Skip to main content


Scams and fraud are becoming more and more common, especially with digital banking products.  Click through the topics below to learn how to protect yourself against the different types of scam and fraud.

You can report scams to the Federal Trade Commission 

Protect yourself against Debit Card fraud using the Card Management tool right within the mobile app. You can turn your card off/on, report it lost or stolen, create alerts based on amounts and/or locations, create travel plans and more.

Simply login to the LFCU Mobile App and tap Cards to get started.

An imposter scammer may call, text, or email to convince you they are someone in authority. They may even use caller ID to make it look like they are calling from an official government or business' number. To commit identity theft, they try to get you to send money or a gift card or share personal information.

Learn about the top types of imposter scams:

  • Government imposter scams - Unless you contact them first, government agencies typically initiate communication with you by letter. Unexpected contact or demands through any other method may be a scam.
    • IRS imposter scams - scammers pretend you owe the IRS money for taxes and may threaten legal action 
    • Social Security imposter scams - scammers claim there is a problem with your Social Security account or promise to increase your benefits 
  • Charity scams - scammers pretend to be from a real or fake charity and try to get you to contribute 
  • Grandparent scams - scammers pretend to be a grandchild or other relative who needs emergency financial help 
  • Tech support scams - scammers tell you your computer’s security is at risk and try to remotely access your device and steal personal information or ask for payment 
  • Scammers may also pretend to be from your bank or a company you do business with. You might be told you owe money or there is a problem with your account.

See examples of imposter scams, learn how they work, and how to recognize them from the Federal Trade Commission.


How To Recognize Phishing

Scammers use email or text messages to try to steal your passwords, account numbers, or Social Security numbers. If they get that information, they could get access to your email, bank, or other accounts. Or they could sell your information to other scammers. Scammers launch thousands of phishing attacks like these every day — and they’re often successful. 

Scammers often update their tactics to keep up with the latest news or trends, but here are some common tactics used in phishing emails or text messages: 

Phishing emails and text messages often tell a story to trick you into clicking on a link or opening an attachment. You might get an unexpected email or text message that looks like it’s from a company you know or trust, like a bank or a credit card or utility company. Or maybe it’s from an online payment website or app. The message could be from a scammer, who might 

  • say they’ve noticed some suspicious activity or log-in attempts — they haven’t 
  • claim there’s a problem with your account or your payment information — there isn’t 
  • say you need to confirm some personal or financial information — you don’t 
  • include an invoice you don’t recognize — it’s fake 
  • want you to click on a link to make a payment — but the link has malware 
  • say you’re eligible to register for a government refund — it’s a scam 
  • offer a coupon for free stuff — it’s not real 

Here’s a real-world example of a phishing email:

Netflix scam email

Imagine you saw this in your inbox. At first glance, this email looks real, but it’s not. Scammers who send emails like this one are hoping you won’t notice it’s a fake. 

Here are signs that this email is a scam, even though it looks like it comes from a company you know — and even uses the company’s logo in the header: 

  • The email has a generic greeting. 
  • The email says your account is on hold because of a billing problem. 
  • The email invites you to click on a link to update your payment details. 

While real companies might communicate with you by email, legitimate companies won’t email or text with a link to update your payment information. Phishing emails can often have real consequences for people who give scammers their information, including identity theft. And they might harm the reputation of the companies they’re spoofing. 

How To Protect Yourself From Phishing Attacks 

Your email spam filters might keep many phishing emails out of your inbox. But scammers are always trying to outsmart spam filters, so extra layers of protection can help. Here are four ways to protect yourself from phishing attacks. 

Four Ways To Protect Yourself From Phishing

1. Protect your computer by using security software. Set the software to update automatically so it will deal with any new security threats. 

2. Protect your cell phone by setting software to update automatically. These updates could give you critical protection against security threats. 

3. Protect your accounts by using multi-factor authentication. Some accounts offer extra security by requiring two or more credentials to log in to your account. This is called multi-factor authentication. The extra credentials you need to log in to your account fall into three categories: 

  • something you know — like a passcode, a PIN, or the answer to a security question. 
  • something you have — like a one-time verification passcode you get by text, email, or from an authenticator app; or a security key 
  • something you are — like a scan of your fingerprint, your retina, or your face 

Multi-factor authentication makes it harder for scammers to log in to your accounts if they do get your username and password. 

4. Protect your data by backing it up. Back up the data on your computer to an external hard drive or in the cloud. Back up the data on your phone, too. 

What To Do if You Suspect a Phishing Attack 

If you get an email or a text message that asks you to click on a link or open an attachment, answer this question:  

Do I have an account with the company or know the person who contacted me? 

If the answer is “No,” it could be a phishing scam. Go back and review the advice in How to recognize phishing and look for signs of a phishing scam. If you see them, report the message and then delete it. 

If the answer is “Yes,” contact the company using a phone number or website you know is real — not the information in the email. Attachments and links might install harmful malware.

What To Do if You Responded to a Phishing Email 

If you think a scammer has your information, like your Social Security, credit card, or bank account number, go to There you’ll see the specific steps to take based on the information that you lost. 

If you think you clicked on a link or opened an attachment that downloaded harmful software, update your computer’s security software. Then run a scan and remove anything it identifies as a problem.

How To Report Phishing 

If you got a phishing email or text message, report it. The information you give helps fight scammers. 

  • If you got a phishing email, forward it to the Anti-Phishing Working Group at
  • If you got a phishing text message, forward it to SPAM (7726). 
  • Report the phishing attempt to the FTC at 

Creating a false sense of urgency is a common trick of phishing attacks and scams. They do that so that you won't think about it too much or consult with a trusted advisor who may warn you. Tip: Whenever you see a message calling for immediate action take a moment, pause, and look carefully at the message.

Zelle® is a great way to send and receive money to/from people you know.  Funds sent using Zelle® are generally unrecoverable so only send payments to people you know and trust.