Sno Falls Credit Union on illustrated background

Safe & Sound

We work diligently to ensure your data is held with the highest security. If anything is ever in question, we’re here. Below are several ways you can reach us or get an extra layer of protection.

Lost or Stolen Cards

During business hours call (800) 243-7860

After business hours call (888) 241-2510  

Report electronic fraud by emailing:

Beware Of Tax Fraud

Stay safe this tax season by reviewing common tax fraud below.

• The IRS reminds taxpayers to be aware of criminals who make aggressive calls posing as IRS agents in hopes of stealing taxpayer money or personal information.

• The IRS does not send emails about your tax refundor sensitive financial information.

• Do not click on suspicious texts, online links, orpop-ups this tax season. Scammers can not only stealinformation this way but they can also install malware.

Common Fraud

Fraud is on the rise with more and more opportunities for scammers to take advantage of consumers. Here are some quick tips on how to keep your online accounts safe.

  1. Use two-factor/multi-factor authentication
    Two-factor/multi-factor authentication, or an authentication system that requires more than one distinct authentication factor for successful authentication1, makes it hard for a scammer to gain access to your accounts. These are the three categories: Something you know (like a password or PIN), something you have (like a smart card/token), or something you are (like your fingerprint/face ID).

  2. Set up unique passwords/usernames
    When you reuse a password for social media profiles, apps, email accounts, online shopping and even medical sites, you are increasing your risk of being hacked. If a scammer finds out one password/username that you use for multiple platforms, they can rapidly gain access to other sites that use the same login information.

  3. Imposter Fraud
    Imposter fraud involves scammers who lie and pretend to be someone else in order to trick you into sending money or sensitive information to them. The FTC reported $2.3 billion lost to imposter fraud in 2021, making it the second most frequent type of fraud behind identity theft.1

    Examples of imposter fraud include:

    • Direct Impersonation
    Scammers may call or text you pretending to be a large retail company such as Amazon in order to obtain money/sensitive information under the guise of giving you a refund for a purchase you may have never made or a prize for a contest that you never entered. Another example includes dishonest persons who impersonate charities like St. Jude while pocketing donations. This type of imposter fraud often occurs during holiday season or following natural disasters. Other scammers even reach out via social media or banking apps like Venmo disguised as your family member/close friend in desperate financial need. Criminals have also been known to pose as the IRS asking for your social security number or other sensitive information, especially throughout tax season.

    • Remote Computer Access
    Imposter fraud includes scammers who contact you asking for remote digital device access in order to perform tasks such as tech repair or bank assistance. Often these hackers are impersonating trusted companies like Apple or your primary financial institution. If the imposter is given access, they can wreak havoc on your personal data. They can access and steal information on the spot or install malware and remotely return to your device for future hacking.

    • Gift Cards/Wire Transfers
    It’s a cause for concern when any online retailer or service provider ask for payment via gift card or wire transfer. Gift card fraud is popular with scammers because gift cards are easy for consumers to find and buy, and they have fewer protections for buyers compared to other payment options. Both gift card and wire transfers are more like cash: once these forms of payment been transferred to the imposter, the money is near impossible to trace and have return.

    Always verify identity before giving out sensitive information or money. Never allow remote access to any device unless the user is authenticated. And finally, consider the implications of scammer activity when choosing your payment option for online purchases. For more information on imposter fraud and how to prevent it, click here.

  4. Do your homework
    Scammers often pose as fake companies or online sellers during the holiday season. If you see a social media ad or website popup that’s too good to be true, we recommend not inquiring with the company or seller. Scammers can also take advantage of consumers by sending suspicious emails asking for login information, offering a free gift or inviting you to claim a prize. If you are familiar with the vendor, visit their website directly to see if the deal is real. In most cases, it is best to go straight to the source when purchasing this holiday season.

  5. Subscription Services
    Watch out for subscription services with fine print indicating an unusually large subscription amount per month after the initial payment. Card companies will often side with the subscription service if fraud is reported due to the contract confirmed on your end.

Learn more tips on how to avoid fraud from the FTC.

Identity Theft Detection & Recovery Services

Help better protect yourself and your joint account owners with IDProtect® identity theft monitoring and resolution service that includes credit file monitoring with up to $10,000 in identity theft expense reimbursement. Learn more

Russia | Ukraine Fraud

Scammers may reach out via text, call, email or social media in attempt to steal your funds or personal information citing the Russia/Ukraine War. Scammers may ask for money to escape their country, or bury a loved one. Avoid answering suspicious communications as well as links and never send funds to a recipient that you would not give cash to.

Dangers Of Public Charging

Planning to travel? The FBI warns consumers against using free public charging stations, such as those found in airports, hotels or shopping centers.

Crooks have managed to load malware onto public USB charging stations to maliciously access electronic devices while they are being charged, AKA Juice Jacking. Malware installed through a corrupted USB port can lock a device or export personal data and passwords directly to the perpetrator. Criminals can then use that information to access online accounts or sell it to other bad actors.

In some cases, criminals may have intentionally left cables plugged in at charging stations. There have even been reports of infected cables being given away as promotional gifts.

Here are some tips to help you avoid becoming a Juice Jacking victim:

  • Avoid using a public USB charging station. Use an AC power outlet instead.
  • Bring AC, car chargers, and your own USB cables with you when traveling.
  • Carry a portable charger or external battery.
  • Consider carrying a charging-only cable, which prevents data from sending or receiving while charging, from a trusted supplier.
  • If you plug your device into a USB port and a prompt appears asking you to select “share data” or “charge only,” always select “charge only.”
  • USB Data-blockers are recommended to keep data safe when charging devices in public.