Security Center
Your security is important to us, and we work relentlessly to protect you. It is import that we help keep you aware of the latest threats and informed of all the ways to protect yourself.
Your security is important to us, and we work relentlessly to protect you. It is import that we help keep you aware of the latest threats and informed of all the ways to protect yourself.
Millions of people become victims of cybercrimes each day. Cybercriminals use various techniques to attempt to steal your personal information or access your computer systems for their illegal activities. Here are some common methods thieves use and what you can do to protect yourself.
Social Engineering
Social engineering is the art of manipulating or deceiving you in order to again control over your computer system. The hacker may use phone, email, mail or direct contact to gain illegal access. Phishing, Spear Phishing and CEO Fraud are all examples.
Email/Website Spoofing
These are used to make people believe they are receiving an email from a legitimate company, but they aren’t. Or that the user is visiting and interacting with a trusted website but is indeed a forged site. The best way to handle spoofed emails and spoofed websites is by always exercising caution. If something seems “off” about an email, do not open attached files or click on included links. Type in a site’s URL manually to avoid landing on a spoofed version of it. By taking your time and being careful, you should be able to avoid most problems.
Phishing
Phishing is a cybercrime that targets victims by email, telephone, or text messaging. The fraudster poses as a legitimate company to lure the victim into providing sensitive data such as social security numbers, banking and card details and passwords. The information is then used to access important accounts or obtaining new accounts, resulting in identity theft and financial loss.
Common Phishing Techniques:
Email/Spam
This technique target victims via email/spam by asking them to fill in personal details. Most of the messages have a sense of urgency requiring victim to enter credentials, update account information or verify accounts.
Vishing
In phone phishing, the phisher makes phone calls to the user and asks the user to dial a number. The purpose is to get personal information of the bank account through the phone. Phone phishing is mostly done using fake caller ID.
Smishing
This form of phishing is conducted via text messaging. A smishing text, for example, attempts to entice a victim into revealing personal information via a link that leads to a phishing website.
Link Manipulation
Link manipulation is the technique in which the phisher sends the victim a link to a malicious website. When the user clicks on the deceptive link, it opens the phisher’s website instead of the website mentioned in the link.
Safety TIP! Hovering the mouse over the link to view the actual address stops users from falling for link manipulation.
Malware
Phishing scams involving malware are usually attached to the email sent to the user by the phishers. Once you click on the link, the malware will start functioning. Sometimes, the malware may also be attached to downloadable files.
Ransomware
Ransomware denies access to a device or files until a ransom has been paid. Ransomware is malware that gets installed on a user’s workstation using a social engineering attack where the user gets tricked in clicking on a link, opening an attachment, or clicking on malvertising.
Learn More Resources:
Protect Sensitive Information
Information such as your social security number, date of birth, routing or account numbers, usernames/passwords, and PIN numbers all should be highly protected.
Beware of Scams, and Scammers Techniques
Scammers target their victims. Don’t fall prey to them. Here are a things to watch for.
Scammers often create a sense of urgency to get their victim to roped into their scheme. SLOW DOWN. Ask yourself a few questions. Is this caller asking me to hurry and pay for something to avoid jail or penalties or collect prize money, secure a job?
Never send cashiers checks, checks or cash to people you meet online or to a person from whom you have received an unsolicited call.
Unsure about the deal? Talk to a close friend, family member or reach out one of our bankers to discuss.
Don’t trust caller ID. Scammers can spoof caller ID to make the incoming call look from a legitimate business. What is the caller asking? Are you expecting a call from this company or individual? Are they asking you to provide sensitive information? STOP! End the call. Look the company phone number up from a trusted source and call them back. Do NOT call them back from the number showing on your phone.
Visit our Common Types of Fraud Methods page to learn more.
Protect Your Systems
Learn More Resources:
Seeing unusual transactions or suspect your identity or online banking user login information has been compromised? Please contact us immediately.
Preferred Option: Call us at 918.392.2500
Email : customercare@firstoklahomabank.com
Additional Resources:
Report Lost or Stolen Debit Card
Identity theft occurs when someone illegally obtains your personal information (like your Social Security number, bank account number or other identification) and uses it to open new accounts or initiate transactions in your name. Essentially, someone else tries to become you. They might open new credit cards or bank accounts, forge checks or even apply for loans using your name and personal information. This can cause financial loss, damage your credit and lead to a long and stressful resolution process.
While thieves can obtain personal information via online methods, most identity theft occurs offline. Stealing wallets and purses, intercepting, or rerouting your mail, and rummaging through your garbage are some of the common tactics used to obtain personal information.
If your security has been compromised, it does not automatically mean that you are a victim of identity theft. It might be an incorrect entry or an isolated incident of theft. Contact the creditor right away
The good news is that the more information you have about identity theft the better your defense. For more information on Identity Theft, visit the Federal Trade Commission's ID Theft Website.
Recommended Resources:
Warnings Signs of Identity Theft
Create a Personal Recovery Plan
FTC Guide to Free Credit Reports
Credit Bureau Contact Information
Fraud Protection Tips for Your Business
You’ve worked hard to build your business, and it’s important to protect it. Just like individuals, businesses can be targeted by cyber criminals. A common threat today, is Business Email Compromise or CEO Fraud. Through these crimes, billions of dollars are stolen from businesses every year. At First Oklahoma we are committed to providing information and resources you need to understand and recognize fraud, as well as the tools to help prevent it.
Familiarize yourself with the most common attack scenarios:
Watch this video to learn about the latest scams-Don’t Be the Next Victim. Latest Business Email Compromise Scams.
Education & Awareness is Key!
Tell employees to slow down, use caution with any payment instruction changes and always call using a known number not one listed on the email to confirm legitimacy.
Please visit the sites below for additional information and ask yourself if your business is safe as it can be.
Notify us immediately if you suspect your card is lost or stolen to protect your account.
Option 1: Call
1-918-392-2500 Business Hours
1-918-392-2500 Option 1 After Hours to Transfer to Card Services Center
1-888-297-3416 Card Services Center
Option 2: Use Your First Oklahoma Bank Mobile App