Watch our webinar on fraud prevention and protecting your identity:

Protect yourself by avoiding giving out your:
  • Address and ZIP code
  • Phone number
  • Date of birth
  • Social Security number
  • Card or account number
  • Card expiration date
  • Card PIN number
  • Card Verification Value (CVV); a three-digit number located on the back of the card.
In stores and at ATMs watch for:
  • Cell phone cameras, mirrors, or other tools used to view cards and PINs
  • People watching your transactions
  • Cashiers taking your card out of sight; take it to the register yourself
  • Any unusual activity at ATMs or devices attached to the ATM 
Debit Card Fraud Protection
To protect your account, we monitor your debit card transactions for potentially fraudulent activity, which may include a sudden change in location (such as a card used unexpectedly overseas), an unusual string of costly purchases, or any pattern associated with new fraud trends around the world. We utilize eNFACT, a fraud monitoring system, to identify suspicious or potentially fraudulent transaction activity. This system detects changes in purchase activity and other patterns associated with fraudulent behavior.

If we suspect fraudulent debit card use, you will receive a telephone call from 1.877.253.8964 to validate the legitimacy of your transactions. Your participation in responding to our call is important in helping prevent potential risk and possible purchase restrictions placed on your card.
  • Our automated call will ask you to verify recent transaction activity on your card.
  • You’ll be able to respond via your touchtone keypad.
EnFACT Text Notifications:
  • Receive text alerts to your cellular phone for potential fraudulent debit card activity.
  • Respond with a text message back with a "Yes" or "No", which will allow or prohibit the activity to continue.
  • Telephone calls will still be made if no response is provided.
  • There is no registration required or associated fees for the service.
Our goal with debit card monitoring is to minimize your exposure to risk and the impact of fraud. To ensure we can continue to reach you whenever potential fraud is detected, please keep us informed of any changes to your phone number and residential address. To update your information, please visit any of our office locations, utilize secure forms within online banking, or call our Customer Service Center at 1.866.354.ECSB (3272).

Consumer Protection - Cybersecurity (Provided by the FDIC)
Consumers increasingly rely on computers and the Internet — the “cyber” world — for everything from shopping and communicating to banking and bill-paying. But while the benefits of faster and more convenient cyber services for bank customers are clear, the risks posed by these services as well as the strategies for preventing or recovering from cyber-related crimes may not be as well-known by the average consumer and small business owner.

Common cyber-related crimes include identity theft, frauds, and scams. Identity theft involves a crime in which someone wrongfully obtains and uses another person's personal data to open fraudulent credit card accounts, charge existing credit card accounts, withdraw funds from deposit accounts, or obtain new loans. A victim's losses may include not only out-of-pocket financial losses but also substantial costs to restore credit history and to correct erroneous information in their credit reports.

In addition to identity theft, every year millions of people are victims of frauds and scams, which often start with an e-mail, text message, or phone message that appears to be from a legitimate, trusted organization. The message typically asks consumers to verify or update personal information. Similarly, criminals create bogus websites for such things as credit repair services in the hopes that consumers will enter personal information.

If you think you are a victim of a fraud or scam, contact your state, local, or federal consumer protection agency. Also, a local law enforcement officer may be able to provide advice and assistance. By promptly reporting fraud, you improve your chances of recovering what you have lost and you help law enforcement. The agency you contact first may take action directly or refer you to another agency better positioned to protect you.

Violations of federal laws should be reported to the federal agency responsible for enforcement. Consumer complaints are used to document patterns of abuse, allowing the agency to take action against a company.

People who have no intention of delivering what is sold, who misrepresent items, send counterfeit goods or otherwise try to trick you out of your money are committing fraud. If you suspect fraud, there are some additional steps to take.
  • Contact the Federal Trade Commission. The FTC enters Internet, telemarketing, identity theft and other fraud-related complaints into Consumer Sentinel, a secure, online database available to hundreds of civil and criminal law enforcement agencies in the U.S. and abroad.
  • If the fraud involved mail or an interstate delivery service, contact the U.S. Postal Inspection Service ( It is illegal to use the mail to misrepresent or steal money.

How to Avoid Identity Theft (Provided by the FDIC)
The best protection against identity theft is to carefully protect your personal information, for example:

  • Do not share personal information over the phone, through the mail, or over the internet unless you initiated the contact or know the person you are dealing with;
  • Be suspicious if someone contacts you unexpectedly online and asks for your personal information. It doesn’t matter how legitimate the e-mail or website may look. Only open e-mails that look like they are from people or organizations you know, and even then, be cautious if they look questionable. Be especially wary of fraudulent e-mails or websites that have typos or other obvious mistakes;
  • Don’t give out valuable personal information in response to unsolicited requests. Social Security numbers, financial account information and your driver’s license number are some of the details that should be kept confidential;
  • Shred old receipts, account statements, and unused credit card offers;
  • Choose PINs and passwords that would be difficult to guess and avoid using easily identifiable information such as your mother’s maiden name, birth dates, the last four digits of your social security number, or phone numbers;
  • Pay attention to billing cycles and account statements and contact your bank if you don’t receive a monthly bill or statement since identity thieves often divert account documentation;
  • Review account statements thoroughly to ensure all transactions are authorized;
  • Guard your mail from theft, promptly remove incoming mail, and do not leave bill payment envelopes in your mailbox with the flag up for pick up by mail carrier;
  • Obtain your free credit report annually and review your credit history to ensure it is accurate;
  • Use an updated security program to protect your computer; and
  • Be careful about where and how you conduct financial transactions, for example don’t use an unsecured Wi-Fi network because someone might be able to access the information you are transmitting or viewing.

How to Avoid Frauds & Scams (Provided by the FDIC)
There are numerous scams presented daily to consumers so you must always exercise caution when it comes to your personal and financial information. The following tips may help prevent you from becoming a fraud victim.

  • Be aware of incoming e-mail or text messages that ask you to click on a link because the link may install malware that allows thieves to spy on your computer and gain access to your information;
  • Be suspicious of any e-mail or phone requests to update or verify your personal information because a legitimate organization would not solicit updates in an unsecured manner for information it already has;
  • Confirm a message is legitimate by contacting the sender (it is best to look up the sender’s contact information yourself instead of using contact information in the message);
  • Assume any offer that seems too good to be true, is probably a fraud;
  • Be on guard against fraudulent checks, cashier’s checks, money orders, or electronic fund transfers sent to you with requests for you to wire back part of the money;
  • Be wary of unsolicited offers that require you to act fast;
  • Check your security settings on social network sites. Make sure they block out people who you don’t want seeing your page;
  • Research any “apps” before downloading and don’t assume an “app” is legitimate just because it resembles the name of your bank or other company you are familiar with;
  • Be leery of any offers that pressure you to send funds quickly by wire transfer or involve another party who insists on secrecy; and
  • Beware of Disaster-Related Financial Scams.   Con artists take advantage of people after catastrophic events by claiming to be from legitimate charitable organizations when, in fact, they are attempting to steal money or valuable personal information.

Cybersecurity: How can you protect your entity from a cyber-attack? 

Adopt a Three-Step Strategy 

1. Select an industry recognized cybersecurity framework(s), for example: 

2. Establish a budget for meeting your cybersecurity strategy within a reasonable time. 

3. Hire an audit firm to review the implementation of your framework(s) rather than to review compliance with the minimum regulatory guidelines . The goal is to ensure key controls in your cybersecurity frameworks have been implemented and are functioning as intended. 

Complete the Ransomware Self-Assessment Tool 
The Bankers Electronic Crimes Task Force developed a Ransomware Self-Assessment Tool for businesses to use to close the gaps in security. Use the RSAT for businesses which is perfect for businesses to help ensure survival against this global threat. 

Building a Cybersecurity Program from Scratch 

For institutions that haven’t done so already, begin building a cybersecurity program by referencing trusted resources such as the Center for Internet Security Controls . Such resources address challenges faced by all entities. They are easily digestible, non-technical, and will help executives develop a comprehensive, responsive cybersecurity program in line with best practices.