Our offices are closed on Wed., Jan. 1 in observance of New Year's Day. Normal operations will resume on Thu., Jan. 2.
The security and confidentiality of your personal and account information is always a priority at Frontier Farm Credit. We have robust defenses against cyberattacks. But we aren’t the only – or even the primary – way hackers can get into your information and account.
Being vigilant in monitoring your own accounts and reporting any suspicious or unauthorized activity in a timely manner is critical in protecting your business accounts with us.
ACH debit fraud occurs when a third party initiates an unauthorized electronic withdrawal from their victim’s account. All the fraudster needs is the account number and bank routing number, which are readily available on any check. Using a vendor’s online payment functionality, the fraudster enters the account number and bank routing number as his own, and pays his bill.
Because the ACH codes typically used for these types of payments categorize them as “consumer” transactions, the ACH Network allows a longer timeframe for returns of unauthorized debits, so these fraudulent transactions are often recovered. However, ACH debit still has the potential for significant losses.
While Banks offer checks to their customers, Frontier Farm Credit offers drafts to its customers. Drafts are used by customers to access their operating loan. Check/draft fraud accounts for the largest financial losses across all types of fraud. The information needed to commit draft fraud is readily available on any legitimate draft payment. Drafts or statements are intercepted in the mail, or payroll or vendor checks/drafts may be “sold” to fraudsters. A business has a very short window (the next business day) to reject an unauthorized draft posted to its operating loan and ensure the funds are recovered.
To further enhance our company’s cyber defenses, we are highlighting common types of cyber threats through an audio series called Fraud Force. We will share examples of some of the most common fraud tactics being used to obtain personal, confidential, and financial information – and the signs to look for to avoid becoming a victim.
Email is increasing being used as a social engineering scam to try and trick users into sharing information through spoofing tactics. This episode explores tactics to help prevent being spoofed by these email scams.
This episode explores the dangers of a broad range of malicious activities achieved through human interactions rather than technical hacking skills.