Text Size: A A A

Fraud Alerts and Safety Tips

Fraud Alert Systems

Fraud is on the rise and becoming ever more sophisticated. Timely communication through channels you regularly use is important to resolving issues fast.  

1. Blackhawk Bank's Automated Debit Card Fraud Alert System can quickly identify transaction activity that falls outside your normal debit card usage and contact you to determine if it is, or is not, fraud. The system will send you an Email; if you don't repond within one minute a Text Alert will be sent. If you don’t reply to it within five minutes you’ll receive an Automated Phone Call. No need to enroll; this service is automatic for all Blackhawk Bank Debit Card clients. 

2. Another line of defense against Debit Card Fraud: BHB Guardian allows you to enroll your debit card(s) so you can receive and respond to text alerts when certain actions trigger an alert.
Learn more and ENROLL for this FREE service.  

3.The ultimate IdentityTheft Protection Package: Watch Dog Checking, with a monthly maintenance fee of just $5.95, is loaded with Identity Theft Protection and Resolution Services.  

Safety Tips 

NEVER provide your personal account number or PIN in response to an unsolicited request, whether it's over the phone or over the Internet. Emails and Internet pages created by phishers may look exactly like the real thing. They may even have a fake padlock icon that ordinarily is used to denote a secure site.

NEVER provide your password over the phone or in response to an unsolicited phone or Internet request.  A financial institution would never ask you to verify your account number or PIN online. Thieves armed with this information and your account number can help themselves to your money.  Also, never click on the link provided in an email you believe is fraudulent. It may contain a virus that can contaminate your  computer.

Don't be intimidated by an email or caller who suggests dire consequences if you do not immediately provide or verify financial information. 

Review account statements regularly to ensure all transactions are correct, and online account activity to catch suspicious activity. 

If you have been a victim of an Internet scam or have received an email that you believe was an attempted scam, please file a complaint at www.IC3.gov.

What to do if it happens: If you have given out your debit card account number or PIN, your card has been compromised and should be shut down and replaced.  

1.    If you fall victim to an attack, alert us immediately to protect yourself.  Call 866.771.8924.  

2.    Place fraud alerts on your credit files, to help prevent thieves from opening an account in your name.

3.    To place the alerts, call or log onto:
    Equifax (800) 525-6285
    Experian (888) 397-3742
    TransUnion (800) 680-7289

4.    Monitor your credit files and account statements closely.

5.    Verify your account information by requesting your credit report annually.  Blackhawk Bank will provide you with a FREE Credit Report and Score once per year from TransUnion. You can also request a copy by contacting one of the three major credit bureaus.

Also contact the Federal Trade Commission to report what happened. You can call the FTC's ID Theft Hotline: 1-877-IDTHEFT (438-4338) for up-to-date information about how to work with credit bureaus and law enforcement agencies to reclaim your identity. The FTC's website: www.ftc.gov is a one-stop national resource to learn about the crime of identity theft. It provides detailed information to help deter, detect, and defend against identity theft. Consumers can learn how to avoid identity theft – and learn what to do if their identity is stolen. Businesses can learn how to help their customers deal with identity theft, as well as how to prevent problems in the first place.

To Report a Lost or Stolen Debit MasterCard:
Call Client Services @ 866-771-8924 from 8:00 AM - 6:00 PM Monday - Friday; 8:30 -12:30 Saturday. After hours, please call 866.546.8273

Protect Your Mobile Device:

  • When purchasing a smartphone, know the features of the device, including the default settings. Turn off features of the device not needed to minimize the attack surface of the device.
  • Depending on the type of phone, the operating system may have encryption available. This can be used to protect the user’s personal data in the case of loss or theft.
  • With the growth of the application market for mobile devices, users should look at the reviews of the developer/company who published the application.
  • Review and understand the permissions you are giving when you download applications.
  • Passcode protect your mobile device. This is the first layer of physical security to protect the contents of the device. In conjunction with the passcode, enable the screen lock feature after a few minutes of inactivity.
  • Obtain malware protection for your mobile device. Look for applications that specialize in antivirus or file integrity that helps protect your device from rogue applications and malware.
  • Be aware of applications that enable geo-location. The application will track the user’s location anywhere. This application can be used for marketing, but can also be used by malicious actors, raising concerns of assisting a possible stalker and/or burglaries.
  • Jailbreak or rooting is used to remove certain restrictions imposed by the device manufacturer or cell phone carrier. This allows the user nearly unregulated control over what programs can be installed and how the device can be used. However, this procedure often involves exploiting significant security vulnerabilities and increases the attack surface of the device. Anytime an application or service runs in “unrestricted” or “system” level within an operation system, it allows any compromise to take full control of the device.
  • Do not allow your device to connect to unknown wireless networks. These networks could be rogue access points that capture information passed between your device and a legitimate server.
  • If you decide to sell your device or trade it in, make sure you wipe the device (reset it to factory default) to avoid leaving personal data on the device.
  • Smartphones require updates to run applications and firmware. If users neglect this, it increases the risk of having their device hacked or compromised.
  • Avoid clicking on or otherwise downloading software or links from unknown sources.
  • Use the same precautions on your mobile phone as you would on your computer when using the Internet.

FDIC Consumer News frequently publishes articles about common frauds to avoid.  Con artists are very good at tricking consumers into parting with money or divulging personal information that can be used to steal funds or run up thousands of dollars in fraudulent credit card charges. Stay up to date @ www.fdic.gov/consumers/consumer/news/index.html.

FBI Security Announcements - Here's an opportunity to stay current with documented fraudulent activities and schemes by viewing the  FBI's Investigative Programs / Cyber Investigations E-Scams and Warnings page.