South Central Power Stop Scams

Similar documents
Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Newcomer Finances Toolkit. Fraud. Worksheets

Online Scams. Ready to get started? Click on the green button to continue.

Safety and Security. April 2015

Best Practices Guide to Electronic Banking

Your security on click Jobs

TWINSBURG COMMUNITY SERVICE BUREAU. Senior Scam Workshop. Presented by Officer Ron Fruscella and Officer Greg Kopniske

It pays to stop and think

Top 5 Tips To Take A Stand Against Telephone Scams

Web Cash Fraud Prevention Best Practices

FAQ. Usually appear to be sent from official address

Common Scams and Fraud. Charlottesville/Albemarle County TRIAD Group

INFORMATION ABOUT SCAMS FOR RESIDENTS

commtech Online Holiday Shopping Tips A Guide Presented by: CommTech Industries

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam

Credit Card Frauds Sept.08, 2016

Financial scams. What to look for and how to avoid them.

The 12 scams of Christmas

Retail/Consumer Client Internet Banking Awareness and Education Program

WEB OF DECEIT. Why are seniors targeted?

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Target Breach Overview

CIBC FirstCaribbean Mobile App. FREQUENTLY ASKED QUESTIONS (FAQs)

Guide to Getting Started. Personal Online Banking & Bill Pay

IMPORTANT SECURITY INFORMATION PHISHING

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

Online Security and Safety Protect Your Computer - and Yourself!

1 of 11 10/1/ :26 AM

Introduction to

/ 1. Online Banking User Guide SouthStateBank.com / (800)

Create strong passwords

Personal Online Banking & Bill Pay. Guide to Getting Started

How to recognize phishing s

Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment

/ 1. Online Banking User Guide SouthStateBank.com / (800)

Employee Security Awareness Training

How to Keep Your Personal Information Secure

FRAUDULENT TRAVEL SCAMS

FREQUENTLY ASKED QUESTIONS

Train employees to avoid inadvertent cyber security breaches

How to Make a One-Time or Recurring Financial Gift to WCC

How Cyber-Criminals Steal and Profit from your Data

Homeowner Portal Tutorial Guide

Who We Are! Natalie Timpone

It is my great pleasure to inform that you have won the latest model of Ferrari Car and 4 Bed Room Villa in Palm Jumeirah for attending this Seminar

CIBC FirstCaribbean Mobile App. FREQUENTLY ASKED QUESTIONS (FAQs) Page 1 of 9

SHERWOOD STATE BANK POPMONEY GUIDE

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

CYBER THREATS: REAL ESTATE FRAUD ADVISORY COUNCIL

Why was an extra step of choosing a Security Image added to the sign-in process?

Safeguarding Your Dealership from Fraud

P2P Instructions. 4. Select Person to Person

Business Online Banking & Bill Pay Guide to Getting Started

Toolkit for March Fraud Prevention Month 2017 Senior Support. FRAUD Recognize It Reject It Report It.

JHA Payment Solutions ipay Solutions. Business Bill Pay. Funds Verification CSL Client Reference Guide. September 2018

Online Services USER GUIDE. First Time Log In

Frequently Asked Questions PopMoney

PIN / Password Security

Your Online & Mobile Banking Guide

Online Services User Guide

COMING SOON. A new on-the-go banking experience. Important information about upcoming system upgrades at Bank Midwest happening April 24.

Staying Safe on the Internet. Mark Schulman

BKT KOSOVA BUSINESS E-BANKING USER MANUAL

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

Phone banking Fast, reliable and convenient service by phone.

ACH ORIGINATION USER GUIDE May 17, 2017

Federal Deposit Insurance Corporation. National Credit Union Administration. Office of the Comptroller of the Currency. Office of Thrift Supervision

Westpac phone banking

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

All you need to know about Smart Pay As You Go

In addition to these resources, our staff will be on hand to help walk you through any questions or concerns you have post-conversion.

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk

DPX Pay Person to Person (P2P) Account to Account (A2A)

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

Business/Commercial Client Internet Banking Awareness and Education Program

FAQ: Privacy, Security, and Data Protection at Libraries

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

Personal Banking Upgrade 2.MO Guide

YOUR GUIDE TO ANZ INTERNET BANKING

Protecting your Security and Privacy on the Web. Tony Brett Head of IT Support Staff Services IT Services. 11 March 2013

Get the most from your Health Savings Account. Your guide to your HSA and online account access

Banking System Upgrade - Frequently Asked Questions (FAQs)

MCB Lite FAQs What is MCB Lite? How do I apply for MCB Lite? Can I apply for MCB Lite without a valid CNIC?

Adobe Security Survey

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

JHA Payment Solutions. OneClick Funds Verification CSL. Client Training Guide. ipay Solutions. January 2017

PROTECTING YOUR BUSINESS ASSETS

Webomania Solutions Pvt. Ltd. 2017

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

Paid-for antivirus software

Sinu. Your IT Department. Oh, the humanity! The role people play in data security NYC: DC:

"Stay Smart, Keep Cyber Scam Away" Seminar Build a Secure Cyberspace 2018

BUSINESS ADVANTAGE USER GUIDE

Taking control of your finances... 5 Use these tips to manage your finances

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

Popmoney Frequently Asked Questions

Popmoney FAQs. What is Popmoney?

PUP (People U Pay) FREQUENTLY ASKED QUESTIONS

INTERNET SECURITY STAYING SAFE ONLINE

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Transcription:

Don t get tricked. People around the country have been receiving emails and phone calls from scammers. South Central Power wants to help you keep your money and prevent scams. Review the helpful tips below. Know South Central Power s Procedures Members should only give payment information over the phone if they initiate the call. Callers who give short deadlines and threaten to cut off service within an hour or two are probably running a scam. South Central Power has a set routine for collecting payments from members. South Central Power will mail a termination notice if a bill is past due. South Central Power only calls members who owe a past due balance. South Central Power usually uses an automated phone system with a recorded message. Occasionally South Central Power employees make personal collection phone calls but will transfer the member to our automated phone system to make their payment. Collection calls are made about seven days before service is scheduled to be terminated. South Central Power does not make collection calls or terminate service on weekends or holidays. If service is going to be terminated, a South Central Power employee will knock on the member s door before turning off service. If a member is concerned about the status of an account, a South Central Power member service representative can provide helpful information. Members should call 800-282-5064. The phone number is printed at the top of the billing statement and South Central Power s member service representatives are available M-F 8 a.m. to 5 p.m. Because South Central Power does initiate automated collection calls, and members can choose to make a payment over the phone, some phone calls are legitimate. South Central Power wants to prevent phone scammers from victimizing members by simplifying the payment process. South Central has a number of ways members can pay their bills: Members can use budget billing to pay the same amount every month. Members can use AutoPay to have payments made automatically each month with a credit or debit card. Members can easily go online to make weekly payments if that helps them with their personal budget. Updated: December 2016 Page 1

Members can pay online though the MyAccount section of the website. Members can pay over the telephone through the IVR 24/7 or by speaking to a member service representative during regular office hours (M-F 8.m. to 5 p.m.). Avoid e-mail scams South Central Power s e-mails contain specific information and distinct colors. Do not open emails from unfamiliar sources. If an e-mail looks suspicious, it may contain malware or links to a virus-infected website. Members can simply delete the suspicious e-mail and contact South Central Power by phone or log on to the bill payment website. Members should not provide personal information, credit card, debit card, banking information or user names and passwords in an e-mail. Avoid Phone Scams Know what you owe. You know your mortgage company, your phone company, credit card company, electric utility and anyone you regularly pay for services. You know how much you pay and when you pay. If you know you ve paid your bills, and someone calls to demand payment, just hang up. You can always call your service provider at the number printed on your bill. Every legitimate company that issues bills will have a way for you to contact them printed on your bill. Legitimate companies will normally send you a letter in the mail if there is an issue with your payment. They may also call you, but you don t have to talk to them. Just hang up. If you think you might owe the company money, call them at the phone number printed on the bill. Several phone scams that have been operating recently: Caller claims to have detected a virus on your computer, tells you to go to your computer and they will walk you through several steps which give the caller access to your computer and your personal information. Caller claims to be from a solar company; don t give them your electric account information. Caller claims your grandchildren/niece/nephew/cousin is in trouble, or hurt in an accident, or arrested, and if you provide money or a Green Dot card the caller will take care of him/her. Updated: December 2016 Page 2

Caller claims to be able to access an inheritance that someone left you. Caller asks you for a small fee or percentage to process paperwork. Caller claims you owe money and asks you to meet at the local CVS or other store to make payment. Caller claims to be raising funds for Ebola virus/orphans/widows/whatever; don t give them your credit card or checking account information. Caller claims to be from the IRS, threatens legal action and arrest. Remember, once you give a scammer money, they will continue to call and harass you. Government agencies do not call or e-mail people; government agencies send letters via the U.S. mail. Do not provide personal, financial or account information to unauthorized callers. Do not provide Green Dot, Western Union or Moneygram payments to unauthorized callers. Never meet unauthorized callers at a local store or bank to make a payment your personal safety could be at risk. Scammers are difficult to recognize. Scammers can sound like really nice people on the phone. They may talk to you about your kids and grandkids, your church, shows you watch or where you live. Don t tell them how old you are, or where you live, or where you bank or shop. Don t tell them about your kids and grandkids. They just want your money. Conversely, scammers who call you may be very mean on the phone, threatening to call the police or take you to court. You don t have to talk to them. Just hang up. Scammers frequently prey on the elderly and people who speak English as a second language. Scammers target businesses. Businesses usually have higher monthly bills and scammers will take advantage of that, claiming the business customer owes $1,500 rather than just $200. Businesses may have more than one person authorized to pay bills, and scammers exploit the lack of communication between employees and business owners. Scammers can make the name of the utility appear on a customer s caller ID. Scammers can trick people by duplicating voice recordings and imitating utility phone systems. Avoid Mail Scams Are you a Sweepstakes Winner? No, you re not. Throw that junk mail away. Don t respond to mail that you receive if you are not familiar with the company or the sender. Updated: December 2016 Page 3

Scammers will send mail advising you of pending legal action, and offering legal services. Don t fall for it. If you believe the letter is legitimate, ask a friend or relative, or call a lawyer. Don t call the phone number on the mailer. Once you respond to a mailer, your name and address will be distributed to other frauds who will send you mail scams or call you. Avoid E-mail Scams E-mails that contain several grammar and spelling mistakes are probably not legitimate. If an e-mail looks suspicious, it may contain malware or links to a virus-infected website. If you receive a suspicious e-mail, do not open it or click on any links; simply delete the e-mail. Do not provide personal information, credit card, debit card, banking information or user names and passwords in an e-mail. Do not send personal information, such as your Social Security number or bank account number, in an e-mail. If you receive a suspicious or unexpected e-mail, don t click on any links in the message. If you click on an Unsubscribe link in a marketing e-mail, or reply to the message, the marketer will know that your e-mail address is active and may sell it to other companies. Instead, simply delete the message, or mark it as junk or spam. Do not share your passwords or other login credentials, especially over e-mail. Ensure Computer Security Perhaps the most important safeguard for any computer system is the user. No matter how many protections are in place, careless behavior can still threaten computer security and compromise sensitive information. Here are some ways you can protect your personal information at home. Install anti-virus software from a reputable company on your home computers. Updated: December 2016 Page 4

If you have Wi-Fi in your home, set up a password to prevent neighbors and others from using your Internet access. Use strong passwords on any computers and websites that you use. These are any combination of uppercase and lowercase letters, numbers and symbols. Avoid using relatives names in your passwords, as these are easy to find out. Try Googling yourself to see what information about you is on the web for anyone to see. Before downloading any freeware or shareware for your home computer, search for reviews and feedback about the software. Some of these programs have hidden components that gather your personal information while hogging your computer s memory resources and Internet bandwidth. Updated: December 2016 Page 5