Ocean State Credit Union

logo
family on couch

Trust and Privacy Center

RIBridges Security Breach

The State of Rhode Island encourages all individuals to monitor their accounts for any unusual activity due to a recent security incident involving the RIBridges System. Please note that Ocean State Credit Union was not affected by this event. If you have any questions or concerns, Rhode Island has established a toll-free hotline (833) 918-6103, which operates daily from 9:00 AM to 9:00 PM.

Additionally, please remember that Ocean State Credit Union will never contact you to request your personal or account information. If you receive any such request, it is likely a scam.

Your security is our top priority, and we are here to support you. If you have further questions regarding your security and accounts, please do not hesitate to contact us.

For more information about RIBridges System click here


All You Need to Know About Data Breaches

If you follow the news, you’ll note that there seems to be another major data breach monopolizing headlines every week. The details vary, but in each breach, thousands, millions or even billions of victims’ sensitive information is compromised, and they’re now vulnerable to identity theft unless they take immediate action.

Here at Ocean State Credit Union, your financial success and safety is our primary goal. To help keep your information and your finances secure, we’ve compiled a comprehensive guide on data breaches.

What is a data breach?

Data breaches occur when sensitive information is accessed or used without authorization. Factors like a wealth of online data and sophisticated hacking tools have spurred a steep increase in data breaches in recent years, causing tremendous damage to individual consumers and businesses across every industry.
Data breaches occur by exploiting vulnerabilities in a company’s security system. Alternatively, an employee can be tricked into giving a cybercriminal access to the company’s network.

The goal of most data breaches is to obtain personal information, like names, email addresses and passwords, as well as financial information, like credit card numbers and account details. This information is used by criminals to steal identities and empty accounts, or sold to other criminals who will then do so.
While major data breaches make headlines, according to the Identity Theft Resource Center, there is an average of three data breaches each day, most of which will never even make the news.

After a data breach

Whenever you hear about a major data breach that can possibly affect you, it’s best to monitor your accounts for suspicious activity. In most cases, you will be notified by the victimized company if your data has been compromised; however, it helps to keep an eye on your accounts even if you haven’t been contacted so you can minimize your loss by acting quickly if your are among the unfortunate victims.

If you’ve been victimized by a breach

If you’ve been informed your information is compromised by a data breach, take the following steps immediately:

  1. Freeze your credit
    Placing a freeze on your credit is the most crucial step you can take to stop scammers from getting at your information. A credit freeze will not bring down your credit score, but it will serve as a red flag for lenders and credit companies by alerting them to the fact that you may have been a victim of fraud. This added layer of protection will make it difficult, or impossible, for hackers to open a new credit line or loan in your name.
    You can freeze your credit at no cost at all three of the major credit bureaus, Equifax, Transunion and Experian. You’ll need to provide some basic information and you’ll receive a PIN for the freeze. Use this number to lift the freeze when you believe it is safe to do so.
  2. Change your passwords
    Most people are on the alert following a major data breach, but they tend to let their guard down once the heat is off and things calm down. Hackers know this, and they’ll often hold onto victims’ information immediately following a data breach and then sell it months down the line to other identity thieves. To protect your accounts from a delayed-reaction hack, change all of your passwords after a breach that possibly has affected you.
  3. File an identity theft report
    Unfortunately, these protective measures can sometimes be too little, too late. If your accounts have been compromised, and you believe your identity has been stolen, file an identity theft report with the Federal Trade Commission (FTC) as soon as possible. This will assist the feds in tracking down your hacker(s) and returning your finances to their usual state as quickly as possible.

Protecting your information

There’s no fool-proof way to protect yourself from a data breach, but following these simple steps can help keep your information as safe as possible:

Monitor your credit. Check your credit accounts for suspicious activity on a regular basis. You can request a free credit report from each of the three major credit bureaus once a year at AnnualCreditReport.com. You may also want to consider signing up for credit monitoring, a service that will cost you $10-30 a month for the promise of notifying you immediately about any suspicious activity on your accounts.
Use strong, unique passwords. Use a different password for each account, and choose codes that are at least eight characters long. Also, use a variety of numbers, letters and symbols. Vary your capitalization use as well, and don’t utilize any portion of your name, phone number or a common phrase as your password. Using a password manager like Dashlane or iPassword can also help keep your information safe. It’s also a good idea to choose two-factor authentication when possible, and non-password authentication, such as face recognition or fingerprint sign-in, for stronger protection.
Browse safely. Never share sensitive information online and always keep your security and spam settings at their strongest levels. Make sure your devices are fully updated at all times. It’s also a good idea to keep your social media accounts as private as possible.

Hackers never stop trying to get at your data, but with the right protective measures in place, you can keep them from seeing success.


Beware Third-Party App Scams

Scammers are experts at hijacking our favorite conveniences for their schemes, and third-party app scams are no exception. These scams can be difficult to spot and have already conned millions of unsuspecting victims. In fact, according to a report published by ACI Worldwide, third-party app scams, also known as Authorized Push Payment (APP) scams, are the number one fraud threat around the world. And with their popularity rising, the scam risk for every consumer is very real. 

There are several variations of the third-party app scam. Let’s start by taking a look at scams that con the victim into downloading a bogus payment app. Here’s what you need to know about these scams and how to protect yourself. 

How these scams play out

Victims of third-party app scams can be swindled into downloading a bogus app through one of these schemes:

  1. The bogus withdrawal notice. Here, a target receives an email allegedly from a third-party app, like Venmo or Zelle, claiming that a large withdrawal will soon be made from the target’s account. The email helpfully includes a number for the victim to call to contest the withdrawal. Unfortunately, when the victim calls the number, a scammer impersonating a bank or credit union rep instructs them to download an app to give the “rep” access to their phone. When the victim does so, the scammer proceeds to empty the victim’s account into their own. 
  2. The look-alike app. Here, a victim unknowingly downloads an app owned by a scammer, believing it’s a popular mobile payment app, like Cash App or Zelle. Unfortunately, by downloading the app, the victim is giving the scammer direct access to their funds and sensitive information.

Protect yourself

Keep yourself safe from third-party app scams with these precautionary measures:

  • Only download apps from trusted sources. Use official app stores, like the Google Play Store or the Apple App Store, to find the apps you need. These platforms have security measures in place to detect and remove malicious apps from being offered.
  • Carefully check the URL of the app you’re downloading to ensure it’s the authentic site. 
  • Before downloading an app, check its reviews and ratings. Look for any suspicious patterns, such as a large number of recent positive reviews that seem fake. Genuine apps will usually have a consistent track record of positive reviews over time.
  • Research the app and its developer or the company behind it. If there is limited or no information available, you may be looking at a scammer’s app.
  • Pay attention to the permissions the app requests during installation. If an app asks for unnecessary access to sensitive data or features, it might be malicious.
  • Regularly update your operating system and app versions. Developers often release security patches to fix vulnerabilities that scammers may exploit.
  • Install reputable mobile security apps that can help detect and block suspicious activity on your device.
  • Be cautious of phishing attempts. Avoid clicking on suspicious links or providing sensitive data unless you are certain of the website’s legitimacy.
  • Be skeptical of “too good to be true” offers. If an app promises unbelievable rewards or benefits, it’s likely a scam. 
  • Review your billing statements. Regularly check your app store purchase history and credit card/bank statements for any unauthorized charges.
  • Report suspicious apps to the app store and relevant authorities.
  • Educate yourself. Stay informed about the latest scams and security threats related to third-party apps. Awareness is your best defense against potential risks.

If you’ve been targeted

If you believe you have fallen for a third-party app scam, and you’ve sent money to a scammer, reach out to the app as soon as possible. Cash App recommends chatting through their app for the quickest service, or calling 800-969-1940 to speak to a representative. For Venmo, open a chat through their app for the quickest response or give them a call at 855-812-4430. If your scam was employed through PayPal, you can report it online through their Resolution Center or call the company at 888-221-1161. Finally, if you’ve used Zelle to send the money, you can chat with them on their site or give them a call at 844-428-8542.

Third-party app scams can cost victims their money and their security. Use the tips outlined here to stay safe. 


How to Protect Yourself from Google Voice Verification Scams

Scams are constantly becoming increasingly sophisticated – and the Google Voice verification 

scam is a perfect example. This scam can lead to significant inconvenience and potential identity theft. Here’s all you need to know about Google Voice verification scams and how to keep yourself safe. 

What is the Google Voice verification scam?

The Google Voice verification scam typically starts with a scammer contacting a target under the guise of responding to an online ad or inquiry the target has posted. The scammer may express interest in buying an item the target is selling or pose as someone who is in need of help. To verify the victim’s legitimacy, they’ll claim they need to send a Google Voice verification code. They’ll ask the victim to share this code with them. Unfortunately, what they are doing during this step is using the victim’s actions to set up a bogus Google Voice account in the victim’s name. Once they have control of this account, they’ll use it to carry out additional scams or fraudulent activities, often masking their identity behind this phone number. 

Protect yourself

Follow these tips to protect yourself from falling victim to a Google Voice verification scam:

  1. Understand how the scam works

Knowledge is always your first line of defense. Be aware that no legitimate transaction or interaction requires you to share a verification code sent to your phone by Google. If someone asks for this code, it’s a huge red flag. Understanding this basic principle can help you avoid many scams.

  1. Do not share verification codes

Never share verification codes with anyone. Verification codes sent to your phone are intended to secure your account; giving these codes to someone else can grant them access to your personal accounts or allow them to set up new accounts in your name.

  1. Enable two-factor authentication

Enable two-factor authentication (2FA) on your Google account and other sensitive online accounts when possible. This adds an extra layer of security by requiring a second form of verification in addition to your password. This way, even if a scammer gets their hands on your password, they’ll still need the second form of verification to access your account.

  1. Verify identities carefully

When dealing with online transactions or interactions, take steps to verify the identity of the person you are dealing with. If someone contacts you about an ad or offer, do some research to ensure they are legitimate. Use trusted platforms and be wary of deals that seem too good to be true.

  1. Monitor your accounts

Regularly monitor your online accounts for any suspicious activity. Check for unauthorized logins, changes to account settings or any other unusual behavior. If you notice anything suspicious, take action immediately by changing your passwords and contacting the platform’s support team.

If you’ve been scammed

If you suspect you have fallen victim to a Google Voice verification scam, take these steps to mitigate the damage:

  • Reclaim your Google Voice number. If a scammer has hijacked your Google Voice account, you can reclaim it by following Google’s support instructions. This usually involves proving your identity and verifying your phone number.
  • Report the scam. Report the scam to Google and the platform where the scam originated (such as Craigslist or Facebook). This will enable them to take action to prevent others from falling victim to the same scam.
  • Change your passwords. Change your Google account password and any other passwords that may have been compromised. For maximum security, use strong, unique passwords for each account. Enable additional security measures. Consider adding more security measures to your accounts, such as security questions or biometric verification. This adds extra layers of protection against unauthorized access.
  • Stay vigilant. Staying vigilant is key to protecting yourself from scams. Always be skeptical of unsolicited requests for personal information or verification codes, and educate yourself about the latest scam tactics. By staying informed and cautious, you can significantly reduce your risk of falling victim to scams.

The Google Voice verification scam is a growing threat, but by understanding how it works and taking proactive steps to keep yourself safe, you can protect your personal information and avoid becoming a victim. 

Stay safe!