While we work to protect your banking privacy, you also play an important role in protecting your information. The material below will help to protect your identity and help keep you safe in a digital world.
Every 5 Years
Please read the other sections below to learn about the different types of fraud and how to prevent them, from spyware and other computer fraud to mail and phone fraud to email phishing and web spoofing. Our Fraud Summary page provides more tips on how to protect yourself.
Identity Theft is the most popular and profitable form of consumer fraud. It occurs when someone uses your personal information such as your name, Social Security number, credit card number or other identifying information, without your permission to commit fraud or other crimes.
Common ways identity theft can happen:
“Old Fashioned” Stealing
Change of Address
Monitor Your Accounts
Keep track of transactions on your accounts by logging in to Jackson County Bank‘s Digital Banking, where you can view your activity as it is posted.
Protect your personal information
Jackson County Bank continually makes investments in state-of-the-art digital banking security to ensure we protect the confidentiality of every customer’s online information and to provide the utmost security of every user.
Computer protection tips:
We recommend you learn ways to protect yourself from common fraud schemes.
Vishing scams target consumers by “spoofing” text or voicemail messages that ask you to call a phone number and give your personal information. Here’s how it works:
Smishing is when consumers’ cell phones and other mobile devices are targeted with mobile spam. The spam, or text messages, attempt to trick consumers into providing personal information. Here’s how it works:
Lottery/Sweepstakes scams target consumers by a notification, which arrives through the mail, by email, or by an unsolicited telephone call. Here’s how it works:
Check Overpayment scams target consumers who sell items through an online auction site or a classified ad. Here’s how it works:
Phishing scams target consumers by “spoofing” emails and websites. Here’s how it works:
A popular scheme by fraudsters involves spoofing bank error messages. Here’s how it works:
For your protection, we will not send you an email to update or confirm your sensitive information by clicking a link or replying.
Please do not send personal information in un-secure email. Secure email may be sent from the Secure Feedback form from within our Online Banking’s Support Tab.
“Cyber Security” refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities, and attacks delivered via the internet.
The following are links to help you understand online security and to keep your information safe.
The Federal Deposit Insurance Corporation (FDIC) has a webpage dedicated to consumer assistance topics. Click HERE
On Guard Online is the Federal Trade Commission’s website to help you stay safe and secure online: Click HERE
Criminal entities employ various methods to obtain access to the legitimate banking credentials from businesses, including mimicking an institution’s website, using malware and viruses to compromise the business’ system, or using social engineering to defraud employees into revealing security credentials or other sensitive data.
For example, a business’ systems may be compromised by:
In each case, fraudsters exploit the infected system to obtain security credentials that they can use to access a company’s business accounts. The criminal can then initiate funds transfers by ACH or wire transfer to the bank accounts of associates. Access to the computers of the business may also allow sensitive customer information to be stolen or destroyed.
How do I limit the risk of Corporate Takeover in my Business?
Your employees are the first line of defense against Corporate Account Takeover. Employee education and a strong security program can help prevent data and financial losses. Here are controls that may help mitigate your risk.