Home Projects on your mind? Try our Mini Home Equity. Minimal paperwork and closing cost. Members are loving it!

  • Handling Phone Scams

    Posted in Board Brief on Dec 16, 2020

    The classic way phone scammers get your information is to tell you that you have already been a fraud victim even though you haven’t. Since you’re worried that you’ll be charged for a purchase you never made, you’re ready and willing to help. Instead, you’re helping a fraudster scam you!

    It’s easy to fall for this scam because credit card companies often do call card holders when suspicious activity is detected. Scammers work even harder over the holidays when shoppers are distracted

    What can you do?

    DON'T ASSUME the caller is actually from the credit card issuer. Even if your phone’s Caller I...

  • Phishing Basics (Part 2 of 2)

    Posted in Board Brief on Nov 18, 2020

    As we showed you in the October’s Board Brief, Phishing Schemes are deceptive, yet detectible if you STOP, LOOK & THINK before you CLICK. This Board Brief shows you what a Phishing email looks like after you have blocked it and it is sent to your Junk or Quarantine folder.

    If you are not familiar with the term, PHISHING it is the use of an email sent to a lists of email addresses enticing recipients to click on an attached file or a web link. If you click on that file, it could launch a virus, imbed tracking (spy) software or launch ransomware.

    Let's take a look at a Phishing email after you h...

  • Phishing Basics (Part 1 of 2)

    Posted in Board Brief on Oct 21, 2020

    Sadly, Covid-19 is just another reason for hackers to ramp up email phishing schemes. It's almost impossible to keep up with them all. From time to time, we will look at various types of email phishing schemes to help you recognize them and safely deal with them.

    If you are not familiar with the term, PHISHING it is the use of an email sent to a lists of email addresses enticing recipients to click on an attached file or a web link. If you click on that file, it could launch a virus, imbed tracking (spy) software or launch ransomware.

    Let's take a look at a typical phishing scam that may put y...