Skip to main content
There is an increasing volume and sophistication of Cyber threats. Help protect against fraud with tools and information geared towards early detection and prevention.
The first step to counter fraud is to be armed with information and awareness of what to do when it occurs. Individuals and businesses continue to be scammed by recorded phone calls, illegitimate emails, or online schemes to get your information that allows them to successfully impersonate you or your business.
Click here for a few simple steps to protect against fraud or cybercrimes and read more (e.g., Toolkit materials) from Homeland Security.
Click here for helpful tips to prevent identity theft.
What is identity theft?
Identity theft occurs when someone uses your personally identifiable information - like your name, Social Security number, or credit card number - without your permission to commit fraud or other crimes.
How do thieves steal your identity?
Despite your best efforts to manage the flow of your personal information or to keep it to yourself, skilled identity thieves may use a variety of methods to gain access to your data:
What do you do if your identity is stolen?
An identity thief will open credit accounts in your name; these are likely to appear on your credit report. Regular review of your credit bureau report will allow you to proactively identify occurrences and take action if you are compromised.
Stay alert for other signs of identity theft, like:
MB Fraud Protection Services
Safeguards funds and help prevent fraud with early detections of altered or unauthorized checks. Our account reconciliation system will compare the check serial number and amount on the file you provided. Positive Pay helps identify potentially fraudulent checks.
Payee Positive Pay
Similar to Positive Pay, this service adds the Payee to the check issue file, which helps to detect alterations to the check Payee.
ACH Block Filter(s) Service
Helps protect your business by preventing unauthorized ACH debits and/or credits from posting to an account. Using a customer-defined list of preauthorized originators, the service specifies the type of transaction (credit, debit, or all) and entry class codes of permitted transactions with an option to specify amount. All unauthorized ACH transactions will be presented to the customer for a pay-or-return decision.
All Rights Reserved
sitemap | get adobe reader