First National Bank takes the security of our customers' confidential information very seriously. Your financial wellbeing is important to us. We want to protect your good credit, personal information and your hard earned money!
Contact First National Bank immediately if you suspect identity theft or fraud involving any of your First National Bank accounts, including if you believe you have given out confidential information. Someone can help guide you through the steps you need to take next.
firstname.lastname@example.org - Please do not send any confidential information through email
Online Banking Support
Monday - Friday 8am to 6pm
Lost or Stolen Debit Card
Read more about the most common types of fraud
Identity theft, the most commonly seen type of fraud, occurs when someone illegally obtains your personal information such as your Social Security number, bank account number, or other identification, and uses it repeatedly to open new accounts or initiate transactions in your name. This can cause financial loss and damage your credit, which can lead to a lengthy resolution process.
Identity theft is portrayed as a high-tech crime affecting only those people who shop, communicate, or do business online. However, while thieves can obtain personal information via online methods, the majority of identity theft occurs offline. Stealing wallets and purses, intercepting or rerouting your mail, and rummaging through your garbage are some of the common tactics that thieves can use to obtain personal information.
It's a fast-growing fraud that could cost you thousands of dollars. There are many types of fake check scams, but it all starts when someone gives you a realistic-looking check or money order and asks you to send cash somewhere in return. It's phony, and so is the person's story, but that may take weeks to discover.
What are the most common types of fake check scams?
While there are some common fake check scams, new variations constantly pop up, so it's important to learn the warning signs to avoid becoming a victim.
- Foreign Business Offers - The promise of millions of dollars - Real companies and governments don't contact strangers in other countries to offer business propositions.
- Work-at-Home - If it was so easy, why wouldn't we all be working at home?
- Overpayments- They overpay on items you advertise in the classifieds. The catch? They ask you to return the excess to them, but the check they paid you with is no good.
- Rental Schemes - They claim to be moving from outside the area or from another country, they send a check to cover shipping costs and ask you to forward the excess to someone else. But, they never intended to move and by the time you discover the scam you are a victim.
Phone Call Scams
The IRS just called and told you that you owe money. Do you? You may owe the IRS money but they will not call you. They would send a letter addressed to you and it would be very plain who it is from. These fraudsters call and tell you they are going to sue you, deport you, or arrest you. They ask for credit card numbers, they ask you to go get prepaid debit cards or shopping cards and give them the numbers over the phone. Once that card number is out of your hands the money is gone.
Some scammers call and claim to be computer techs associated with well-known companies like Microsoft or Apple. Other scammers send pop-up messages that warn about computer problems. They say they’ve detected viruses or other malware on your computer. They claim to be “tech support” and will ask you to give them remote access to your computer. Eventually, they’ll diagnose a non-existent problem and ask you to pay for unnecessary – or even harmful – services.
If you see a pop-up, an ad, or get a call for tech support services, here are some ways to keep your money to yourself:
The perpetrator of this scam will appear to have a genuine reason for not being able to conduct a transaction on their own, and will ask you to deposit cashier’s checks or money orders into your account and wire all or a portion of the money back to them or to someone else that is out-of-state or overseas. The cashier’s checks or money orders are actually stolen or fake, but by the time this is known, you may have wired the requested money to the perpetrator.
Carefully review any online offer when it is necessary to mail or wire transfer the payment prior to receiving the benefit, particularly if it is sent to a PO Box or overseas. Always be suspicious if an unfamiliar person contacts you in this context.
The victim of this scam is notified that they have won a lottery that they did NOT enter. The customer is informed that a check will be sent to them and that they must wire funds to cover the taxes incurred on the winnings. In reality, the check the victim receives is fraudulent and will be returned, but usually not until the “taxes” have been wired to the perpetrator.
A similar scheme involves the notification that a distant relative or friend has passed away (or a similar variation of the story) and inheritance tax must be paid up front before the inheritance is sent. The check the victim receives is fraudulent and will be returned, but usually long after the “tax” has been wired to the perpetrator.
Debit Card Fraud
Theft, the most obvious form of credit card fraud, can happen in a variety of ways, from low tech dumpster diving to high tech hacking. A thief might go through the trash to find discarded billing statements and then use your account information to buy things. A retail or bank website might get hacked, and your card number could be stolen and shared. Perhaps a dishonest clerk or waiter takes a photo of your credit card and uses your account to buy items or create another account. Or maybe you get a call offering a free trip or discounted travel package. But to be eligible, you have to join a club and give your account number, say, to guarantee your place. The next thing you know, charges you didn’t make are on your bill, and the trip promoters who called you are nowhere to be found.
- Do not follow unsolicited web site links in email or respond to unverified callers with information about your place of employment.
- Use caution when opening email attachments
Keep your computer operating system updated and software patches up to date.
Use current antivirus software with the most updated definitions
Updated anti-spyware is necessary
Strong passwords that are not shared are vital in protecting your information