------
------
header

Mobile Fraud

header
  Mobile Security Mobile Fraud

Take a proactive role in protecting your identity and personal financial information by staying informed on mobile security. To help minimize your exposure to fraud, keep the following tips in mind.

Recognize a Fake Mobile Banking App

Fraudsters and criminals may create fake mobile banking applications that look like NBT Bank or other financial institution's apps but in reality are designed to steal your Online Banker credentials or personal information. Here are a few tips to help you recognize an unofficial NBT Bank Mobile Banking app:

  • The developer or author of the application is not NBT Bank.
  • The app is being promoted on a third-party web site-somewhere other than the official app store for your mobile device.
  • There is a charge for downloading the app. NBT Bank does not currently charge a fee for its Mobile Banking application.

Do not download or install a NBT Bank Mobile Banking app if you spot any of these warning signs.

SMShing

SMShing is a form of criminal activity using social engineering techniques similar to phishing. The name is derived from "SMS Phishing." SMS (Short Message Service) is the technology used for text messages on cell phones.

Similar to phishing, SMShing uses cell phone text messages to get you to provide your personal information. The fraudsters may use a web site URL to capture your information once you click on it, but the use of a phone number that connects to an automated voice response system is also popular.

Do not respond to a text message that requests personal, business or financial information. NBT Bank will never ask you to provide personal or account information this way.

Traditional Online Threats

Just like your PC, mobile devices (such as phones and tablets) can be infected by viruses, malware and other programs intended to steal your personal, business or financial information. Protect yourself from these threats:

  • Back up your device regularly. Back up your device regularly to ensure your records are stored in a secure location.
  • Install anti-virus software. If your device supports traditional anti-virus software, consider installing it and even syncing it with your PC.

These steps will help you restore data in the event you need to wipe the device clean in order to remove a virus or other threat.

Lost or Stolen Devices

If your device is lost or stolen, your personal information could be at risk. Taking steps now to protect yourself will help you act quickly and confidently if the need arises.

  • Secure your phone by setting up a password or PIN. Most mobile phones let you set up a password or PIN, requiring that it's entered into your phone prior to use.
  • Enable screen-locking. Enable a screen-locking mechanism to lock the device when it's not actively being used.
  • Obtain a remote wipe program. Consider a remote wipe program that gives you the ability to send a command to your device to delete any and all data from harm's way.
  • Keep good records. Maintain a record of your device's make, model and serial number so that it may be reported if your device is stolen.