Image for Avoiding Vishing Scams

Avoiding Vishing Scams

December 4, 2018

As long as people have money, there will be criminals devising new ways to take it. As consumers are becoming more knowledgeable about “phishing” attempts, some more

Image for Identifying Phishing Emails

Identifying Phishing Emails

September 26, 2018

When a scammer uses fraudulent emails, texts, or copycat websites to get you to share your personal information, it’s called more

Image for Red Flags for Elder Financial Abuse

Red Flags for Elder Financial Abuse

September 25, 2018

A recent survey by the American Journal of Public Health revealed that nearly one in 18 older adults falls prey to financial fraud or abuse, to the tune of $36.5 billion per year. And while declining cognition is associated with a 33% increase in scam susceptibility, even healthy older adults can fall victim, more

Image for Handling Identity Theft

Handling Identity Theft

September 25, 2018

Fixing the effects of identity theft can take time, money, and patience. However, there are a number of resources available to make the process as painless as possible. These more

Image for Recognizing Identity Theft

Recognizing Identity Theft

September 25, 2018

Once thieves have your identity they can wreak havoc on your personal finances. They can drain your bank accounts, open fraudulent accounts in your name, and use your identity to purchase cars and other items. Additionally, they may run up account balances on your existing charge cards, get medical treatment on your health insurance, they have even been known to give your name to a police officer during an more

Image for Prevent Identity Theft

Prevent Identity Theft

September 25, 2018

Identity theft is a crime where personal information, such as your social security number (SSN), is used to commit fraud. The thief can use the information to apply for credit, file taxes, or get medical more

Image for ATM Skimmers

ATM Skimmers

September 25, 2018

In order to steal your debit/credit card information, thieves install electronic devices (“skimmers”) over the normal card reading slot of an ATM/point-of-sale (POS) machine. The skimmers record data from the magnetic strip on the back of the card which can then be used to manufacture counterfeit cards, make purchases, or withdraw funds from your more