Check back often for tips and best practices for keeping your information secure and identifying potential fraud.
You’ve just won a lottery or sweepstakes that you didn’t even know you had entered!
Sounds too good to be true? You’re right! Odds are it’s a scam.
Maybe it happened like this…
What should you do?
Hang up the phone! Ignore the email! Shred the letter!
Never wire or send money to anyone, anywhere, who says you’ve won a prize.
The checks associated with lottery and sweepstakes scams are fraudulent. These counterfeit checks can sometimes take several days to be discovered and returned to GBT unpaid. You are responsible for any check(s) you cash or deposit into your account. If you should cash or deposit a check that is returned for any reason, you are fully responsible for loss related to the fraudulent check. In most cases, GBT can immediately debit your account(s) or file litigation to recover the money.
Older Americans are often targeted by scammers. If you’re a caregiver for family or a friend, warn them about lottery and sweepstakes scams.
To learn more about protecting yourself and others, visit:
What is a corporate account takeover?
Simply put, corporate account takeover is the business equivalent of personal identity theft. Hackers, backed by professional criminal organizations, are targeting small and medium businesses to obtain access to their web banking credentials or remove control of their computers.
These backers will then drain the deposit and credit lines of the compromised bank accounts, funneling the funds through mules that quickly redirect the monies overseas into backers accounts. A computer can be compromised very easily by visiting an infected website or by simply opening an email.
There has been a steady increase in account takeovers since 2009 resulting in billions of dollars of damage.
Security best practices
When it comes to protecting sensitive financial information from hackers, there’s no substitute for good old-fashioned knowledge.
As a business owner, you should have a level of understanding about how to secure your computers that allows you to take proactive steps and avoid, or at least minimize most threats.
Experts advise following best practices including using a dedicated computer, keeping patches and anti-virus up to date, installing a host based firewall, verifying all transactions before approving and reviewing bank transactions daily.
These best practices should be the minimum security baseline for every company’s online banking transactions.
Steps for better security
Warning signs of a system or network compromise
Examples of deceptive ways criminals contact account holders
If you believe your Gibsland Bank & Trust account has been compromised contact us immediately.
The one-time refers to the security code being good for one-time only, not that the authentication security will occur one time. It will be at least once from each device and it also depends on your computer settings. Below are some FAQ’s that may help:
Advanced Login Authentication FAQs OLB Device Profile
Q: Why did I have to go through the additional authentication process? (Why did I get stepped up?)
A: Most common reason would be this is a new device profile identified for the customer or there has not been enough consistent use of the Device to confirm the correlation.
Because the Device Profiling looks at many factors together, as well as a system cookie and a Flash Object from a prior session, there are some instances where changes to a combination of factors would trigger a risk score that requires additional authentication.
These situations are difficult to pinpoint and difficult to explain but essential to appropriate assessment of risk.
Suggested response to consumers: We recently upgraded our security system and our system controls are asking you to confirm your PC and network path before proceeding. Please follow the instructions to provide additional authentication so the system can learn this profile is safe and you can access the system from this profile in the future.
Q: Are there adjustments that can made to my PC to make it work better?
A: There are some settings in a PC that make Device Profile work more effectively. Essentially these settings will expose more of the PC Profile to the Device Review so make it easier for the system to tell the legitimate customer from a fraud attempt.
If a user continues to get stepped up over and over, we have found that sometimes users’ browsers don’t encrypt the Device ID correctly and therefore cannot be recognized as a previously used Device.
Here are some hints we have found helpful in resolving client-side issues that prevent device from properly registering and resulting in users being stepped on every login:
Additionally some browser software/plug-ins stops items from loading and can limit our ability to recognize their system.
Helpful Hints for repeated step-up (step-up is the phone text or phone voice)
If user continues to get stepped up over and over, we have found that sometimes user’s browsers don’t encrypt the Device ID correctly and therefore cannot be recognized as a previously used Device. Here are some hints we have found helpful in resolving client-side issues that prevent device from properly registering and resulting in users being c stepped on every login:
Updating Safari settings on an IPad/IPhone
Gibsland Bank & Trust customers should be aware that fraudulent emails (“Phishing,” pronounced fishing) are being sent to some U.S. residents. These unsolicited “phony” emails are sent to random email addresses hoping to trick recipients into revealing their credit card or banking account numbers, PIN numbers, and/or online banking login data.
GBT policy does not allow requests for confidential information (passwords or PIN numbers) through regular email. Contact your local GBT Branch Office with questions or concerns.
The senders of these emails do not represent GBT. Please Do NOT reveal your information to them.
The UIGEA, signed into law in 2006, prohibits any person engaged in the business of betting or wagering (as defined in the Act) from knowingly accepting payments in connection with the participation of another person in unlawful internet gambling. The Dept of Treasury and the Federal Reserve Board have issued a joint final rule, Regulation GG, to implement this Act.
As defined in Regulation GG, unlawful Internet gambling means to “place, receive or otherwise knowingly transmit a bet or wager by any means which involves the use, at least in part, of the internet where such bet or wager is unlawful under any applicable Federal or State law in the State or Tribal lands in which the bet or wager is initiated, received or otherwise made”.
As a customer of Gibsland Bank & Trust these restricted transactions are prohibited from being processed through your account or banking relationship with us. Restricted transactions are transactions in which a person accepts credit, funds, instruments or other proceeds from another person in connection with unlawful Internet gambling.
If you do engage in an Internet gambling business and open a new account with us, you must provide evidence of your legal capacity to do so.
Be cautious when accepting $20 and $10 bills. A significant number of counterfeit bills have been detected in the Northwest Louisiana region in the past months.
All of the $20 bills contain the same serial number: JJ05094677B, blue ink in the top left corner of the face of the bill, the number 150 written upside down on the left hand side, close to the middle of the bill, and are 2009 series.
Some, but not all, of the $10 bills contain the same serial number: ML54581685A and are 2013 series.
Additional characteristics of the counterfeit currency are:
Click here for a document provided by the United States Secret Service, describing the security features in the most recently issued bills.