social security number to take over your identity.

Common Ways Your Identity Can Be Stolen

  • On the Internet – through “phishing” or “spam” emails and leaving personal information on unsecured websites.  Vishing” scams happen over the phone, voice email, or VoIP (voice over Internet Protocol) calls. “Smishing” scams happen through SMS (text) messages.
  • Social Media – Social networking sites are becoming more popular attack avenues for cybercriminals because people trust those they believe to be “friends”. These cybercriminals use that trust to upload malicious software onto your computer and to try and gather personal information.
  • “Dumpster Diving” – people that go through your garbage cans or a communal dumpster to obtain copies of your checks, credit card or bank statements.
  • Through your mail – be conscience of bank and credit statements and preapproved credit card applications.

Phishing/Vishing/Smishing

This is how it works:

A consumer receives an email or text message which appears to originate from a financial institution, government business, or other well-known/reputable entity. Or you may receive a voice recording or live call searching for information.

The message describes an urgent reason you must “verify” or “re-submit” personal or confidential information by clicking on a link embedded in the message.

The provided link appears to be the Web site of the financial institution, government business or other well-known/reputable entity, but in “phishing” scams, the Web site has been spoofed and belongs to the fraudster.

Once inside the fraudulent Web site, the consumer may be asked to provide Social Security numbers, account numbers, passwords or other information used to identify the consumer, such as the maiden name of the consumer’s mother or the consumer’s place of birth.

How to Protect Yourself

  • Be vigilant and look for these warning signs:
  • The sender is unknown
  • Stresses unnecessary urgency
  • Contains a suspicious URL
  • The title of the email/text doesn’t make sense
  • There is improper spelling or grammar
  • The offer seems too good to be true
  • You didn’t initiate the action
  • Message makes unrealistic threats (your account has been compromised, your account will be close, your account will be suspended, etc.)

Vishing works on the same principal. The fraudster calls you and will try to manipulate you into revealing confidential information

If You Become a Victim – 3 major credit bureaus listed below

  • If you are a victim of identity theft you should contact the proper authorities immediately.
  • Contact creditors or financial institutions for any accounts that may have been tampered with or opened fraudulently.
  • Contact the fraud departments of each of the three major credit bureaus (listed below).
  • File a report with your local police.
  • File a complaint with the Federal Trade Commission at www.ftc.com or 1-877-IDTHEFT.
  • File a complaint with the FBIs Internet Crime Complaint Center (IC3) at www.ic3.gov.

Credit Reports

Review your credit report annually. AnnualCreditReport.com provides consumers with the secure means to request and obtain a free credit report once every 12 months from each of the three nationwide consumer credit reporting companies in accordance with the Fair and Accurate Credit Transactions Act (FACT Act). You can also contact each credit bureau separately to request your free report or to report fraud.

Credit Bureaus

In addition to identity theft, consumers should also be aware of other scams that attempt to trick individuals into giving them money.

Impersonator Scams
Someone calls to ask for money. Are they who they say they are?

Business Impersonator
Government Impersonator
Grandkids and Family Scams
Online Dating Scams
Romance Scams
Tech Support Scams

Charity Fraud
Someone asks you to donate money to a charity. Now.

Health Insurance Scams
You have a Medicare card, but a caller says you need a new one.

Home Repair Scams
Someone offers to repair your home. Cheap. For cash now.

Investment Scams
Ad promised quick and easy money. Guaranteed. No Risk.

Job and Money-Making Scams
Ads promise big money working from home. For a fee.

Mule Money Scams
You’ve won a sweepstakes. Receive a check. Wire a portion to another account.

Unwanted Calls and Text Messages
You get a lot of unwanted calls. Many are from scammers.

Work at Home Scams
You’ve got the job. Pay a fee. Provide account numbers.

“You’ve Won” Scams
You won a prize. But can’t get it until you send money.

We’ve all seen it: a senior places his or her trust in a scammer or an untrustworthy individual, and the next thing you know, the senior is left with nothing. Financial abuse against older Americans can take many forms, from illegal debits, to third-party scams and even unauthorized withdrawals by an approved caregiver. And with the share of the U.S. population 60 years and over projected to reach 30 percent by 2025, the opportunities to take advantage of these at-risk bank customers become more prevalent—by the minute. We’ve partnered with the American Bankers Association to provide you and your families helpful safety tips to avoid senior scams.

Fraud schemes continue to grow, evolve and target legitimate businesses, non profits and government. The FBI monitors schemes like Business Email Compromise, Vendor Impersonation Fraud and Mortgage Closing scams, which typically involve social engineering or computer intrusion techniques. Click here to read more about these scams, and be sure to share with your employees. Click here for Cybersecurity Tips for Small Businesses

Corporate Account Take Over

An alarming cybercrime now affecting small to medium sized businesses is “corporate account take over.” This involves cyber criminals penetrating the computer network of a business and spreading malicious software, such as a “keylogger” which records the words typed, Web browsing history, passwords and other private information. This in turn allows them access to programs using your log-in credentials. If they steal your password and breach your online banking system, the cybercriminal can begin an online session to initiate funds transfers, by ACH or wire transfer, to their accomplices. The accomplices withdraw the money almost immediately.

Business Email Compromise

A Business Email Compromise is a type of phishing attack that involves criminals impersonating an employee or executive at an organization or a trusted vendor, such as your bank, in order to gain access to funds or sensitive information. These attacks target small to medium sized businesses, not just large companies. Review these tips to detect these types of emails:
  • It appears to come from the email address of a trusted client, vendor, company executive, or even the CEO; or from your own company employee.
  • Stresses unnecessary urgency.
  • Asks for a funds transfer, a bank check, sensitive personal data or account data.
  • States payment has failed and needs credit card information.
  • Asks to change vendor payee or remittance information.

You can follow these important tips at your business to avoid these types of scams:
  • Always voice verify any transfer of funds or account/invoice changes directly using information that you already have on file.
  • Look closely at the senders email address to determine if it might be fake.
  • Use multi-factor authentication for funds transfers and money requests.
  • Follow safe password practices – use strong, complex passwords.
  • Protect office systems by installing a malware, anti-virus solutions and keeping them up-t0-date.
  • Protect email correspondence by using a strong spam filter.
  • Require training for all staff on phishing techniques to raise awareness.
  • Share this information with other employees and IT staff!!

Click here to download “How to Protect Your Business from Cybercrime!”
Malware is malicious software such as viruses and spyware that are designed to steal personal information and spread spam. Criminals lure you into clicking on links that will spread the malware to your PC gaining access to your computer – giving criminals access to sensitive information or disrupting your computer’s operation. Most times, you won’t even know it’s there.

Spyware

“Spyware” is a type of malicious software installed on your computer without your knowledge. It collects small pieces of personal information including Internet surfing habits and sites visited. It also can redirect web browser activity and change computer settings. Spyware is typically hidden from the user, and can be difficult to detect once installed. Spyware can be installed on computers via fraudulent emails, legitimate software download or pop-up windows. These messages masquerade and try to be as legitimate looking as possible.

Keystroke Logging

As with spyware, keyloggers are installed on your computer without your knowledge. It is the action of tracking (or logging) the keys struck on a keyboard, typically in a hidden manner so that the person using the keyboard is unaware that their actions are being monitored. Keystroke logging can record the words typed, Web browsing history, passwords and other private information. This is extremely dangerous in all aspects of computer usage, especially with financial information.

Scareware

“Scareware” is a term to describe an attempt to scare a person, via pop-ups, into believing their computer was scanned and has a virus. These pop-ups contain frivolous and alarming warnings or threats and are especially designed to look like they come from the user’s operating system.

The fake scan concludes that the user’s computer has a malware infection and says to fix it the user must download antivirus software and the cost is as much as $50. What the user usually gets is a form of malware that actually does infect the computer. Not to mention being out the fee!

Ransomware

“Ransomware” is an attack carried out using secretly installed malware that encrypts the victim’s files and then requests a ransom payment in return for the decryption key that is needed to recover the encrypted files. It is on your computer because you have most likely clicked on an infected popup advertisement or an infected link in an email. The bad guys hold your computer hostage and attempt to extort payment. The criminals often ask for a small payment, assuming you will be willing to pay to avoid the aggregation of dealing with the virus. They may ask for as little as $10 to be wired through Western Union, paid through a premium text message or sent through a form of online cash. Business are often ask for payment in Bitcoin. Paying the ransom is no guarantee that your computer will be restored. Protect yourself from ransomware by using reputable antivirus software, back up often to an external hard drive or cloud, enable your popup blocker and use common sense when clicking on advertisements or email links.

Please consider the following to keep your computer safe:

Protect your computers with a strong anti-virus/anti-spyware/anti-spam software program and make sure they are updated on a daily basis at a minimum and note the expiration date. Anti-virus software alone is not sufficient to protect your systems from today’s complicated techniques. Most identity theft problems originate with spyware.

For Windows users, please be sure the Windows Firewall Service is turned on and your computer is up to date with critical patches. Configure Windows Update to check for these critical updates automatically.

Strongly consider the use of a hardware based firewall product. These products are designed to protect all your computers from attackers before it reaches your PC. Typically they also provide anti-spyware and anti-virus capability as well. Stopping the intrusion before a threat arrives at your PC is one of the best measures you can take to avoid infecting your computer.

Don’t trust any email from any source that is asking for or attempting to verify personal information, account numbers, etc.

If your business utilizes an online banking system, you should consider using an additional layer of security called token-based authentication. The security token, provided by your financial institution, is a small hand held device that generates a unique, random password that is required for certain transactions. These transactions are blocked without the physical possession of the token.

On July 28, 2022 the FDIC recently released a Fact Sheet intended to address some common misconceptions about the scope of deposit insurance coverage and whether deposit insurance applies to funds that customers provide to crypto companies. 

Please click here to read the FDIC Fact Sheet.

The FBI through a public service announcement is warning of increased and highly anticipated cyber-attacks that can exploit mobile banking apps.

Method 1: Banking Trojans

Banking Trojans have been around for some time but in this case they are typically cloaked or disguised as common mobile apps such as games or tools, (i.e. third party flashlight apps). These apps look innocent enough, but are extremely dangerous. Essentially these Trojan apps lay in a dormant stage until your legitimate mobile banking app is launched. Once launched these Trojans “overlay” a real banking app with a fake login screen that swipes your credentials.

Method 2: Impersonated Apps

These are apps that impersonate a real financial institutions mobile banking app and unfortunately are widely available. If you open one of these, you’ll see what looks like a legitimate login page and of course it’s designed to steal your credentials as well as obtaining security codes that are texted to your mobile devices.

Here’s what you can do:

  1. Only download apps from official app stores or directly from a bank website.
  2. Avoid loading up your phone with tools and utilities that you never use or use infrequently. It’s just as easy to uninstall an app and reinstall it when you need it.
  3. Check the app permissions and only allow those permissions that you are comfortable with. For example, a flashlight app shouldn’t need access to your contacts!
  4. Enable two-factor or multi-factor authentication on mobile devices and accounts. Use strong two-factor authentication if possible such as biometrics, hardware tokens, or authentication apps.
  5. Phishing campaigns via email or text prompting you to update your mobile banking app should be highly suspect. Many banking apps will notify you within the app to update to a current version and direct you to the proper app store to download it. Get in the habit of not clicking on links in emails or text messages that allegedly come from your financial institution.
  6. Don’t share or give two-factor passcodes to ANYONE over the phone or via text or chat!
  7. Don’t reuse passwords across multiple sites. It’s a very unsafe practice! If a bad guy gets one of your credentials and you share it with other sites, you’re just making it easier to lose your identity and your money!
  8. Use complex passwords that are at least 8 characters and have capital letters, numbers and special characters.
  9. When in doubt, contact your financial institution!!!


By:  John Longo, Onsite Support Services Corporation

There isn’t a week that goes by that I’m not asked this question and more importantly how to protect your devices, (and your data!), if you absolutely need to join a free Wi-Fi network.

In short, the answer is NO, free unsecure public Wi-Fi, (where no password is required) is not safe. Should you join one? In my opinion NO and NEVER! Do I ever join one?……NOPE!

I realize that there may be a situation that just can’t be avoided where you have to connect to a free hotspot at the airport or hotel for example. I’ve outlined below some Do’s and Don’ts best practices you can use to significantly lower your risks of being compromised.

Some Background:

Current estimates indicate that there are more than 450 million public hotspots in the United States alone and grows annually.

The bottom line….Wi-Fi hotspots are literally everywhere. Cellphone carriers like Verizon, AT&T, etc., offer their customers free WiFi access as do most of the major internet service providers such as Comcast/Xfinity, COX, and others.

Additionally everyone from fast food, coffee shops, airports, airplanes, outdoor venues, home improvement stores, malls, and even your doctor’s office provide Wi-Fi access. Wi-Fi is so prevalent, you can easily find one almost anywhere you go.

The Two Types of Public Wi-Fi

There are basically two kinds of public Wi-Fi networks: secured and unsecured.

An unsecured network can be connected to within range and typically does not require any type of security feature like a password or login. These are commonly referred to as “open” Wi-Fi networks. Conversely, a secured network typically requires a user to agree to legal terms and conditions, register an account, or type in a password before connecting to the network. In some cases it may also require a fee or other purchase to gain access to the password or network.

Regardless of the connection type, you should always use public Wi-Fi with extreme caution. Even “secured” Wi-Fi networks should not be trusted.

Why Public Wi-Fi is inherently unsafe:

A public Wi-Fi network is far less secure than your home wireless network because you don’t know who or how it was set up, what steps are being taken to continuously secure the network, and most importantly, who else is connecting to it.

Hackers can easily position themselves between you and the free hotspot. You might assume your device is communicating directly with the free hotspot but instead you end up sending your information to the hacker. It is so easy to setup a counterfeit hotspot like AirportFreeWifi which is actually a hackers own hotspot. Once you join the hacker’s hotspot, they can easily penetrate your device, collect data, install malware, keyboard loggers, etc.

There is a widely held misconception that as long as you’re not accessing your email or bank accounts that you’re okay. It’s simply not true. Anything you do on a public Wi-Fi network is inherently NOT secure. Any information you share or access on these networks might as well be broadcast on a billboard for everyone to see and for the taking.

Many free hotspots require you to provide information to join it like your name, mobile number, and email address. In addition when you “Agree to the Terms and Conditions”, (which almost nobody reads!), you may be giving the hotspot provider explicit permission to collect browsing information, location data, and tracking information that they can use or resell.

Do’s:

  • Use a VPN client. Without question, the most effective method for staying safe on public Wi-Fi is to install a VPN, (Virtual Private Network,) client on all your devices. It will encrypt all data traveling to and from your laptop or phone, and connects you to a secure server. Using this method will make it harder for other people on the Wi-Fi network, (or whoever is operating the network), to see what you’re doing, where you’re going, or grab any of your information. Most VPN clients are very inexpensive at 2-4 dollars a month, and are well worth the investment. Avoid “free” VPN client offerings.
  • Create your own personal hotspot using your cellphone instead of joining a free Wi-Fi network. Most plans from major carriers have this feature enabled and with today’s unlimited data plans, this is a very secure way to access the internet. Be sure to use a strong password when setting up your mobile hotspot.
  • Turn off File Sharing and AirDrop on your devices. On a Windows PC, go to Network and Sharing Center, then Change advanced sharing settings, then Turn off file and printer sharing. For Macs, go to System Preferences, then Sharing, and unselect everything. Then head to Finder, click on AirDrop, and select Allow me to be discovered by: No One. For iOS devices, just find AirDrop in the Control Center and turn it off. By doing the above no one nearby you can either grab your files, or send you one you don’t want.
  • Browse with HTTPS only. Most browsers these days will inform you if you are visiting an unsecure site, (HTTP), and you should heed those warnings! When you browse over HTTPS, people on the same Wi-Fi network as you can’t snoop on the data that travels between you and the website you’re connecting to. Over HTTP, it’s relatively easy for a hacker to watch what you’re doing!
  • Update your devices. Make sure your devices are up to date with the latest security patches installed for both your operating system and applications. Remember approximately 70% of all data breaches can be eliminated by keeping your devices up to date!
  • Maintain an up to date anti-malware and firewall product on all your devices.
  • Turn off automatic connection to Wi-Fi networks. Most smartphones, tablets, and laptops have an automatic connection to Wi-Fi feature. Although this is very convenient, it can also connect your devices to networks you ordinarily would not use.
  • Monitor your Bluetooth connectivity and if you don’t need it, turn it off. Bluetooth allows various devices to communicate with each other but a hacker can easily look for open Bluetooth signals to gain access to your devices.
  • Use two-factor authentication whenever possible when accessing sensitive sites.

Don’ts:

  • Never leave your laptop, tablet, phone unattended in a public place. It only takes a minute for someone to get on your device to install snooping software or change your security settings to gain access to your device.
  • Don’t access personal bank accounts or other sensitive personal data on unsecured public networks. Even “secured” networks can be risky! Instead, and if you have to, turn off Wi-Fi and just use your cellular connection.
  • Don’t shop online when using public Wi-Fi. Making purchases online requires personal information that could include bank account information and login credentials. Again, use your cellular data, VPN client, or personal hotspot, if you must make an online purchase.

Bottom line:

Although Wi-Fi security standards and protocols are improving, the inherent risks are still the same. Using “an abundance of caution” approach for accessing public Wi-Fi is your best strategy

Our articles are designed to provide educational information for you. Our primary goal is to increase awareness about cybersecurity topics and trends and help keep you safe in our digital world. Remember that no one can prevent all identity theft or cybercrime but following the steps above can significantly lower your risks of being compromised.

By:  John Longo, Onsite Support Services Corporation

Cell Phone Safety

If you’ve lost or have had your cell phone stolen and haven’t setup any security at all, your contacts, (and who doesn’t keep account numbers and the 300 passwords we all need to run our lives!), personal confidential documents, and calendar are free for the viewing. You don’t want some criminal knowing you won’t be home for the weekend and the rest of your personal business! With identity theft getting worse, here are 15 simple tips that can make having your phone lost or stolen a little easier to deal with and with a lot less stress!

  1. Protect your data in case of theft. Because they’re so portable, the biggest threat to a mobile device is loss or theft. Several mobile products offer features to locate and recover a lost or stolen phone. Typically they also include the ability to lock the phone, make the phone flash and scream even if the volume is turned off, and wipe out all private data if it can’t be recovered. There are also programs available that allow you to remotely lock and wipe the phone by sending a text message. Some are free for locate usage with lock and wipe features paid, but in general are very low cost.
  2. Lock your phone. Setup a PIN or complex pattern to gain access to the phone. Use the maximum amount of characters allowed and set the PIN/pattern required timeout to no more than 10 minutes.
  3. Encrypt data. Install an encryption app if confidential data must be accessed or stored using a mobile device, but you should avoid using or storing confidential data whenever possible.
  4. Use anti-virus/malware programs. Most people run anti-virus programs on their home and work computers but neglect to on their phones. Apps are available that let you scan your phone for malware, provide a safer internet browsing functionality, (i.e. will block known phishing sites that look legit), and backup and restore your data online. These apps scan other apps, settings, media and phone contents in search of suspicious files and as files or apps are being downloaded. Many of them are free and work very well.
  5. Connect to secure Wi-Fi networks and disable Wi-Fi when not in use. When you’re not using them, it’s best to disable features like Bluetooth, infrared or Wi-Fi. By doing so you’ll get longer battery life! Avoid joining unknown Wi-Fi networks when you need to connect. If you must, limit your activity to non-commerce usage.
  6. Use caution when downloading apps. Check consumer reviews before you download any app. When you search for an app in the store, many of the descriptions will include recent reviews from other people who downloaded the app. Read the app’s privacy policy, which contains disclosures about what information the app collects and how it uses that information. For example, there’s no need for a calculator app to access your SMS text messages! Don’t use “untrusted” sites to download apps.
  7. Review and set privacy settings. Many apps have privacy settings within the app itself, typically in the “settings” or “privacy” tab. The settings can manage activities like whether the app can access your local information. Check the privacy default settings to make sure you agree with them, if not get rid of them. You can also review the privacy settings for your device’s operating system. For example, you can turn off the phone’s ability to geo-locate you, (aka location services), or create a password to protect the phone. Delete any app that you consider invasive.
  8. Never unlock or “jailbreak” the default security settings. While some sites may promote the use of unauthorized applications, games, etc., the end result is the same – you’ve left your device open for criminals to abuse with targeted mobile malware. You should never override the security settings in your tablet or phone, especially if you plan to access personal or business email, mobile banking or other sensitive information on the Internet.
  9. Replace your phone properly. Many wireless providers offer programs to upgrade your phone every couple of years. If you decide to get the latest model, be sure to delete all information stored in your device before discarding, exchanging or donating it. Perform a “hard reset” of the device which will return your phone to the original factory image and defaults and remove all data and apps. If your device has a removable SD card, be sure it is also erased.
  10. Never “root” your phone. Rooting your phone leaves you open to incursion from criminals, eliminates the ability to receive support from the vendor/carrier, and in some cases can damage the phone.
  11. Call your provider. If your phone is lost or stolen, call your provider and have them add your phone to the lost and stolen list. By doing this, a criminal can never reactivate the phone.
  12. Buy insurance. Most cell phones cost $400-$600 without a contract, insurance is a good buy at roughly $4-6 per month, especially if you are not eligible for an upgrade.
  13. Call your cell provider if you are buying a used or reconditioned cell phone from a third party, (i.e. EBay, Craigslist, etc.). If you’re not eligible for an upgrade or didn’t have insurance on your phone, it is enticing and far more inexpensive to search the web for a used or reconditioned phone from someone other than your carrier. The private seller should have no issue providing you with the EIN, (serial number) of the device they are selling and if they won’t….RUN, you’re probably buying a stolen phone! With any used or refurbished phone from anyone other than your provider, call your carrier and this way they can tell you if the device is on the lost/stolen list or already activated on someone else’s account! I can’t tell you how many people unknowingly buy a stolen phone or tablet.
  14. Backup, Backup, Backup. There are so many options and it is so much easier to do than even a year ago. Most carriers offer a free to low-cost backup service as well as most anti-malware vendors.
  15. Contact your employer. If your phone was configured by your IT department for access to email, custom apps, etc. Let them know you have lost your phone or it’s been stolen. They can help you reset other work related passwords to avoid having lost corporate data compromised.

Important Notice

InsurBanc will be closed on Monday, October 9th in observance of Columbus Day.

Contact Form