Protect Your Money with Expert Guides to Outsmart Scammers
Fraud costs Americans billions of dollars every year, and the tactics keep evolving. From AI-generated voice clones to old-fashioned check washing, scammers are working around the clock to separate you from your hard-earned money. The good news: you are your best defense, and knowledge and a healthy dose of suspicion are your best tools.
This resource center brings together everything Latitude 32 Credit Union has published on fraud prevention and cybersecurity into one comprehensive hub. Whether you’re concerned about credit card skimming, suspicious text messages, or protecting an elderly parent from financial abuse, you’ll find clear, actionable guidance here.
Not sure where to start? These five guides cover the essentials:
- Guarding Your Finances Against Common Scams — A solid overview of today’s most prevalent threats
- Why Smart People Are Still at Risk of Fraud — Understanding why intelligence alone won’t protect you
- Why You Are Your Own Best Cybersecurity Defense — Building habits that keep you safe
- What You Need to Know About AI Scams — The newest threats on the horizon
- How Freezing Your Credit Can Save Your Credit Score — Your first line of defense against identity theft
At Latitude 32 Credit Union, protecting your financial well-being is central to our mission. Explore the guides below to build your fraud awareness and take control of your security.
If you are worried about a message, call, or request you just received, use this tool immediately.
⚠️ STOP IMMEDIATELY
This has the signs of a scam. Legitimate organizations do not demand immediate payment via gift cards or instant apps.
Hang up. Do not reply.
Call Latitude 32 Credit Union:
(843) 556-4809Seems Low Risk, But Be Careful
While this doesn’t show immediate red flags, you should still verify. Call the company back on their official number to confirm.
Table of Contents
Fraud Topics by Category
Payment & Card Fraud
Protect every transaction you make
Your debit card, credit card, checks, and digital payments are prime targets for fraudsters. These guides cover the most common payment-related scams and how to defend against them.
- How to Navigate Rising Credit Card Fraud — Current trends and practical defenses
- What You Need to Know About Rising Credit Card Fraud — Statistics and warning signs
- How to Avoid Credit Card Skimming and Stay Safe — Spot fraudulent devices before they steal your data
- How to Protect Yourself from Check Fraud and Scams — Yes, check fraud is still a major threat
- How to Avoid Wire Transfer and Instant Payment Scams — Zelle, Venmo, and wire transfer precautions
Online & Digital Security
Stay safe in the digital world
Most fraud today begins online. From phishing emails to compromised search results, these guides help you navigate the internet without becoming a victim.
- An Essential Guide to Avoiding Online Scams — Comprehensive online safety fundamentals (this is a great place to start)
- Why You Are Your Own Best Cybersecurity Defense — Building security habits that are your best protection
- 6 Tips to Staying Safe While Browsing Online — Quick-reference for browsing safety
- Protecting Yourself from Malicious Search Results — When apparently legitimate Google results lead to scams
- 4 Facts You Should Know About Cybercrime — Understanding the general threat landscape
Phone & Text Scams
Don’t fall for the call or the text
Your phone is a direct line to scammers. These guides cover the tactics fraudsters use through calls and text messages—and how to shut them down.
- What is Smishing? Tips to Defend Against Text-Based Scams — Recognize and block fraudulent texts
- Understanding the Threat of Tech Support Scams — When “Microsoft” calls, it’s not Microsoft
Identity & Imposter Scams
Know who you’re really dealing with
Imposter scams work because criminals are skilled at pretending to be people you trust. These guides reveal their tactics and explain why anyone can be fooled.
- Recognizing and Avoiding Imposter Scams — Government, bank, and family imposters exposed
- Why Smart People Are Still at Risk of Fraud — The psychology behind why scams work
Emerging Threats
Stay ahead of what’s coming
Scammers adopt new technology faster than most consumers. These guides cover cutting-edge threats and how to keep your defenses current.
- What You Need to Know About AI Scams — Voice cloning, deepfakes, and AI-powered fraud
- Elevating Your Fraud IQ — Building ongoing awareness and detection skills
Protecting Your Accounts & Assets
Secure what you’ve worked hard to build
Beyond avoiding scams, these guides cover proactive steps to protect your accounts, credit, and property from fraud.
- How Freezing Your Credit Can Save Your Credit Score — A solid step to protecting against identity theft
- Guarding Your HELOC and Your Home Against Fraud — Protecting your home equity
- Guarding Your Finances Against Common Scams — Overview of financial protection strategies
Targeted & Seasonal Scams
Threats aimed at specific situations
Some scams spike during certain times of year or target specific groups. These guides address threats that may be particularly relevant to your situation.
- How to Avoid Tax Fraud and Scams During Tax Season — Particularly important during the period of January through April
- How to Prevent Financial Abuse and Scams — Protecting yourself and vulnerable loved ones
The Complete Guide to Fraud Prevention
Understanding Today’s Fraud Landscape
Fraud is no longer a matter of shady characters in dark alleys. Today’s scammers operate sophisticated operations that blend technology, psychology, ads, and relentless persistence. According to the Federal Trade Commission, consumers reported losing over $12.5 billion to fraud in 2024 alone, a 25% increase over the previous year.
The shift to digital banking, online shopping, and instant payments has created new opportunities for criminals. At the same time, artificial intelligence has given scammers powerful new tools: they can now clone voices, generate convincing fake documents, and craft personalized phishing messages at scale.
But here’s what matters most: fraud is preventable. Scams rely on manipulating victims into taking action: Clicking a link, sending money, or sharing information. When you understand how these schemes work, you can recognize them before any damage is done.
This guide consolidates everything we know about protecting yourself and your money. Whether you’re dealing with a suspicious text message right now or simply want to strengthen your defenses, you’ll find practical, actionable guidance in the sections that follow.
At Latitude 32 Credit Union, we see fraud attempts against our members regularly. We’ve built this resource to share what we’ve learned and help you stay one step ahead of the criminals.
Part 1: Understanding the Scammer’s Playbook
Before diving into specific scam types, it helps to understand what all fraud has in common. Regardless of whether a scammer contacts you by phone, email, text, or social media, they’re working from the same basic playbook.
The Psychology of Manipulation
Scammers typically succeed by triggering emotional responses that override logical thinking. The most common triggers include:
- Urgency: “Act now or your account will be closed.” “This offer expires in 10 minutes.” Urgency prevents you from pausing to consider or verify.
- Fear: “The IRS is filing a lawsuit against you.” “Your grandchild is in jail.” Fear makes you desperate to resolve the situation immediately.
- Greed: “You’ve won $50,000!” “This investment guarantees 40% returns.” The promise of easy money clouds judgment.
- Authority: “This is Agent Smith from the Social Security Administration.” “I’m calling from your bank’s fraud department.” We’re used to complying with authority figures, especially those who have the threat of the force of the law behind them.
- Love: Scammers pose as family members or romantic interests. Once you love them, your guard drops.
Why Intelligence Doesn’t Protect You
One of the most dangerous myths about fraud is that only gullible or uneducated people fall for scams. The data tells a different story. Professionals, executives, and highly educated individuals fall victim to fraud every day, and sometimes for larger amounts than average.
We’ve all heard these kinds of stories: a relative falls for a romance scam, a colleague is duped by a phishing email. It’s easy to think, “That would never happen to me.” The truth is, fraudsters aren’t preying on a lack of intelligence. They are master manipulators who exploit our cognitive shortcuts, emotional vulnerabilities, and our fundamental need to trust. Their most powerful tool is not technology; it’s a deep understanding of human psychology.
Our guide Why Smart People Are Still at Risk of Fraud explores this phenomenon in depth. Understanding that you are vulnerable (regardless of your education or experience) is the first step toward real protection.
Building Your Fraud IQ
Effective fraud prevention isn’t about memorizing every scam type. It’s about developing pattern recognition and healthy skepticism that become second nature.
This means:
- Pausing before acting on any urgent request
- Verifying identities through channels you initiate (not contact information provided in the suspicious message)
- Understanding that if something sounds too good to be true, it is
For a deeper dive into building ongoing awareness, see Elevating Your Fraud IQ.
Part 2: Payment & Transaction Fraud
Payment fraud remains the most direct path to your money. Whether criminals steal your card information, intercept your checks, or trick you into sending instant payments, the goal is the same: transferring your funds into their control.
Credit Card Fraud
Credit card fraud continues to rise, with criminals employing both high-tech and low-tech methods to capture your information.
- Skimming involves devices attached to ATMs, gas pumps, or payment terminals that capture your card data when you swipe or insert. Modern skimmers are nearly invisible. They’re designed to look exactly like the legitimate card reader. Before inserting your card, wiggle the card slot. Skimmers are often attached loosely and may shake or give under pressure. If anything feels wrong, use a different machine.
- Data breaches at retailers and online merchants expose millions of card numbers annually. While you can’t prevent breaches, you can minimize damage by monitoring your statements weekly and enabling transaction alerts.
- Card-not-present fraud occurs when criminals use stolen card numbers for online or phone purchases. Using virtual card numbers for online shopping (when available) adds a layer of protection.
For comprehensive guidance, explore How to Navigate Rising Credit Card Fraud, What You Need to Know About Rising Credit Card Fraud, and How to Avoid Credit Card Skimming and Stay Safe.
Check Fraud
Despite the rise of digital payments, check fraud is experiencing a resurgence. Criminals steal checks, then use chemicals to “wash” them, removing the original ink so they can rewrite the payee and amount.
To protect yourself:
- Drop checks directly at the post office
- Consider switching to electronic payments when possible
- Use gel pens, which are harder to wash than ballpoint pens
- Monitor your account for unauthorized check activity
Our guide How to Protect Yourself from Check Fraud and Scams covers prevention strategies in detail.
Wire Transfers and Instant Payments
Wire transfers, Zelle, Venmo, and similar instant payment methods are convenient, but they’re also essentially irreversible. Unlike credit card charges, which can be disputed, money sent via these methods is gone the moment you hit send.
Scammers exploit this by creating scenarios where you feel pressure to send money immediately:
- A “landlord” demanding a deposit before you can see an apartment
- A “buyer” overpaying for an item and asking you to refund the difference
- A “relative” in an emergency needing bail money
The rule is simple: never send instant payments to anyone you haven’t verified through independent means. If someone claiming to be your grandson calls from jail, hang up and call your grandson’s actual phone number.
See How to Avoid Wire Transfer and Instant Payment Scams for more scenarios and defenses.
Part 3: Digital & Online Security
The internet is where most fraud begins today. Even scams that culminate in a phone call or mailed check often start with a phishing email, compromised website, or malicious search result.
The Foundations of Online Safety
Protecting yourself online doesn’t require unattainable technical expertise. But it does require consistent habits.
- Think before you click. Phishing emails and texts are designed to provoke immediate action. Before clicking any link, hover over it to see the actual URL. If an email claims to be from your bank but sender’s address doesn’t match your financial institution’s URL, it’s fraudulent.
- Verify unexpected contacts. If you receive an email about a problem with your account, don’t click any links in the email. Instead, open a new browser window and navigate directly to the company’s website, or call the number on your card.
- Use strong, unique passwords. Password reuse is one of the biggest security vulnerabilities. When criminals breach one site, they happily try those credentials everywhere. A password manager makes unique passwords practical instead of an ungovernable headache.
- Enable two-factor authentication. Even if a criminal gets your password, two-factor authentication provides a second barrier. Enable it on every account that offers it, especially financial accounts.
Our guide Why You Are Your Own Best Cybersecurity Defense provides a complete framework for building these habits.
Recognizing Malicious Websites and Search Results
Criminals have learned to manipulate search engines. When you search for “Latitude 32 Credit Union customer service,” legitimate results should appear, but scammers sometimes manage to place fake customer service numbers in search engine ads or secondary results.
Warning signs of fraudulent websites:
- URLs with slight misspellings
- Missing security indicators (no padlock icon in the browser)
- Poor design quality, grammar errors, or missing contact information
- Pressure to act immediately or requests for sensitive information
When in doubt, type the website address directly rather than clicking search results. Our guide Protecting Yourself from Malicious Search Results covers this threat in depth.
Practical Browsing Safety
Beyond the fundamentals, several practices significantly reduce your online risk:
- Keep your browser and operating system updated (security patches do matter)
- Be cautious with public Wi-Fi, and avoid accessing financial accounts on unsecured networks
- Review privacy settings on social media to limit what scammers can learn about you, and be careful what you post
- Be skeptical of unsolicited contact, even if it appears to come from someone you know
For quick-reference tips, see 6 Tips to Staying Safe While Browsing Online and An Essential Guide to Avoiding Online Scams. For broader context on the cybercrime landscape, 4 Facts You Should Know About Cybercrime provides useful perspective.
Part 4: Phone & Text Scams
Your phone provides scammers with direct access to you, and it’s a lever they use as much as they can. Americans received an estimated 4 billion spam calls per month in 2024, and fraudulent text messages have grown as well. Understanding these tactics helps you recognize and ignore them.
Smishing: The Text Message Threat
“Smishing” combines SMS (text messaging) with phishing. These messages appear to come from legitimate sources, such as your bank, a delivery service, or the IRS, and typically create urgency that pushes you toward clicking a malicious link.
Common smishing scenarios include:
- The fake fraud alert: “We’ve detected suspicious activity on your account. Click here to verify your identity.” The link leads to a convincing but fake login page that captures your credentials.
- The delivery notification: “USPS: Your package could not be delivered. Schedule redelivery: [malicious link].” Clicking leads to a site requesting personal information or payment for “redelivery fees.”
- The prize notification: “Congratulations! You’ve been selected to receive a $500 Walmart gift card. Claim now: [malicious link].” Unfortunately, there is no prize; only a data harvesting operation.
- The defense is straightforward: never click links in unexpected text messages. If a message claims to be from Latitude 32 Credit Union, log into your account directly through our app or website. If it claims to be from a delivery service adn you are actually expecting a package, go to that company’s website and enter your tracking number manually. If you aren’t expecting a package, don’t give it another thought; just assume it is a scam.
For a complete breakdown, read What is Smishing? Tips to Defend Against Text-Based Scams.
Tech Support Scams
Tech support scams typically begin with a phone call or pop-up message claiming your computer has been infected with a virus. The supposed technician offers to fix the problem. But first, they need remote access to your computer.
Once they have access, several things can happen:
- They install actual malware while pretending to remove fake malware
- They access your banking information through saved passwords or open browser sessions
- They demand payment for their “services,” often by gift card or wire transfer
- They may lock your computer and demand a ransom to unlock it
Remember: Microsoft, Apple, and other legitimate technology companies do not make unsolicited calls about computer problems. If you receive such a call, hang up immediately. If a pop-up appears claiming your computer is infected, close the browser or restart your computer, but do not call the number displayed.
Our guide to Understanding the Threat of Tech Support Scams provides detailed warning signs and response strategies.
Part 5: Identity & Imposter Scams
Imposter scams are among the most psychologically sophisticated fraud types. Rather than targeting your technology, they target your love, trust, and your desire to be loved and trusted in return.
How Imposter Scams Work
In an imposter scam, the criminal pretends to be someone you would naturally trust or comply with:
- Government imposters claim to be from the IRS, Social Security Administration, or law enforcement. They threaten arrest, deportation, or benefit suspension unless you pay immediately, typically via gift card or wire transfer. Real government agencies don’t operate this way. The IRS sends letters; don’t expect them to call demanding immediate payment.
- Bank imposters claim to be from your financial institution’s fraud department. They may already know some of your information (from data breaches), which makes them seem more legitimate. They’ll ask you to “verify” additional details or transfer money to a “safe account.” Latitude 32 Credit Union will never ask you to transfer money to protect it from fraud.
- Family imposters exploit the “grandparent scam” or similar scenarios. A caller claims to be your grandchild, nephew, or other relative in trouble—arrested, hospitalized, stranded abroad, etc. They beg for money and plead with you not to tell other family members. The emotional manipulation is powerful, but the solution is simple: hang up and call your actual family member at their known number.
- Romantic imposters build relationships over weeks or months through dating apps or social media before manufacturing a crisis requiring money. These scams cause both financial and emotional devastation.
For recognition and prevention strategies, see Recognizing and Avoiding Imposter Scams.
Why These Scams Work on Everyone
Imposter scams succeed because they exploit fundamental aspects of human psychology, and not because victims are gullible or uninformed. That doesn’t mean you’re doomed to fall for them, but it does mean that you should be careful. In part, that means questioning the supposed “facts” you are told rather than accepting them.
When you receive a call saying your grandson is in jail, your brain shifts into problem-solving mode. You’re not analyzing whether this is a scam; you’re focused on helping someone you love. Scammers know this and deliberately create scenarios that trigger emotional responses.
They also use techniques like:
- Providing just enough real information (gathered from social media or data breaches) to seem credible
- Creating time pressure so you can’t pause to think
- Isolating you from people who would recognize it is a scam (they might say, “Don’t tell Mom and Dad. They’ll be so disappointed”)
- Building on small commitments that escalate
Understanding these manipulation techniques helps you recognize when they’re being used on you. Why Smart People Are Still at Risk of Fraud explores this psychology in depth.
Part 6: Emerging Threats—AI and Beyond
Artificial intelligence has transformed countless industries—including the fraud industry. Scammers are early adopters of new technology, and AI has given them powerful new capabilities.
AI-Powered Voice Cloning
Perhaps the most alarming development is voice cloning. With some audio pulled from a social media video, voicemail greeting, or phone call, AI can generate a convincing replica of someone’s voice.
This supercharges family imposter scams. Instead of a caller who sounds vaguely or nothing at all like your grandson, you hear what sounds exactly like your grandson saying “Grandma, I’m in trouble.”
Defense requires verification habits that go beyond voice recognition:
- Establish family code words that scammers couldn’t know
- When in doubt, hang up and call back on a known number
- Be skeptical even when a voice sounds familiar
Deepfake Videos
Video manipulation has advanced to the point where criminals can create convincing footage of real people saying things they never said. While not yet common in consumer fraud, deepfakes are emerging in business email compromise schemes, blackmail, and romance scams.
A “romantic interest” who can only video chat at certain times may be using pre-recorded deepfake video. A “CEO” requesting an urgent wire transfer via video message may be AI-generated. And your photos online may be used to make a deepfaked video of you doing something awful and used as leverage to get you to send blackmailer money.
AI-Written Phishing
Traditional phishing emails often contained obvious grammatical errors and awkward phrasing that helped identify them as fraudulent. AI has eliminated this weakness. Modern phishing messages can be grammatically perfect, contextually appropriate, and personalized–at scale.
This means you can no longer rely on poor or impersonal writing quality as a fraud indicator. Instead, focus on the fundamentals: unexpected requests, urgency, requests for sensitive information, and pressure to bypass normal considerations or procedures.
For a more in-depth look at these threats, see What You Need to Know About AI Scams.
Staying Current
The fraud landscape evolves continuously. Building lasting protection requires ongoing awareness, not one-time education.
Elevating Your Fraud IQ provides strategies for maintaining current knowledge and developing the pattern recognition that catches new scam variants before they catch you.
Part 7: Protecting Your Accounts and Assets
Beyond recognizing and avoiding scams, proactive protection measures significantly reduce your vulnerability.
Credit Freezes: A Defense Against Identity Theft
A credit freeze prevents anyone—including you—from opening new credit accounts in your name (with legitimate lenders). It’s free, easy to implement, and doesn’t affect your credit score.
How it works: When you freeze your credit with the three major bureaus (Equifax, Experian, and TransUnion), lenders cannot access your credit report. Since legitimate lenders won’t approve credit applications they can’t evaluate, identity thieves can’t open accounts in your name with them, even if they have your Social Security number.
When you legitimately need to apply for credit, you temporarily lift the freeze (usually taking just minutes through the bureau’s website or app), complete your application, then reinstate the freeze.
Given the frequency of data breaches, a credit freeze is advisable for nearly everyone. The minor inconvenience of lifting the freeze when needed is far preferable to the major headache of dealing with identity theft.
How Freezing Your Credit Can Save Your Credit Score provides step-by-step implementation guidance.
Protecting Your Home Equity
If you have a home equity line of credit (HELOC), you face a specific fraud risk. Criminals who obtain your personal information can potentially access your HELOC funds or even attempt to transfer your property title.
Protective measures include:
- Monitoring your HELOC account as closely as your checking account
- Setting up alerts for any HELOC transactions
- Regularly checking your property records with your county recorder’s office
- Considering title lock or monitoring services if available in your area
Guarding Your HELOC and Your Home Against Fraud covers these risks and protections in more detail.
Comprehensive Financial Protection
True financial security requires a layered approach. No single measure provides complete protection, but combining multiple strategies creates robust defense:
- Monitor all accounts weekly
- Review credit reports from all three bureaus annually (free at AnnualCreditReport.com)
- Use strong, unique passwords with two-factor authentication
- Keep your contact information current with Latitude 32 Credit Union so we can reach you if we detect suspicious activity
- Shred documents containing personal information before disposal
- Limit what you share on social media (scammers mine this for security question answers and impersonation details)
For an overview of good practices, see Guarding Your Finances Against Common Scams.
Part 8: Targeted and Seasonal Scams
Some fraud spikes at particular times of year or targets specific groups. Awareness of these patterns helps you heighten vigilance when you’re most at risk.
Tax Season Fraud
From January through April, tax-related scams surge. These take several forms:
- IRS impersonation: Callers claiming to be IRS agents may threaten you with arrest unless you pay supposed back taxes immediately. The real IRS initiates contact by mail, not phone calls, and never demands payment by gift card or wire transfer.
- Refund theft: Criminals file fraudulent returns using stolen Social Security numbers, claiming refunds before the legitimate taxpayer files. Filing your return early reduces this risk.
- Tax preparer fraud: Dishonest preparers may inflate deductions to generate larger refunds (keeping a percentage for themselves) or steal client information for identity theft. Use reputable preparers and never sign a blank return.
- Phishing during tax season: Emails claiming to be from the IRS, tax software companies, or accountants spike during filing season. Treat them with skepticism and stick with local companies or tax preparers you already trust.
How to Avoid Tax Fraud and Scams During Tax Season provides comprehensive seasonal guidance.
Financial Abuse and Elder Fraud
Financial abuse (the theft or misuse of someone’s money or property) disproportionately affects older adults and vulnerable individuals. Perpetrators are often family members, caregivers, or others in positions of trust.
Warning signs include:
- Unexplained withdrawals or transfers
- Sudden changes to financial documents or account beneficiaries
- Unpaid bills despite adequate resources
- Your loved one spending significant time with a new friend who appears to influence their decisions or finances.
- Isolation from family and friends who might notice problems
If you’re concerned about a loved one, have honest conversations about their finances before problems arise. Help them implement protective measures like account alerts and trusted contact designations.
If you’re managing finances for an aging parent or other family member, maintain transparent records and involve other family members in oversight to prevent both actual abuse and false accusations.
How to Prevent Financial Abuse and Scams addresses both protecting yourself and recognizing when others may be at risk.
Part 9: What To Do If You’ve Been Targeted
Despite your best efforts, anyone can encounter fraud. What you do next determines whether the damage is contained or compounded.
If You Suspect You’ve Been Scammed
- Stop all communication immediately. Don’t respond to additional messages, answer follow-up calls, or provide any more information. Scammers often make additional attempts once they’ve identified a responsive target.
- Contact Latitude 32 Credit Union. Call us immediately at the number on your card or our official website. If your account information may have been compromised, we can:
- Place alerts or temporary holds on your accounts
- Issue new cards or account numbers
- Monitor for suspicious activity
- Guide you through next steps
- Document everything. Save emails, text messages, and phone records. Write down what happened while details are fresh. This information helps with reporting and potential recovery.
- Report the fraud. File reports with:
- The Federal Trade Commission at ReportFraud.ftc.gov
- Your local law enforcement agency
- The FBI’s Internet Crime Complaint Center (IC3) at ic3.gov for online fraud
- Your state attorney general’s consumer protection office
- Monitor your credit. Pull your credit reports from all three bureaus to check for unauthorized accounts. Consider placing a fraud alert or credit freeze to prevent further damage.
If Your Identity Has Been Stolen
Identity theft requires additional steps:
- Visit IdentityTheft.gov for a personalized recovery plan
- Place a fraud alert with one credit bureau (they’re required to notify the other two)
- Consider a credit freeze with all three bureaus
- Review your credit reports carefully and dispute fraudulent accounts
- File an Identity Theft Report with the FTC
- Contact any companies where fraudulent accounts were opened
Recovery from identity theft takes time, often months of time. Stay organized, document your efforts, and be patient but persistent.
Emotional Recovery
Fraud victims often experience shame, embarrassment, and self-blame. These feelings are understandable but counterproductive.
Remember: scammers are professional manipulators. They study human psychology and exploit it systematically. Being victimized doesn’t reflect your intelligence or judgment—it reflects their skill at deception.
Talk to trusted friends or family members. Consider counseling if feelings of shame or anxiety persist. And don’t let embarrassment prevent you from reporting the crime and warning others.
Part 10: Your Fraud Prevention Action Plan
Knowledge guides decisions, and acting on those informed decisions provides protection. Use this checklist to implement what you’ve learned.
Immediate Actions
- Freeze your credit with all three bureaus (Equifax, Experian, TransUnion)
- Enable transaction alerts on all Latitude 32 Credit Union accounts
- Update passwords on financial accounts (use unique, strong passwords and a password manager)
- Enable two-factor authentication wherever available
- Review recent account statements for any unrecognized transactions
Ongoing Habits
- Monitor your account alerts
- Check account activity weekly
- Before clicking any link, hover your cursor over it to verify it leads where it appears to
- When receiving unexpected contact about accounts or emergencies, cease communicating with the potential scammer and verify their claims independently
- Stop before acting on any urgent financial request and talk it over with trusted friends and family first
- Shred documents containing personal information
Periodic Reviews
- Monthly: Review bank and credit card statements in detail
- Three times per year: Check credit reports from one bureau (rotate through all three annually)
- Annually: Review and update beneficiaries, authorized users, and trusted contacts if needed
- Annually: Assess whether your protection measures need to be updated
Family Conversations
- Discuss fraud awareness with elderly parents
- Teach children and teens about online safety
- Establish family verification protocols (code words to avoid being deceived by deepfakes)
- Know who to contact if a family member shows signs of financial exploitation
When Something Feels Wrong
If any financial situation feels off, like an unexpected request, any communication with unusual urgency, a too-good-to-be-true opportunity, then trust your instincts. Here are some general guidelines:
- Stop. Don’t act under pressure.
- Verify. Contact the supposed source through known, legitimate channels.
- Ask. Call Latitude 32 Credit Union if you’re unsure whether a communication is genuine.
- Report. Alert us to scam attempts even if you weren’t victimized. It helps us to protect other members.
Your Partner in Security
Fraud prevention isn’t something you do once: It’s an ongoing practice. As scammers evolve their tactics, your awareness and defenses must evolve too.
At Latitude 32 Credit Union, we’re committed to keeping you informed and protected. We’ll continue updating this resource center with new guides as threats emerge, and feel free to answer questions about suspicious contacts or transactions.
Your financial security is our priority. If you ever have concerns about a suspicious message, an unusual account activity, or anything that doesn’t feel right, please contact us. We’d rather hear about a hundred false alarms than miss one real threat.
Questions? Concerns? Contact Latitude 32 Credit Union:
- Call us at the number on your card: (843) 556-4809
- Visit one of our branch locations
- Reach out through secure messaging in online banking
Stay vigilant. Stay informed. Stay protected.
Frequently Asked Questions
General Fraud Questions
Q: What should I do immediately if I think I’ve been scammed?
A: Stop all communication with the suspected scammer right away—don’t respond to messages, answer calls, or provide additional information. Contact Latitude 32 Credit Union immediately using the number on your card or from our official website: (843) 556-4809. We can help secure your accounts, issue new cards if needed, and guide you through reporting the fraud to appropriate authorities including the FTC at ReportFraud.ftc.gov and local law enforcement.
Q: How do I report fraud or suspicious activity to Latitude 32 Credit Union?
A: Call us directly using the phone number printed on your debit or credit card, or visit any branch location. For non-urgent concerns, you can also reach out through secure messaging in online banking. When reporting, provide detail if you can: dates, amounts, how you were contacted, and any information about the suspected scammer.
Q: Will Latitude 32 Credit Union ever call, text, or email asking for my password, PIN, or full account number?
A: No. Latitude 32 Credit Union will never contact you and ask for your full account number, password, PIN, Social Security number, or one-time verification codes. If someone claiming to be from Latitude 32 Credit Union requests this information, it’s a scam. Hang up immediately and call us directly using the number on your card to report the attempt.
Q: How can I tell if a message is really from Latitude 32 Credit Union?
A: Legitimate communications from Latitude 32 Credit Union will never create extreme urgency or threaten account closure unless you act immediately. If you’re unsure whether a message is genuine, don’t click any links or call any numbers provided in the message. Instead, log into your account directly through our official website or app, or call the number on your card to verify.