Fraud Center

Rocky Mountain Bank takes fraud prevention very seriously, and we are dedicated to helping you protect yourself.


Always remember that:

  • We will never ask you to send personal or financial information in response to or via a link in an email.
  • Our staff will never initiate a phone call asking for financial information such as your account numbers, social security numbers or balances.
  • When you call Rocky Mountain Bank, we may ask you for specific information in an attempt to verify your identity before disclosing financial information.
  • If we have reason to doubt the authenticity of a caller, we are not required to provide financial information.



Recent Fraud Alerts

Information from the Federal Trade Commission:

In a recent twist, scam artists are using the phone to try to break into your computer. They call, claiming to be computer techs associated with well-known companies like Microsoft. They say that they’ve detected viruses or other malware on your computer to trick you into giving them remote access or paying for software you don’t need.

These scammers take advantage of your reasonable concerns about viruses and other threats. They know that computer users have heard time and again that it’s important to install security software. But the purpose behind their elaborate scheme isn’t to protect your computer; it’s to make money.

If You Get a Call

If you get a call from someone who claims to be a tech support person, hang up and call the company yourself on a phone number you know to be genuine. A caller who creates a sense of urgency or uses high-pressure tactics is probably a scam artist.

Keep these other tips in mind

  • Don’t give control of your computer to a third party who calls you out of the blue.
  • Do not rely on caller ID alone to authenticate a caller. Criminals spoof caller ID numbers. They may appear to be calling from a legitimate company or a local number, when they’re not even in the same country as you.
  • Online search results might not be the best way to find technical support or get a company’s contact information. Scammers sometimes place online ads to convince you to call them. They pay to boost their ranking in search results so their websites and phone numbers appear above those of legitimate companies. If you want tech support, look for a company’s contact information on their software package or on your receipt.
  • Never provide your credit card or financial information to someone who calls and claims to be from tech support.
  • If a caller pressures you to buy a computer security product or says there is a subscription fee associated with the call, hang up. If you’re concerned about your computer, call your security software company directly and ask for help.
  • Never give your password on the phone. No legitimate organization calls you and asks for your password.

If You’ve Responded to a Scam

If you think you might have downloaded malware from a scam site or allowed a cybercriminal to access your computer, don’t panic. Instead:

  • Get rid of malware. Update or download legitimate security software and scan your computer. Delete anything it identifies as a problem.
  • Change any passwords that you gave out. If you use these passwords for other accounts, change those accounts, too.
  • If you paid for bogus services with a credit card, call your credit card provider and ask to reverse the charges. Check your statements for any other charges you didn’t make, and ask to reverse those, too.
  • If you believe that someone may have accessed your personal or financial information, visit the FTC’s identity theft website . You can minimize your risk of further damage and repair any problems already in place.
  • File a complaint with the FTC at ftc.gov/complaint .

For more information, visit www.consumer.ftc.gov/articles/0346-tech-support-scams .




Common Online Fraud Schemes

By being educated and following some simple tips, you’ll be less likely to fall victim to one of these schemes:

Card Cracking

Card cracking is a form of fraud where consumers respond to an online solicitation for "easy money" and provide a debit card for withdrawal of fake check deposits.

Phishing

Phishing schemes use forged emails claiming to be from someone you trust (an individual or company). They attempt to get you to reveal sensitive information, like user IDs, passwords, account numbers or other confidential data. These criminals will then use the information to access your accounts, financial information and/or your identity.

Vishing

With vishing, targets will receive a call to their cell phone, typically from a four-digit number, with a recording saying their debit card had been deactivated. The recording then asks customers to input their card number, personal identification number (PIN) and/or the card verification value (CVV). Oftentimes the caller may be armed with some of your information beforehand, leading to a false sense of security. Unless you initiated the call, simply hang up; do not provide any personal information, and contact us through our listed phone number(s).

Spoofing

Many forged emails will ask you to supply, confirm or update personal information by clicking a link in the email. The link will connect you to a web page or login that appears to belong to the company mentioned, but it is merely a “spoofed” site that is illegitimate. The spoof may be a pop-up window or an embedded image over the actual site. The goal of the criminals is to get you to enter your personal data so they can steal your information.

Prevent the hassle of fraud by adhering to the following tips:

  • Do not open emails from senders you do not know.
  • Never access a website from a link in an email from someone you do not know, especially one that asks for personal information.
  • If you have any doubts about the authenticity of an email, do not respond, call the sender or type in the web address.
  • Beware of emails offering you a prize or a discount and then requesting you to choose a user ID and password (thieves know that most people use the same access information for several accounts, which they can then use to log in to other sites, such as financial institutions and credit card sites).
  • Monitor your account closely and watch for unusual activity. By using Rocky Mountain Bank’s Online Banking, you can review your account 24/7.
  • Change your password every 60 days.
  • Note that fraudulent emails often include misspellings and poor grammar.
  • Use common anti-virus software, such as McAfee® and Norton™, and update it regularly.
  • Beware of emails with a sense of urgency or attempting to rush you into action. Messages similar to “Update now or we’ll close your account…” are most likely fraudulent.
  • Do not include personal or sensitive data in, or in a response to, an email.