Fraud Prevention & Cybersecurity Resource Center

Cybersecurity resources and tips

Protect Your Money with Expert Guides to Outsmart Scammers

Fraud costs Americans billions of dollars every year, and the tactics keep evolving. From AI-generated voice clones to old-fashioned check washing, scammers are working around the clock to separate you from your hard-earned money. The good news: you are your best defense, and knowledge and a healthy dose of suspicion are your best tools.

This resource center brings together everything Latitude 32 Credit Union has published on fraud prevention and cybersecurity into one comprehensive hub. Whether you’re concerned about credit card skimming, suspicious text messages, or protecting an elderly parent from financial abuse, you’ll find clear, actionable guidance here.

Not sure where to start? These five guides cover the essentials:

  1. Guarding Your Finances Against Common Scams — A solid overview of today’s most prevalent threats
  2. Why Smart People Are Still at Risk of Fraud — Understanding why intelligence alone won’t protect you
  3. Why You Are Your Own Best Cybersecurity Defense — Building habits that keep you safe
  4. What You Need to Know About AI Scams — The newest threats on the horizon
  5. How Freezing Your Credit Can Save Your Credit Score — Your first line of defense against identity theft

At Latitude 32 Credit Union, protecting your financial well-being is central to our mission. Explore the guides below to build your fraud awareness and take control of your security.

Am I Being Scammed?

If you are worried about a message, call, or request you just received, use this tool immediately.

Are they pressuring you to act immediately (e.g., “within 20 minutes” or “right now”)?
How are they asking for payment or information?

⚠️ STOP IMMEDIATELY

This has the signs of a scam. Legitimate organizations do not demand immediate payment via gift cards or instant apps.

Hang up. Do not reply.

Call Latitude 32 Credit Union:

(843) 556-4809

Seems Low Risk, But Be Careful

While this doesn’t show immediate red flags, you should still verify. Call the company back on their official number to confirm.

Fraud Topics by Category

Payment & Card Fraud

Protect every transaction you make

Your debit card, credit card, checks, and digital payments are prime targets for fraudsters. These guides cover the most common payment-related scams and how to defend against them.

Online & Digital Security

Stay safe in the digital world

Most fraud today begins online. From phishing emails to compromised search results, these guides help you navigate the internet without becoming a victim.

Phone & Text Scams

Don’t fall for the call or the text

Your phone is a direct line to scammers. These guides cover the tactics fraudsters use through calls and text messages—and how to shut them down.

Identity & Imposter Scams

Know who you’re really dealing with

Imposter scams work because criminals are skilled at pretending to be people you trust. These guides reveal their tactics and explain why anyone can be fooled.

Emerging Threats

Stay ahead of what’s coming

Scammers adopt new technology faster than most consumers. These guides cover cutting-edge threats and how to keep your defenses current.

Protecting Your Accounts & Assets

Secure what you’ve worked hard to build

Beyond avoiding scams, these guides cover proactive steps to protect your accounts, credit, and property from fraud.

Targeted & Seasonal Scams

Threats aimed at specific situations

Some scams spike during certain times of year or target specific groups. These guides address threats that may be particularly relevant to your situation.

The Complete Guide to Fraud Prevention

Understanding Today’s Fraud Landscape

Fraud is no longer a matter of shady characters in dark alleys. Today’s scammers operate sophisticated operations that blend technology, psychology, ads, and relentless persistence. According to the Federal Trade Commission, consumers reported losing over $12.5 billion to fraud in 2024 alone, a 25% increase over the previous year.

The shift to digital banking, online shopping, and instant payments has created new opportunities for criminals. At the same time, artificial intelligence has given scammers powerful new tools: they can now clone voices, generate convincing fake documents, and craft personalized phishing messages at scale.

But here’s what matters most: fraud is preventable. Scams rely on manipulating victims into taking action: Clicking a link, sending money, or sharing information. When you understand how these schemes work, you can recognize them before any damage is done.

This guide consolidates everything we know about protecting yourself and your money. Whether you’re dealing with a suspicious text message right now or simply want to strengthen your defenses, you’ll find practical, actionable guidance in the sections that follow.

At Latitude 32 Credit Union, we see fraud attempts against our members regularly. We’ve built this resource to share what we’ve learned and help you stay one step ahead of the criminals.

Part 1: Understanding the Scammer’s Playbook

Before diving into specific scam types, it helps to understand what all fraud has in common. Regardless of whether a scammer contacts you by phone, email, text, or social media, they’re working from the same basic playbook.

The Psychology of Manipulation

Scammers typically succeed by triggering emotional responses that override logical thinking. The most common triggers include:

  • Urgency: “Act now or your account will be closed.” “This offer expires in 10 minutes.” Urgency prevents you from pausing to consider or verify.
  • Fear: “The IRS is filing a lawsuit against you.” “Your grandchild is in jail.” Fear makes you desperate to resolve the situation immediately.
  • Greed: “You’ve won $50,000!” “This investment guarantees 40% returns.” The promise of easy money clouds judgment.
  • Authority: “This is Agent Smith from the Social Security Administration.” “I’m calling from your bank’s fraud department.” We’re used to complying with authority figures, especially those who have the threat of the force of the law behind them.
  • Love: Scammers pose as family members or romantic interests. Once you love them, your guard drops.

Why Intelligence Doesn’t Protect You

One of the most dangerous myths about fraud is that only gullible or uneducated people fall for scams. The data tells a different story. Professionals, executives, and highly educated individuals fall victim to fraud every day, and sometimes for larger amounts than average.

We’ve all heard these kinds of stories: a relative falls for a romance scam, a colleague is duped by a phishing email. It’s easy to think, “That would never happen to me.” The truth is, fraudsters aren’t preying on a lack of intelligence. They are master manipulators who exploit our cognitive shortcuts, emotional vulnerabilities, and our fundamental need to trust. Their most powerful tool is not technology; it’s a deep understanding of human psychology.

Our guide Why Smart People Are Still at Risk of Fraud explores this phenomenon in depth. Understanding that you are vulnerable (regardless of your education or experience) is the first step toward real protection.

Building Your Fraud IQ

Effective fraud prevention isn’t about memorizing every scam type. It’s about developing pattern recognition and healthy skepticism that become second nature.

This means:

  • Pausing before acting on any urgent request
  • Verifying identities through channels you initiate (not contact information provided in the suspicious message)
  • Understanding that if something sounds too good to be true, it is

For a deeper dive into building ongoing awareness, see Elevating Your Fraud IQ.

Part 2: Payment & Transaction Fraud

Payment fraud remains the most direct path to your money. Whether criminals steal your card information, intercept your checks, or trick you into sending instant payments, the goal is the same: transferring your funds into their control.

Credit Card Fraud

Credit card fraud continues to rise, with criminals employing both high-tech and low-tech methods to capture your information.

  • Skimming involves devices attached to ATMs, gas pumps, or payment terminals that capture your card data when you swipe or insert. Modern skimmers are nearly invisible. They’re designed to look exactly like the legitimate card reader. Before inserting your card, wiggle the card slot. Skimmers are often attached loosely and may shake or give under pressure. If anything feels wrong, use a different machine.
  • Data breaches at retailers and online merchants expose millions of card numbers annually. While you can’t prevent breaches, you can minimize damage by monitoring your statements weekly and enabling transaction alerts.
  • Card-not-present fraud occurs when criminals use stolen card numbers for online or phone purchases. Using virtual card numbers for online shopping (when available) adds a layer of protection.

For comprehensive guidance, explore How to Navigate Rising Credit Card Fraud, What You Need to Know About Rising Credit Card Fraud, and How to Avoid Credit Card Skimming and Stay Safe.

Check Fraud

Despite the rise of digital payments, check fraud is experiencing a resurgence. Criminals steal checks, then use chemicals to “wash” them, removing the original ink so they can rewrite the payee and amount.

To protect yourself:

  • Drop checks directly at the post office
  • Consider switching to electronic payments when possible
  • Use gel pens, which are harder to wash than ballpoint pens
  • Monitor your account for unauthorized check activity

Our guide How to Protect Yourself from Check Fraud and Scams covers prevention strategies in detail.

Wire Transfers and Instant Payments

Wire transfers, Zelle, Venmo, and similar instant payment methods are convenient, but they’re also essentially irreversible. Unlike credit card charges, which can be disputed, money sent via these methods is gone the moment you hit send.

Scammers exploit this by creating scenarios where you feel pressure to send money immediately:

  • A “landlord” demanding a deposit before you can see an apartment
  • A “buyer” overpaying for an item and asking you to refund the difference
  • A “relative” in an emergency needing bail money

The rule is simple: never send instant payments to anyone you haven’t verified through independent means. If someone claiming to be your grandson calls from jail, hang up and call your grandson’s actual phone number.

See How to Avoid Wire Transfer and Instant Payment Scams for more scenarios and defenses.

Part 3: Digital & Online Security

The internet is where most fraud begins today. Even scams that culminate in a phone call or mailed check often start with a phishing email, compromised website, or malicious search result.

The Foundations of Online Safety

Protecting yourself online doesn’t require unattainable technical expertise. But it does require consistent habits.

  • Think before you click. Phishing emails and texts are designed to provoke immediate action. Before clicking any link, hover over it to see the actual URL. If an email claims to be from your bank but sender’s address doesn’t match your financial institution’s URL, it’s fraudulent.
  • Verify unexpected contacts. If you receive an email about a problem with your account, don’t click any links in the email. Instead, open a new browser window and navigate directly to the company’s website, or call the number on your card.
  • Use strong, unique passwords. Password reuse is one of the biggest security vulnerabilities. When criminals breach one site, they happily try those credentials everywhere. A password manager makes unique passwords practical instead of an ungovernable headache.
  • Enable two-factor authentication. Even if a criminal gets your password, two-factor authentication provides a second barrier. Enable it on every account that offers it, especially financial accounts.

Our guide Why You Are Your Own Best Cybersecurity Defense provides a complete framework for building these habits.

Recognizing Malicious Websites and Search Results

Criminals have learned to manipulate search engines. When you search for “Latitude 32 Credit Union customer service,” legitimate results should appear, but scammers sometimes manage to place fake customer service numbers in search engine ads or secondary results.

Warning signs of fraudulent websites:

  • URLs with slight misspellings
  • Missing security indicators (no padlock icon in the browser)
  • Poor design quality, grammar errors, or missing contact information
  • Pressure to act immediately or requests for sensitive information

When in doubt, type the website address directly rather than clicking search results. Our guide Protecting Yourself from Malicious Search Results covers this threat in depth.

Practical Browsing Safety

Beyond the fundamentals, several practices significantly reduce your online risk:

  • Keep your browser and operating system updated (security patches do matter)
  • Be cautious with public Wi-Fi, and avoid accessing financial accounts on unsecured networks
  • Review privacy settings on social media to limit what scammers can learn about you, and be careful what you post
  • Be skeptical of unsolicited contact, even if it appears to come from someone you know

For quick-reference tips, see 6 Tips to Staying Safe While Browsing Online and An Essential Guide to Avoiding Online Scams. For broader context on the cybercrime landscape, 4 Facts You Should Know About Cybercrime provides useful perspective.

Part 4: Phone & Text Scams

Your phone provides scammers with direct access to you, and it’s a lever they use as much as they can. Americans received an estimated 4 billion spam calls per month in 2024, and fraudulent text messages have grown as well. Understanding these tactics helps you recognize and ignore them.

Smishing: The Text Message Threat

“Smishing” combines SMS (text messaging) with phishing. These messages appear to come from legitimate sources, such as your bank, a delivery service, or the IRS, and typically create urgency that pushes you toward clicking a malicious link.

Common smishing scenarios include:

  • The fake fraud alert: “We’ve detected suspicious activity on your account. Click here to verify your identity.” The link leads to a convincing but fake login page that captures your credentials.
  • The delivery notification: “USPS: Your package could not be delivered. Schedule redelivery: [malicious link].” Clicking leads to a site requesting personal information or payment for “redelivery fees.”
  • The prize notification: “Congratulations! You’ve been selected to receive a $500 Walmart gift card. Claim now: [malicious link].” Unfortunately, there is no prize; only a data harvesting operation.
  • The defense is straightforward: never click links in unexpected text messages. If a message claims to be from Latitude 32 Credit Union, log into your account directly through our app or website. If it claims to be from a delivery service adn you are actually expecting a package, go to that company’s website and enter your tracking number manually. If you aren’t expecting a package, don’t give it another thought; just assume it is a scam.

For a complete breakdown, read What is Smishing? Tips to Defend Against Text-Based Scams.

Tech Support Scams

Tech support scams typically begin with a phone call or pop-up message claiming your computer has been infected with a virus. The supposed technician offers to fix the problem. But first, they need remote access to your computer.

Once they have access, several things can happen:

  • They install actual malware while pretending to remove fake malware
  • They access your banking information through saved passwords or open browser sessions
  • They demand payment for their “services,” often by gift card or wire transfer
  • They may lock your computer and demand a ransom to unlock it

Remember: Microsoft, Apple, and other legitimate technology companies do not make unsolicited calls about computer problems. If you receive such a call, hang up immediately. If a pop-up appears claiming your computer is infected, close the browser or restart your computer, but do not call the number displayed.

Our guide to Understanding the Threat of Tech Support Scams provides detailed warning signs and response strategies.

Part 5: Identity & Imposter Scams

Imposter scams are among the most psychologically sophisticated fraud types. Rather than targeting your technology, they target your love, trust, and your desire to be loved and trusted in return.

Quiz: Scam or Safe?
Loading Question…

How Imposter Scams Work

In an imposter scam, the criminal pretends to be someone you would naturally trust or comply with:

  • Government imposters claim to be from the IRS, Social Security Administration, or law enforcement. They threaten arrest, deportation, or benefit suspension unless you pay immediately, typically via gift card or wire transfer. Real government agencies don’t operate this way. The IRS sends letters; don’t expect them to call demanding immediate payment.
  • Bank imposters claim to be from your financial institution’s fraud department. They may already know some of your information (from data breaches), which makes them seem more legitimate. They’ll ask you to “verify” additional details or transfer money to a “safe account.” Latitude 32 Credit Union will never ask you to transfer money to protect it from fraud.
  • Family imposters exploit the “grandparent scam” or similar scenarios. A caller claims to be your grandchild, nephew, or other relative in trouble—arrested, hospitalized, stranded abroad, etc. They beg for money and plead with you not to tell other family members. The emotional manipulation is powerful, but the solution is simple: hang up and call your actual family member at their known number.
  • Romantic imposters build relationships over weeks or months through dating apps or social media before manufacturing a crisis requiring money. These scams cause both financial and emotional devastation.

For recognition and prevention strategies, see Recognizing and Avoiding Imposter Scams.

Why These Scams Work on Everyone

Imposter scams succeed because they exploit fundamental aspects of human psychology, and not because victims are gullible or uninformed. That doesn’t mean you’re doomed to fall for them, but it does mean that you should be careful. In part, that means questioning the supposed “facts” you are told rather than accepting them.

When you receive a call saying your grandson is in jail, your brain shifts into problem-solving mode. You’re not analyzing whether this is a scam; you’re focused on helping someone you love. Scammers know this and deliberately create scenarios that trigger emotional responses.

They also use techniques like:

  • Providing just enough real information (gathered from social media or data breaches) to seem credible
  • Creating time pressure so you can’t pause to think
  • Isolating you from people who would recognize it is a scam (they might say, “Don’t tell Mom and Dad. They’ll be so disappointed”)
  • Building on small commitments that escalate

Understanding these manipulation techniques helps you recognize when they’re being used on you. Why Smart People Are Still at Risk of Fraud explores this psychology in depth.

Part 6: Emerging Threats—AI and Beyond

Artificial intelligence has transformed countless industries—including the fraud industry. Scammers are early adopters of new technology, and AI has given them powerful new capabilities.

AI-Powered Voice Cloning

Perhaps the most alarming development is voice cloning. With some audio pulled from a social media video, voicemail greeting, or phone call, AI can generate a convincing replica of someone’s voice.

This supercharges family imposter scams. Instead of a caller who sounds vaguely or nothing at all like your grandson, you hear what sounds exactly like your grandson saying “Grandma, I’m in trouble.”

Defense requires verification habits that go beyond voice recognition:

  • Establish family code words that scammers couldn’t know
  • When in doubt, hang up and call back on a known number
  • Be skeptical even when a voice sounds familiar

Deepfake Videos

Video manipulation has advanced to the point where criminals can create convincing footage of real people saying things they never said. While not yet common in consumer fraud, deepfakes are emerging in business email compromise schemes, blackmail, and romance scams.

A “romantic interest” who can only video chat at certain times may be using pre-recorded deepfake video. A “CEO” requesting an urgent wire transfer via video message may be AI-generated. And your photos online may be used to make a deepfaked video of you doing something awful and used as leverage to get you to send blackmailer money.

AI-Written Phishing

Traditional phishing emails often contained obvious grammatical errors and awkward phrasing that helped identify them as fraudulent. AI has eliminated this weakness. Modern phishing messages can be grammatically perfect, contextually appropriate, and personalized–at scale.

This means you can no longer rely on poor or impersonal writing quality as a fraud indicator. Instead, focus on the fundamentals: unexpected requests, urgency, requests for sensitive information, and pressure to bypass normal considerations or procedures.

For a more in-depth look at these threats, see What You Need to Know About AI Scams.

Staying Current

The fraud landscape evolves continuously. Building lasting protection requires ongoing awareness, not one-time education.

Elevating Your Fraud IQ provides strategies for maintaining current knowledge and developing the pattern recognition that catches new scam variants before they catch you.

Part 7: Protecting Your Accounts and Assets

Beyond recognizing and avoiding scams, proactive protection measures significantly reduce your vulnerability.

Credit Freezes: A Defense Against Identity Theft

A credit freeze prevents anyone—including you—from opening new credit accounts in your name (with legitimate lenders). It’s free, easy to implement, and doesn’t affect your credit score.

How it works: When you freeze your credit with the three major bureaus (Equifax, Experian, and TransUnion), lenders cannot access your credit report. Since legitimate lenders won’t approve credit applications they can’t evaluate, identity thieves can’t open accounts in your name with them, even if they have your Social Security number.

When you legitimately need to apply for credit, you temporarily lift the freeze (usually taking just minutes through the bureau’s website or app), complete your application, then reinstate the freeze.

Given the frequency of data breaches, a credit freeze is advisable for nearly everyone. The minor inconvenience of lifting the freeze when needed is far preferable to the major headache of dealing with identity theft.

How Freezing Your Credit Can Save Your Credit Score provides step-by-step implementation guidance.

Protecting Your Home Equity

If you have a home equity line of credit (HELOC), you face a specific fraud risk. Criminals who obtain your personal information can potentially access your HELOC funds or even attempt to transfer your property title.

Protective measures include:

  • Monitoring your HELOC account as closely as your checking account
  • Setting up alerts for any HELOC transactions
  • Regularly checking your property records with your county recorder’s office
  • Considering title lock or monitoring services if available in your area

Guarding Your HELOC and Your Home Against Fraud covers these risks and protections in more detail.

Comprehensive Financial Protection

True financial security requires a layered approach. No single measure provides complete protection, but combining multiple strategies creates robust defense:

  • Monitor all accounts weekly
  • Review credit reports from all three bureaus annually (free at AnnualCreditReport.com)
  • Use strong, unique passwords with two-factor authentication
  • Keep your contact information current with Latitude 32 Credit Union so we can reach you if we detect suspicious activity
  • Shred documents containing personal information before disposal
  • Limit what you share on social media (scammers mine this for security question answers and impersonation details)

For an overview of good practices, see Guarding Your Finances Against Common Scams.

Part 8: Targeted and Seasonal Scams

Some fraud spikes at particular times of year or targets specific groups. Awareness of these patterns helps you heighten vigilance when you’re most at risk.

Tax Season Fraud

From January through April, tax-related scams surge. These take several forms:

  • IRS impersonation: Callers claiming to be IRS agents may threaten you with arrest unless you pay supposed back taxes immediately. The real IRS initiates contact by mail, not phone calls, and never demands payment by gift card or wire transfer.
  • Refund theft: Criminals file fraudulent returns using stolen Social Security numbers, claiming refunds before the legitimate taxpayer files. Filing your return early reduces this risk.
  • Tax preparer fraud: Dishonest preparers may inflate deductions to generate larger refunds (keeping a percentage for themselves) or steal client information for identity theft. Use reputable preparers and never sign a blank return.
  • Phishing during tax season: Emails claiming to be from the IRS, tax software companies, or accountants spike during filing season. Treat them with skepticism and stick with local companies or tax preparers you already trust.

How to Avoid Tax Fraud and Scams During Tax Season provides comprehensive seasonal guidance.

Financial Abuse and Elder Fraud

Financial abuse (the theft or misuse of someone’s money or property) disproportionately affects older adults and vulnerable individuals. Perpetrators are often family members, caregivers, or others in positions of trust.

Warning signs include:

  • Unexplained withdrawals or transfers
  • Sudden changes to financial documents or account beneficiaries
  • Unpaid bills despite adequate resources
  • Your loved one spending significant time with a new friend who appears to influence their decisions or finances.
  • Isolation from family and friends who might notice problems

If you’re concerned about a loved one, have honest conversations about their finances before problems arise. Help them implement protective measures like account alerts and trusted contact designations.

If you’re managing finances for an aging parent or other family member, maintain transparent records and involve other family members in oversight to prevent both actual abuse and false accusations.

How to Prevent Financial Abuse and Scams addresses both protecting yourself and recognizing when others may be at risk.

Part 9: What To Do If You’ve Been Targeted

Despite your best efforts, anyone can encounter fraud. What you do next determines whether the damage is contained or compounded.

If You Suspect You’ve Been Scammed

  • Stop all communication immediately. Don’t respond to additional messages, answer follow-up calls, or provide any more information. Scammers often make additional attempts once they’ve identified a responsive target.
  • Contact Latitude 32 Credit Union. Call us immediately at the number on your card or our official website. If your account information may have been compromised, we can:
    • Place alerts or temporary holds on your accounts
    • Issue new cards or account numbers
    • Monitor for suspicious activity
    • Guide you through next steps
  • Document everything. Save emails, text messages, and phone records. Write down what happened while details are fresh. This information helps with reporting and potential recovery.
  • Report the fraud. File reports with:
    • The Federal Trade Commission at ReportFraud.ftc.gov
    • Your local law enforcement agency
    • The FBI’s Internet Crime Complaint Center (IC3) at ic3.gov for online fraud
    • Your state attorney general’s consumer protection office
  • Monitor your credit. Pull your credit reports from all three bureaus to check for unauthorized accounts. Consider placing a fraud alert or credit freeze to prevent further damage.

If Your Identity Has Been Stolen

Identity theft requires additional steps:

  • Visit IdentityTheft.gov for a personalized recovery plan
  • Place a fraud alert with one credit bureau (they’re required to notify the other two)
  • Consider a credit freeze with all three bureaus
  • Review your credit reports carefully and dispute fraudulent accounts
  • File an Identity Theft Report with the FTC
  • Contact any companies where fraudulent accounts were opened

Recovery from identity theft takes time, often months of time. Stay organized, document your efforts, and be patient but persistent.

Emotional Recovery

Fraud victims often experience shame, embarrassment, and self-blame. These feelings are understandable but counterproductive.

Remember: scammers are professional manipulators. They study human psychology and exploit it systematically. Being victimized doesn’t reflect your intelligence or judgment—it reflects their skill at deception.

Talk to trusted friends or family members. Consider counseling if feelings of shame or anxiety persist. And don’t let embarrassment prevent you from reporting the crime and warning others.

Part 10: Your Fraud Prevention Action Plan

Knowledge guides decisions, and acting on those informed decisions provides protection. Use this checklist to implement what you’ve learned.

Immediate Actions

  • Freeze your credit with all three bureaus (Equifax, Experian, TransUnion)
  • Enable transaction alerts on all Latitude 32 Credit Union accounts
  • Update passwords on financial accounts (use unique, strong passwords and a password manager)
  • Enable two-factor authentication wherever available
  • Review recent account statements for any unrecognized transactions

Ongoing Habits

  • Monitor your account alerts
  • Check account activity weekly
  • Before clicking any link, hover your cursor over it to verify it leads where it appears to
  • When receiving unexpected contact about accounts or emergencies, cease communicating with the potential scammer and verify their claims independently
  • Stop before acting on any urgent financial request and talk it over with trusted friends and family first
  • Shred documents containing personal information

Periodic Reviews

  • Monthly: Review bank and credit card statements in detail
  • Three times per year: Check credit reports from one bureau (rotate through all three annually)
  • Annually: Review and update beneficiaries, authorized users, and trusted contacts if needed
  • Annually: Assess whether your protection measures need to be updated

Family Conversations

  • Discuss fraud awareness with elderly parents
  • Teach children and teens about online safety
  • Establish family verification protocols (code words to avoid being deceived by deepfakes)
  • Know who to contact if a family member shows signs of financial exploitation

When Something Feels Wrong

If any financial situation feels off, like an unexpected request, any communication with unusual urgency, a too-good-to-be-true opportunity, then trust your instincts. Here are some general guidelines:

  1. Stop. Don’t act under pressure.
  2. Verify. Contact the supposed source through known, legitimate channels.
  3. Ask. Call Latitude 32 Credit Union if you’re unsure whether a communication is genuine.
  4. Report. Alert us to scam attempts even if you weren’t victimized. It helps us to protect other members.

Your Partner in Security

Fraud prevention isn’t something you do once: It’s an ongoing practice. As scammers evolve their tactics, your awareness and defenses must evolve too.

At Latitude 32 Credit Union, we’re committed to keeping you informed and protected. We’ll continue updating this resource center with new guides as threats emerge, and feel free to answer questions about suspicious contacts or transactions.

Your financial security is our priority. If you ever have concerns about a suspicious message, an unusual account activity, or anything that doesn’t feel right, please contact us. We’d rather hear about a hundred false alarms than miss one real threat.

Questions? Concerns? Contact Latitude 32 Credit Union:

  • Call us at the number on your card: (843) 556-4809
  • Visit one of our branch locations
  • Reach out through secure messaging in online banking

Stay vigilant. Stay informed. Stay protected.

Frequently Asked Questions

General Fraud Questions

Q: What should I do immediately if I think I’ve been scammed?

A: Stop all communication with the suspected scammer right away—don’t respond to messages, answer calls, or provide additional information. Contact Latitude 32 Credit Union immediately using the number on your card or from our official website: (843) 556-4809. We can help secure your accounts, issue new cards if needed, and guide you through reporting the fraud to appropriate authorities including the FTC at ReportFraud.ftc.gov and local law enforcement.

Q: How do I report fraud or suspicious activity to Latitude 32 Credit Union?

A: Call us directly using the phone number printed on your debit or credit card, or visit any branch location. For non-urgent concerns, you can also reach out through secure messaging in online banking. When reporting, provide detail if you can: dates, amounts, how you were contacted, and any information about the suspected scammer. 

Q: Will Latitude 32 Credit Union ever call, text, or email asking for my password, PIN, or full account number?

A: No. Latitude 32 Credit Union will never contact you and ask for your full account number, password, PIN, Social Security number, or one-time verification codes. If someone claiming to be from Latitude 32 Credit Union requests this information, it’s a scam. Hang up immediately and call us directly using the number on your card to report the attempt.

Q: How can I tell if a message is really from Latitude 32 Credit Union?

A: Legitimate communications from Latitude 32 Credit Union will never create extreme urgency or threaten account closure unless you act immediately. If you’re unsure whether a message is genuine, don’t click any links or call any numbers provided in the message. Instead, log into your account directly through our official website or app, or call the number on your card to verify.