We at Home Bank of California take your privacy and security very seriously. To assist you in becoming more aware and safer while conducting any sort of transaction or interaction online, we’ve put up this thorough online information that we update on a regular basis.
Quick Links to Sections:
Cybersecurity Awareness Quick Guide
- Maintain Password Security: Use strong passwords (or better yet, passphrases) for all online accounts. Avoid using easily guessed words like your name, birthdate, or pet’s name. Instead, string together unrelated words, numbers, and symbols to create a complex password that will be difficult for cyber criminals to crack. Don’t use the same password for all of your online accounts. If available, enable Two-Factor Authentication. Many online accounts offer two-factor authentication as an added layer of security. With two-factor authentication, you’ll need more than just a password to log in. The second factor is typically a code that’s generated by an app on your phone or sent to you via text.
- Update Virus Protection: Keep your virus protection program up to date. Set it to run regular, automatic updates so you’ll always have the latest security features.
- Actively Backup Data: Back up your data regularly. That way, if your computer is lost, stolen, or infected with malware, you’ll still have a copy of your important files. There are several different ways to back up your data, including using an external hard drive or cloud storage service.
- Verify Before You Click: Be cautious about clicking on links or attachments in emails, even if they appear to come from a trusted source. Cyber criminals can use “spoofing” techniques to make an email look like it’s from a legitimate sender when it’s not. If you receive an email with a link or attachment, verify that the sender is someone you know and trust before clicking on anything.
- Monitor Your Status: Check your credit report at least once a year to look for any unauthorized activity. You can get a free copy of your credit report from each of the three major credit reporting agencies – Equifax, Experian, and TransUnion – every 12 months at AnnualCreditReport.com.
Common Cyber Scams and Threats
As technology advances, so do the methods used by cybercriminals to scam and threaten people. The following are some of the most prevalent kinds of fraud and threats, along with links to in-depth information on each topic.
Smishing
Smishing is a type of phishing attack that uses text messages instead of email to trick people into revealing personal information or downloading malicious software.
Read our article Watch Out for Text Scams for more details and how to protect yourself from smishing.
Phishing
Phishing is a type of scam where cyber criminals pose as a trusted entity in an email, text message, or online pop-up ad. They then try to get you to share personal information like your account numbers, Social Security number, or login credentials. They may also try to trick you into clicking on a malicious link that will install malware on your device.
Read our article Protect Yourself From Email Fraud for more details and how to protect yourself from phishing scams.
Vishing
Vishing is a type of phishing attack that uses Voice over IP (VoIP) to make phone calls or leave voicemails that appear to be from a trusted source. The caller may try to get you to share personal information or login credentials. They may also try to trick you into installing malware on your device.
Read our article What is Vishing and How to Protect Yourself from It for more details and how to protect yourself against vishing.
Spearing Phishing
Spear phishing is a type of targeted phishing attack where the cybercriminal poses as a specific person or organization that you know and trust. They may use information they’ve gathered about you from your social media accounts, past emails, or other sources to make their scam email or text message seem more authentic.
Read our article Fraud Awareness – Spear Phishing for more details and how to protect yourself against spear phishing fraud.
Ransomware
Ransomware is one of the most common and dangerous types of malware. In a ransomware attack, hackers gain access to your system and then encrypt your files. They demand a ransom in order to decrypt the files and make them accessible again.
Read our article The Dangers of Ransomware & How to Prevent an Attack for more details and how to protect yourself against the threat of ransomware.
Synthetic Identity Fraud
Synthetic identity fraud is a type of identity theft where criminals create a new, fictitious identity using real and fake information. They may use this synthetic identity to open new lines of credit or take out loans in your name.
Read our article How to Identify & Fight Synthetic Identity Fraud for more details and how to protect yourself against the threat of synthetic identity fraud.
SIM Card Fraud
SIM card fraud is a type of phone fraud where criminals use a stolen SIM card to hijack your phone number. They can then use your phone number to commit fraud or steal your identity.
Read our article Protect Yourself (and Your Bank Accounts) from SIM Card Fraud for more details and how to protect yourself against SIM card fraud.
QR Code Scams
QR codes are barcodes that can be scanned by a smartphone to reveal a URL. QR code scams are where criminals create malicious QR codes that, when scanned, will take you to a fraudulent website or install malware on your device.
Read our article Beware if QR Code Scams for more details and protect yourself against QR code scammers.
Social Engineering Attacks
Social engineering is a type of scam where criminals use psychological techniques to trick people into revealing personal information or login credentials. They may also try to get you to click on a malicious link or attachment that will install malware on your device.
Read our article How to Identify and Protect Against Social Engineering Attacks for further details and how to prevent social engineering attacks against you.
Computer Hacking
Computer hacking is where criminals use various techniques to gain access to your computer or network without your permission. They may do this to steal information, commit fraud, or install malware on your devices.
Read our article Protect Yourself Against Computer Hackers for more details and prevent computers hackers from getting your valuable data and information.
Trojan Horse Virus
A Trojan horse virus is a type of malware that disguises itself as a legitimate program or file. When you install the fake program or open the malicious file, the Trojan horse virus will install itself on your device and allow cyber criminals to gain access to your system.
Read our article Trojan Horse Viruses for more details and protect yourself against Trojan Horse virus attacks.
What To Do If You’re a Victim
- If you believe that your username or password has been compromised, change them immediately. If the scammer also has access to your Social Security number, visit www.identitytheft.gov for help in creating a recovery plan.
- If you believe your device has been hacked, update your antivirus software and perform a virus scan.
- Contact the company that owns the account if you’ve sent a payment or noticed suspicious activity on it. If you used a gift card to pay, contact the company that issued the card.
- Get all the details and what to do if you suspect phishing by visiting Consumer FTC – How to Recognize and Avoid Phishing Scams.
- For more information about smishing visit FCC – Avoid the Temptation of Smishing Scams.
- Make sure you check your credit reports on a regular basis, and consider freezing your credit with all three credit reporting agencies (Experian, Equifax, and TransUnion).
- To receive support and find out what to do next, report the crime to the Federal Trade Commission (FTC) and state attorneys general. They will also be able to assist you in contacting the correct law enforcement agency.
Don’t be too hard on yourself. Scammers are professionals at recognizing and taking advantage of human psychology. Some people are hesitant to report their losses due to embarrassment, yet almost everyone is susceptible to some kind of fraud or scam.