Fraud & Scams
Cybersecurity at Work
Branch Security
Member Information Protection
Compliance &
Best Practices
100

A scam where fraudsters impersonate members and request account access.

What is account takeover fraud?
100

This type of email attempts to trick employees into clicking a malicious link.

What is phishing?

100

The first thing to do when an unfamiliar person requests access to a secure area.

What is verify their identity and purpose?

100

We gather sensitive personal info to be in compliance with these federal offices and regulation.

What is the Office of Foreign Asset Control (OFAC) and USA Patriot Act?

100

Employees must complete this regularly to stay updated on security policies.

What is security and compliance training?

200

A fraudster convinces a member to withdraw or transfer money under false pretenses. 

What is an imposter scam?

200

A secure way to access systems that requires a second form of verification.

What is multi-factor authentication (MFA)?

200

Employees should never do this when entering or leaving the branch after hours.

What is allow tailgating (unauthorized entry)?

200

A secure way to dispose of documents with member account details.

What is shredding?

200

A common security mistake when using a shared workstation.

What is leaving it unlocked when stepping away?

300

The illegal practice of stealing card information from ATMs or payment terminals.

What is card skimming?

300

If a member sends sensitive account details via email, you should do this.

What is advise them to call or use a secure portal?

300

If a suspicious person lingers near the ATM, you should do this.

What is notify security or branch management?

300

Employees should never do this when handling a member's ID during a transaction.

What is leave it unattended?

300

When discussing member account details over the phone, you should ensure this.

What is confirming the caller's identity and speaking discreetly?

400

A check deposited by a fraudster that initially clears but later bounces.

What is a counterfeit check? Or What is check kiting?

400

A fraudster calls pretending to be IT, asking for your login credentials.

What is social engineering?

400

This procedure should be followed in case of a robbery.

What is comply with the robber's demands and alert law enforcement after?

400

If a member wants their account balance, but you're unsure of their identity, you should do this.

What is ask for multiple forms of verification?

400

The reason why employees should report suspected fraud, even if unsure.

What is to prevent potential financial losses and protect members?

500

Fraudsters often ask members to send money using this type of hard-to-trace payment method.

What is a wire transfer or cryptocurrency?

500

A secure way to manage multiple passwords for work accounts.

What is using a password manager?

500

The reason security cameras must be checked regularly.

What is ensure they are operational and capturing clear footage?

500

The best way to protect printed documents containing member data at your workstation.

What is lock them in a secure drawer or file cabinet?

500

The best way to handle a situation where a member pressures you to bypass security procedures.

What is follow policies and escalate to a supervisor if needed?