Security | Personal | Fraud Alerts & Scams
Staying up to speed on the latest online tactics is a great way to make sure you don't become the next victim. Familiarize yourself with how the schemes below work and check back from time to time to get more information on new scams.
If you receive an unsolicited offer that promises you something in exchange for money or account information, you should not respond unless you are sure the offer is legitimate. Common scenarios include offers that require an upfront fee, requests to wire funds, a notice that you won a lottery/contest, or a person on a social website who asks for money (e.g., travel money to meet you, emergency cash, medical bills, etc.).
If you receive an offer or request and are unsure if it is legitimate, contact First Link at (800) 382-5465. Remember, if it sounds too good to be true, it probably is.
If your business accepts wires and/or sends outgoing wires to or on behalf of customers, beware of a scheme in which hackers can take over a legitimate email address and initiate fraudulent wire requests.
Ensure that your business has procedures in place to verify any wire that is received via email or fax. For example, calling your customer directly using a phone number on file before proceeding with a wire can determine if the customer actually sent the request.
If you become aware that your customer's email has been compromised, advise the customer to contact their email and virus software providers, as their password/account information could have been compromised by a third party.
The First Horizon Family of Companies takes your account security very seriously. Sometimes fraudsters have the ability to take over a customer's email accounts and send requests to bank employees asking for wire transfers or account information. Please be assured that we will never disclose your personal account information or initiate a wire transfer via e-mail.
There are steps you can take to help protect yourself against this scheme, such as:
If you become aware of sensitive information that has been compromised through your email, contact your email and virus software providers, as your password/account information could have been compromised by a third party.
Identity theft is affecting more consumers and causing higher losses than the nation has seen in three years. In 2012, almost 5% of the U.S was affected, which is approximately 13 million individuals, or about one victim every three seconds.
To avoid becoming a victim of identity theft:
For more information about identity theft or to file a report, contact the Federal Trade Commission (FTC) at http://www.consumer.ftc.gov/.
If you notice suspicious activity on your account, contact First Link at (800) 382-5465.
Phishing refers to criminals' attempts to steal personal financial information, such as credit card numbers, account usernames/passwords, and Social Security numbers, through fraudulent e-mails and web sites that will be used for identity theft or other fraudulent purposes.
How phishing works:
Phishing Red Flags:
Click here to find out what to do if you have disclosed sensitive information in a Phishing attack.
Did you know that some companies use hidden software to learn more about you? It's called Spyware, and it's becoming an annoying Internet reality.
Spyware is a form of software that collects personal and confidential information from the computer without the user's knowledge or consent. Information that can be collected using spyware includes user IDs and passwords to websites or applications, online purchasing activity information, and e-mail/chat correspondence.
By simply clicking on a pop-up ad, downloading music files, installing free programs, opening e-mail attachments, or simply visiting a particular web site, you could be unwittingly installing Spyware files that track your online activities and report back to the company that created the files.
Often these files are used by legitimate advertising and marketing firms to learn more about online user behavior. However, some criminals are now using Spyware files to vandalize your computer systems or target your personal information. These types of Spyware programs may be used to delete your files or download new software, reformat your hard drive, or even change your default homepage. Criminals have also used them to monitor keystrokes or investigate periphery equipment connected to a computer.
Computer users can detect and possibly prevent Spyware by:
For tips on how you can protect yourself from spyware threats, click here.
With the increasing popularity of smartphones, more and more people are using apps to conduct personal business online – business that often requires the use of sensitive information such as bank account numbers, credit card data, or passwords.
While your smartphone can make life simpler, you should also be aware of potential threats to the security of your smartphone and the precautions you can take to keep it secure.
There are three areas where smartphone users can potentially fall victim to fraudulent activity. Keep these in mind as you use your smartphone as well as the related tips for preventing fraud. Click here for a downloadable guide or click here to view a video on smartphone security.
If you've owned a smartphone for any length of time, chances are
you've probably misplaced it, at least temporarily. The danger here
is that, if you've made purchases on your phone or, perhaps,
conducted banking activities with it, someone who finds or steals
your phone may be able to extract sensitive personal information
Hackers often use apps to entice smartphone users into downloading malware that can steal information or cause damage to your phone.
Surfing on open Wi-Fi networks
Cybercriminals often use unprotected Wi-Fi hotspots to target people online.
First Tennessee’s Multi-Layered Mobile Banking Security
When you use Mobile Banking from First Tennessee, you can be certain that your personal information is protected. Our security measures are delivered in a multi-layered platform that offers you security at each level of your Mobile Banking experience.
You will provide credentials upon first use, and your identity is then verified by answering challenge questions generated by First Tennessee’s existing authentication system. Once verified, you can use the device to immediately access mobile banking functionality.
Initiating a secure session requires two factors of authentication: 1) Your confidential passcode; 2) Confirmation of the correct end user device. Without both, authentication will not occur and log-in is prevented. Our process requires that our Mobile Banking users must have previously proven to the bank that the device being authenticated is in the user’s possession and is authorized for access.
Our systems periodically present mobile users with step-up challenge questions in response to transfer, payment, and check deposit transactions deemed high risk or suspicious. This safeguard provides you with an extra level of security before a transaction is approved.
Forgot User ID?
Not signed up? Enroll now
© 2015 First Tennessee Bank
Banking products and services are provided by First Tennessee Bank National Association. Member FDIC. Equal Housing Lender.