PROTECT YOURSELF FROM SCAMS
At SunBank, the security of your accounts and personal information is our top priority. Fraudulent e-mails or texts may appear to be from SunBank because the impostors want their messages to look real. Among other deceptions, they disguise the communications to appear to be those of SunBank. They are not. You are often asked to validate or confirm your personal information by sending a reply, clicking on a link, caling a phone number, or opening an attachment. These messages can contain viruses designed to record your keystrokes and may also direct you to a counterfeit website that appears to be genuine.
Occasionally we will send out e-mails with special offers or information on new products or services. The links in those e-mails will lead you to legitimate pages on sunbankaz.com website.
CONTROL YOUR IDENTITY
SunBank strives to deliver superior new products and services that truly are valuable and convenient. As the modern, financial landscape continues to evolve, we're committed to a thoughtful approach to providing the utmost in protection services for our valued customers.
SunBank's Identity Protection fraud prevention tools are designed to help you maintain control over your identity. Identity Protection is simple to use, and completely comprehensive - just the right fraud protection for you.
Enroll Now »
More Information »
AVOID E-MAIL FRAUD
With a few simple steps, you can help protect your SunBank accounts and personal information from fraudulent activity:
- Look beyond the logo. To make fraudulent e-mails or websites appear real, scammers often include actual logos and images of legitimate companies. They also convey a sense of urgency, stating that if you fail to provide, update or verify your personal or account information, access to your accounts will be suspended. It's important that you look beyond the logo and not give out your information.
- Type, don't click. Even if you do open a suspicious e-mail, don't click on any links. By clicking on the links you could unknowingly download a virus or spyware to your computer. Even if you think the e-mail is legitimate, type web addresses into your browser instead of clicking on links. If the e-mail is from an institution you do business with, use a bookmark that you've already created to visit the company's website.
- Be suspicious of any e-mail that asks for personal information, requests your authentication, or indicates a problem with your SunBank accounts. If you receive an e-mail like this, do not reply by e-mail. Instead, call the Customer Service at 1-866-480-8199 to verify the legitimacy of the e-mail.
- Don't trust e-mail headers, which can be easily forged.
- Avoid filling out forms in e-mail messages. You can't know with certainty where the data will be sent and the information can make several stops on the way to the recipient. Instead, contact the company cited in the e-mail using a telephone number or by visiting a website you know to be genuine or choosing one from your "favorites" list.
- If you want to do business online, don't click on links in e-mails of unknown origin. Go to the company's website yourself and fill out information there.
- Always sign off from websites or secure areas of websites (for example, online banking) for which you use an ID and password to enter.
- Make sure the security features of your computer software, including your web browser, are up-to-date (see "web browsers"). Software companies provide security updates to their products on an ongoing basis. To learn more about keeping your computer security current, get tips and information from the National Cyber Security Alliance.
- SunBank does not request personal information from customers via e-mail or pop-up windows.
- Do not open attachments. SunBank does not send e-mail attachments, other than in instances where the Bank has deemed that the content of an e-mail message warrants encryption for security purposes.
- Only provide your personal information if you initiated the sign-on process to your account at SunBank.
- Use virus protection software and keep the virus lists current.
- Keep your computer's operating system and web browser up-to-date.
PROTECT YOUR PDA OR CELL PHONE
Follow general guidelines for protecting portable devices. Take precautions to secure your cell phone and PDA the same way you should secure your computer.
- Be careful about posting your cell phone number. Attackers often use software that browses web sites for cell phone numbers. These numbers then become targets for attacks and spam. By limiting the number of people who have access to your information, you limit your risk of becoming a victim.
- Do not follow links sent in email or text messages. Be suspicious of links sent in unsolicited email or text messages. While the links may appear to be legitimate, they may actually direct you to a malicious website.
- Be wary of downloadable software. There are many sites that offer games and other software you can download onto your cell phone or PDA. This software could include malicious code. Avoid downloading files from sites that you do not trust. If you are getting the files from a supposedly secure site, look for a website certificate.
- Evaluate your security settings. Make sure that you take advantage of the security features offered on your device. Attackers may take advantage of Bluetooth connections to access or download information on your device. Disable Bluetooth when you are not using it to avoid unauthorized access (see Understanding Bluetooth Technology for more information).
How Scammers Obtain Your E-mail Address or Mobile Number
Many scammers randomly generate e-mail addresses or mobile numbers - that's why you may have received fraudulent e-mails or texts that appear to be from banks you do not have an account with. They also purchase mailing lists, obtain e-mail addresses and mobile numbers online from web pages, chat rooms, online auctions and directories, or from illegitimate sources.