Fraud Summary

Our Fraud Summary page describes various types of fraud. It provides tips for prevention, including protection against spyware and other forms of computer fraud, as well as mail fraud, phone fraud, email phishing, and web spoofing. You'll also find what to do if your debit or credit card becomes compromised.

What to Do if Your Debit or Credit Card Has Been Compromised

  • Turn Your Card ON/OFF:  The Manage Card1 function lets you take control of your card and protects against unauthorized use by deactivating and reactivating it with a simple ON/OFF toggle switch.2
  • During Banking Hours:  If you need to report a lost or stolen VISA® Credit, Debit, or ATM Card during banking hours, please call the Customer Support Center at (270) 982-4TCB (4822).
  • Outside of Banking Hours:  To report lost or stolen VISA® Credit, Debit, or ATM Cards outside of banking hours, please call (270) 982-4TCB (4822) and follow the prompts provided.

ReportScams@CecilianBank.com

Your vigilance is crucial in our fight against fraud and cybercrimes!

Did you receive a scam email, phone call, or text? Email ReportScams@CecilianBank.com to alert our fraud-fighting experts and help us address the threat faster! Include as much detail about the scam as possible, such as screenshots of SMS texts. However, do not reveal personal or identifying information, account numbers, usernames, or passwords. Your privacy is our priority.

If more information is required, we will respond to your email asking you to call the bank representative handling your report directly.


Fraud Summary

Identity Theft is the most popular and profitable form of consumer fraud. It occurs when someone uses your personal information, such as your name, Social Security Number, credit card number, or other identifying information, without your permission to commit fraud or other crimes.

Common ways identity theft can happen:
  • “Old Fashioned” Stealing: Thieves typically steal wallets and purses. They also steal mail such as credit card and bank statements, pre-approved credit card offers, check orders, and other financial mail.
  • Dumpster Diving: Thieves dig through trash, looking for bills and financial or other personal information.
  • Change of Address: Thieves modify or redirect your billing statements to another address by completing a “change of address” form.
  • Phishing: Thieves may send unsolicited emails, pretending to be a financial institution or a company, asking you to click a link to update or confirm your personal or login information. The link is directed to a “spoof” website designed to look like a legitimate site.
  • Skimming: Thieves may use a card reader device to copy the card’s magnetic strip to duplicate without the card owner’s knowledge.
Monitor your accounts:
  • Log in to Cecilian Bank’s online banking to track your account transactions. You can view your activity as it is posted.
Protect your personal information:
  • Do not carry your Social Security card in your wallet.
  • Do not have personal information such as your Social Security Number and driver’s license number printed on your checks.
  • Keep your new and canceled checks in a safe place.
  • Do not leave your purse, wallet, checkbook, or any other forms of identification in your car.
  • Shred or tear up any documents containing banking or credit information, especially pre-approved credit offers, before you throw them away. Call 1 (888) 567-8688 to opt-out of pre-approved credit card offers.
  • Keep your PINs and passwords a secret. Do not write them down or share them with anyone.

Computer Security

The Cecilian Bank continually invests in state-of-the-art online banking security to ensure the confidentiality of every customer’s online information and the utmost security of every user.

Warning Signs of a Compromised Computer:
  • Fake antivirus messages.
  • Unwanted browser toolbars.
  • Redirected Internet searches.
  • Frequent random pop-ups.
  • Friends or family receive fake emails from your email account.
  • Your online passwords suddenly change.
  • Unexpected software installs.
  • Your mouse moves between programs and makes correct selections.
  • Your antimalware software, Task Manager, or Registry Editor is disabled and cannot be restarted.
Computer Protection Tips:
  • Update your computer’s operating system regularly.
  • Keep your browser current with the latest security updates.
  • Use updated anti-virus software.
  • Use updated anti-spyware software and consider using more than one to ensure the most thorough scan.
  • Change your passwords regularly, as a good practice to help prevent unauthorized access.
  • Download free software only from websites you know and trust.
  • Do not install software without knowing exactly what it is or what it will do (read the end-user license agreement).
  • Close pop-up ads by clicking on the “X” instead of clicking within the advertisement itself.
  • Review your browser security settings and set them to a level that is high enough to help detect unauthorized downloads. (Click your browser’s “Help” menu for steps.)
  • Do not click the link inside a spam email. Especially emails claiming to offer anti-spyware software.
  • Install a personal firewall on your computer. A firewall works like a filter to prevent unauthorized access to information on your computer.
  • Don’t give your personal information to websites that do not use encryption or other secure methods to protect it.

Mail & Phone Security

Vishing:

Vishing scams target consumers by “spoofing” text or voicemail messages that ask you to call a phone number and give your personal information. Here’s how it works:

  • You receive a “spoof” email, text message, or voicemail about suspicious account activity.
  • The email, text message, or voicemail message will ask you to call a “customer service” number.
  • When you call the customer service number, a recording will ask you to provide personal information such as account numbers, passwords, a social security number, or other critical information.
  • The recording may not mention the company’s name and could potentially be an indication the call is being used for fraud.
  • In a variation of this scam, you may receive a phone call.
  • The call could be a “live” person or a recorded message.
  • The caller may already have your personal information, which may seem as if the call is legitimate.
Smishing:

Smishing is when consumers’ cell phones and other mobile devices are targeted with mobile spam. The spam, or text messages, attempt to trick consumers into providing personal information. Here’s how it works:

  • You receive a fake text message, which may include a fraudulent link, asking you to register for an online service.
  • The scammer attempts to load a virus onto your cell phone or mobile device.
  • The scammer may also send a message ‘warning’ you that your account will be charged unless you cancel your supposed online order.
  • When you attempt to log on to the website, the scammer extracts your credit card number and other personal information.
  • Your information is used to duplicate credit, debit, and ATM cards.
  • Scammers may also send you a text message again ‘warning’ you that your bank account has been closed due to suspicious activity.
  • The text message will ask you to call a ‘customer service’ number to reactivate your account.
  • When you call the number, you are taken to an automated voice mailbox that prompts you to key in your credit card, debit card, or ATM card number, expiration date, and PIN to verify your information.
  • Again, your information is used to duplicate credit, debit, and ATM cards.
Lottery/Sweepstakes Scams:

Lottery/Sweepstakes scams target consumers by a notification, which arrives through mail, email, or an unsolicited telephone call. Here’s how it works:

  • The notification advises you that you have won a prize, but you did not enter any lottery or sweepstakes by the promoter contacting you.
  • The promoter will ask you to send payment to cover the cost of redeeming the prize when the prize does not exist.
  • In this type of scam, you may rarely, if ever, receive any winnings in return.
Check Overpayment Scams:

Check Overpayment scams target consumers who sell items through an online auction site or a classified ad. Here’s how it works:

  • The seller takes a significant loss when the ‘buyer’ passes a counterfeit cashier’s check, money order, or corporate or personal check as payment.
  • The counterfeit check is written for more than the agreed price.
  • The ‘buyer’ will ask the consumer to wire back the difference after the check has been deposited.
  • The check will likely bounce, and the consumer becomes liable for the entire amount.
Tips for the Mailbox:
  • Deposit outgoing mail at the Post Office.
  • Remove incoming mail from your personal mailbox as soon as possible, or use a P.O. Box or locked, secure mailbox.
  • Request a mail hold from the United States Postal Service or call them at 1 (800) 275-8777 if you plan to be away from home for an extended period.
  • Know your billing cycles. If bills are late or missing, contact your creditors.
  • Watch for your new or replacement debit card from The Cecilian Bank. You should receive it within five business days.
  • Switch to a more secure way of receiving your account statement. When you sign up for The Cecilian Bank Online Statements, your statement will no longer sit in your mailbox. Instead, we will email you when your statement is available through your secure Online Banking account.
Tips for the Phone:
  • Do not give out personal information, such as your account numbers, credit or debit card numbers, Social Security Number, tax identification numbers, passwords, or PINs, unless you have initiated the call.
  • The Cecilian Bank will not make an unsolicited call requesting your personal information.
  • If you ever believe you are not talking to a legitimate company representative, hang up and call the phone number listed in the telephone book or on the company’s social media pages.

Phishing & Spoofing

Phishing scams target consumers by “spoofing” emails and websites. Here’s how it works:

  • You receive an email asking you to click on a link to update sensitive personal information.
  • The link will redirect you to a “spoofed” website designed to look like a legitimate website.
  • The website will ask you to input personal information such as account numbers, PINs, passwords, or Social Security Number.
How to Protect Yourself:

To protect yourself from going to a spoofed website, always type www.thececilianbank.com into your browser when you log in to your Online Banking account with The Cecilian Bank instead of clicking a link in an email.

Email Protection Tips:
  • Do not click links within emails to log in or update or confirm your sensitive information.
  • Do not fill out forms in emails.
  • Be cautious about opening attachments or downloading files, regardless of who sent them.
  • ‘Spam’, or mass email messages, often contain links to phishing and unsavory websites.
  • Many phishing scams originate outside of the United States. Be wary of emails from people or sources you don’t know or trust.
  • Poor grammar and misspelled words from unknown sources asking you for personal information are clear warning signs of a phishing scam being operated outside of the United States.
  • Legitimate companies or organizations never ask you to divulge personal information over email.
  • Phishing emails may also be fake contests or offerings asking you to input personal information.
  • If an offer or email you receive is too good to be true, it most likely is.

Bank Error Messages

One of the newest schemes by fraudsters involves spoofing bank error messages. Here’s how it works:

  • Fraudsters will email you about a data or site maintenance error at The Cecilian Bank or any of your banks.
  • The email asks you to click on a link, which redirects you to a site and installs malware on your computer.
  • This malware allows scammers to intercept your password and bypass many financial institutions’ dual authentication systems.
  • The next time you attempt to log in to your online banking service, scammers attempt to steal your password and may quickly drain your account.
The Cecilian Bank Emails:
  • For your protection, The Cecilian Bank will not send you an email to update or confirm your sensitive information by clicking a link or replying.
  • Please do not send personal information in an unsecured email. Secure email may be sent from the Contact Support request form within our Online Banking’s Messages Tab.

Large Cash Transaction Scams

Before making large cash transactions, learn about other types of scams designed to disconnect you from your money. Click the link below for more information.

Large Cash Transaction Scams


Credit Bureaus

Equifax® is a registered trademark of Equifax, Inc. All rights reserved.
Experian® is a registered trademark of Experian Information Solutions, Inc. All rights reserved.
TransUnion® is a registered trademark of TransUnion LLC. All rights reserved.


  1. Online Banking enrollment is required to use the Manage Cards functions.
  2. Any previously authorized transactions will be paid, and any recurring transactions previously set up still occur. Turning your card OFF will not affect your checks, internet transfers, bill payments, or any other type of transactions in your account(s).

Chat with a representative