{"id":4963,"date":"2021-11-16T15:33:00","date_gmt":"2021-11-16T23:33:00","guid":{"rendered":"https:\/\/www.soundcu.com\/?p=4963"},"modified":"2025-10-27T12:31:48","modified_gmt":"2025-10-27T19:31:48","slug":"safeguard-yourself-from-cybercrime","status":"publish","type":"post","link":"https:\/\/www.soundcu.com\/blog\/safeguard-yourself-from-cybercrime\/","title":{"rendered":"Safeguard Yourself from Cybercrime"},"content":{"rendered":"<div class=\"co-flex_row co-flex_row__blue co-flex_row__long-form-text co-flex_row__next_row__blog-contributors\" >\n\t<div class=\"co-flex_row--row co-row\">\n\t\t\t<div class=\"co-long_form\">\n\t\t\t\t\t<div class=\"co-long_form--block co-long_form--block__nomedia prow items-start \">\n\t\t\t\t<div class=\"co-long_form--text pcol-md:12\">\n\t\t\t\t\t<div class=\"co-long_form--content\"><h2 class=\"h3\">Phishing, Smishing, hacking, spam, malware, oh my!<\/h2>\n<p>You\u2019ve heard the words describing how hackers and scammers gain access to online information, but do you know what they really mean? Phishing, Smishing, hacking, spam? Here\u2019s a short guide to explain cybercrime terms and how to keep your data safe.<\/p>\n<h2>Phishing Emails<\/h2>\n<p>Phishing attacks normally use emails with malicious website links within the email to gain access to your computer, and in turn, your accounts. Here\u2019s how it works: You receive an enticing email about a great deal on a product or an urgent message that you need to act on immediately, and within it are links to a counterfeit website. Once you click the link, scammers trick you into giving financial data, such as user names and passwords. Some phishing attacks plant malware in the email itself, so that once it\u2019s opened, the criminal can steal credentials directly from your computer.<\/p>\n<p><strong><em>How to avoid:<\/em><\/strong> Do not open any emails you don\u2019t recognize and don\u2019t click on any links within an email you don\u2019t recognize coming from a person or company you know. If you are asked to visit a website that seems like it\u2019s one you\u2019re familiar with, check the URL because many times a counterfeit URL will use the company name and .net or .biz instead of .com \u2014 a slight but important difference. However, note that a URL with a .com suffix is not always safe. If you question the email, pick up the phone and call the company to see if the email is legit.<\/p>\n<h2>Social Media Phishing<\/h2>\n<p>Phishing isn\u2019t limited to email. Cybercriminals also create links in social media through online ads, tweets, and posts, promising something that is too good to be true. What\u2019s really happening is that they\u2019re trying to gain access to your personal data and accounts once you click the link. If it looks at all suspicious, it most likely is.<\/p>\n<p><strong><em>How to avoid:<\/em> <\/strong>Don\u2019t click on the link. As the National Cybersecurity Alliance urges: \u201cWhen in doubt, throw it out.\u201d<\/p>\n<h2>Spam \u2014 No, It\u2019s Not Pressed Meat<\/h2>\n<p>Spam in your inbox is no different than junk mail in your mailbox. It\u2019s unsolicited, unrequested and unwanted email, and its purpose is to get you to open it for malicious purposes.<\/p>\n<p><strong><em>How to avoid:<\/em><\/strong> Enable a spam filter from your email provider to prevent unwanted messages from reaching your inbox, and report any spam emails that make it through. Hide your email address from any online profiles and social media accounts. You can also check for spam detectors on your cell phone or through your carrier, which indicate whether an incoming call is likely spam.<\/p>\n<h2>Smishing<\/h2>\n<p>Text message scams \u2014 also known as \u201csmishing\u201d \u2014 became a prevalent form of phishing a couple of years ago. It\u2019s a phishing attack delivered via text message. This scam sends an urgent text message to your phone, trying to get you to click on a link within the text, text back requested information or call a fraudulent number. It\u2019s especially used with people who do <a href=\"https:\/\/www.soundcu.com\/personal\/online-banking\/\">online banking<\/a> or bill pay. Examples include receiving a message that states your account, debit or <a href=\"https:\/\/www.soundcu.com\/personal\/credit-cards\/\">credit card<\/a> has been suspended and to click on the link included within the text to unlock it. Or you may receive a message to verify account information, or to transfer money to a stranded relative.<\/p>\n<p><strong><em>How to avoid:<\/em><\/strong> Do not click on any link or phone number within a text message unless you\u2019re sure what it\u2019s for. If you receive a message about a frozen or locked bank account or account verification, pick up the phone and call your credit union to verify its legitimacy.<\/p>\n<h2>Malware<\/h2>\n<p>This term refers to harmful software that hackers try to install on your computer through a variety of means. Malware contains viruses \u2014 sometimes ransomware for businesses \u2014 that can take control of your computer, monitor your actions and keystrokes, and gain access to personal data stored on your computer.<\/p>\n<p><strong><em>How to avoid:<\/em> <\/strong>Once again, it\u2019s all about what you don\u2019t do. Don\u2019t open any suspicious emails, click on any links, or download any files you don\u2019t recognize.<\/p>\n<p><em>This article is shared by our partners at <a href=\"https:\/\/nwcua.org\/\" rel=\"noopener\">Northwest Credit Union Association<\/a>.<\/em><\/p>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t<\/div>\n<\/div>\n\n\n<div class=\"co-flex_row co-flex_row__last co-flex_row__blog-contributors\" >\n\t<div class=\"co-flex_row--row co-row\">\n\t\t\t<div class=\"co-blog_contributors\">\n\t\t\t\t\t<div class=\"co-blog_contributor\">\n\t\t\t\t<div class=\"co-blog_contributor--img_wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.soundcu.com\/files\/HomanCharlene_scu-86_300x300.jpg\" class=\"co-blog_contributor--img\" alt=\"Charlene Homan Sound Credit Union Risk Management &amp; Compliance\" srcset=\"https:\/\/www.soundcu.com\/files\/HomanCharlene_scu-86_300x300.jpg 300w, https:\/\/www.soundcu.com\/files\/HomanCharlene_scu-86_300x300-150x150.jpg 150w, https:\/\/www.soundcu.com\/files\/HomanCharlene_scu-86_300x300-75x75.jpg 75w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div>\t\t\t\t<div class=\"co-blog_contributor--content\">\n\t\t\t\t\t<h3 class=\"co-blog_contributor--name\">Charlene Homan<\/h3><div class=\"co-blog_contributor--title\">VP Risk Management &#038; Compliance<\/div><div class=\"co-blog_contributor--bio text-component\"><p>Charlene Homan serves as the Vice President of Risk Management and Compliance at Sound Credit Union, where she leads compliance initiatives and oversees risk management strategies, including BSA compliance, fraud prevention, quality assurance, and enterprise risk management. With over 15 years in the credit union industry, Charlene has advanced from an entry-level position to her current leadership role, demonstrating comprehensive understanding of credit union landscape that supports Sound Credit Union&#8217;s values while ensuring a strong commitment to regulatory compliance and risk management.<\/p>\n<p>As Sound&#8217;s appointed Compliance Officer, Charlene ensures adherence to all relevant laws and regulations while providing essential oversight on compliance issues, with the overarching goal of effectively serving members. She actively engages in professional development by attending key industry conferences and training programs. She is passionate about supporting her teams to create awareness to the membership and surrounding communities, with the intent to empower individuals to protect themselves from common scams and other fraud activities.<\/p>\n<\/div>\t\t\t\t\t\t<div class=\"co-blog_contributor--social\">\n\t\t\t\t\t\t\t<span>Connect<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/charlene-homan-1a856662\/\" class=\"co-social_share--link\" target=\"_blank\" rel=\"noopener noreferrer\" aria-label=\"LinkedIn\">\n\t\t\t\t\t\t\t\t\t<svg class=\"icon-svg\" viewBox=\"0 0 24 24\" role=\"img\" aria-label=\"Icon LinkedIn\">\n\t\t\t\t\t\t\t\t\t\t<use xlink:href=\"https:\/\/www.soundcu.com\/wp-content\/themes\/soundcu-theme\/images\/sprite-icons.svg#linkedin\" \/>\n\t\t\t\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Enable a spam filter from your email provider to prevent unwanted messages from reaching your inbox, and report any spam emails that make it through. <a href=\"https:\/\/www.soundcu.com\/blog\/safeguard-yourself-from-cybercrime\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":10,"featured_media":4964,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","_searchwp_excluded":"","footnotes":""},"categories":[47],"tags":[117,64,118,119,115,120,121,122],"class_list":["post-4963","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tools-advice","tag-cybercrime","tag-fraud","tag-protect","tag-protection","tag-scammers","tag-scams","tag-security","tag-suspicious"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.soundcu.com\/wp-json\/wp\/v2\/posts\/4963","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.soundcu.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.soundcu.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.soundcu.com\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.soundcu.com\/wp-json\/wp\/v2\/comments?post=4963"}],"version-history":[{"count":3,"href":"https:\/\/www.soundcu.com\/wp-json\/wp\/v2\/posts\/4963\/revisions"}],"predecessor-version":[{"id":17402,"href":"https:\/\/www.soundcu.com\/wp-json\/wp\/v2\/posts\/4963\/revisions\/17402"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.soundcu.com\/wp-json\/wp\/v2\/media\/4964"}],"wp:attachment":[{"href":"https:\/\/www.soundcu.com\/wp-json\/wp\/v2\/media?parent=4963"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.soundcu.com\/wp-json\/wp\/v2\/categories?post=4963"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.soundcu.com\/wp-json\/wp\/v2\/tags?post=4963"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}