Identity Thieves Are Great Impersonators. Don’t Get Fooled! Knowledge Center by: Anna Beam, Vice President | Associate Marketing Director Sep 25th, 2017 Information SecurityInternet Security From sending emails that appear to be from companies you know and trust, requesting donations in light of the recent natural disasters (fires, hurricanes, and earthquakes), utilizing fear from the recent Equifax data breach to obtain personally identifiable information (i.e. credit card data, account information, etc.), to adding card-reading devices to ATMs, fraudsters rely on creative ways to obtain your confidential information. Emails may steer you to fake websites or bogus call centers to get your (personally identifiable) information. Be careful anytime you’re sharing or using confidential information. Remember, NBH Bank will never send an email to obtain your user name, password, personal identification number (PIN) or other account information. Tips for keeping your identity safe DO NOT click on links, open attachments or call phone numbers provided in suspicious emails. Delete the email without responding. Review your account transactions regularly for anomalies or inconsistencies. Observe your surroundings before using ATMs. Don’t use an ATM if you see anyone or anything suspicious. Alert the appropriate financial institution if you see exposed wires or unusual equipment, which may be a device used to steal card numbers and PINS. When traveling for an extended period, have the post office hold your mail until you return. Mail often contains information that can be used to commit identity theft or other types of fraud. Only carry cards you use often, and never write your PIN on them. Call our Client Services and Solutions Specialists if your card is lost or stolen. If you believe your personal or confidential information has been compromised, contact your banking center manager or call our Client Services and Solutions Specialists at 800.867.2265. We place the highest priority on protecting confidential client information, monitoring daily activity and reporting suspicious behavior. But there are also things you can do to protect yourself. We invite you to visit our Knowledge Center for tips and tools to help protect your information.