Reporting Center

Whether you want to become more familiar with fraud or you have become a victim of fraud, the steps you take can affect how big of an impact that fraud has on you!

a close-up of a hand on a laptop

General Information Security Steps

With the ever-growing amount of data, who possesses "your data", and where "your" data exists, the potential of data breaches increases drastically. Typically in any breach, the following steps need to be performed on any website/software which may directly (or possibly indirectly) be related to the potential breach.

  1. Be extremely cautious of any emails, calls, or any type of communication/solicitation. When in doubt, don't click; send your own email or make your own call directly to the entity in question (and through their dedicated channels/means).
  2. Change all passwords and security questions. Document your changes.
  3. Setup dual-factor authentication. This ensures that two separate forms of authentication are used to access the site in question (Example: password and security code sent to phone).
  4. Verify contact information and any additional information.
  5. Review your credit reports to ensure no unexpected items are present or for any erroneous items. All three credit bureaus will need to be reviewed (Equifax, TransUnion, and Experian). Remember to check children's credit files periodically as well.
  6. Consider putting a credit freeze (also called a security freeze) on your credit reports. When frozen, your credit report is blocked from being shared with potential new creditors (if a creditor cannot get a credit report, they will most likely not open a new line of credit).
  7. Frequently review your financial statements (bank accounts, Paypal, online services, credit cards, etc) to ensure all transactions are valid. If fraudulent transactions are found, dispute and consider closing the account. Dispute all fraudulent transactions as soon as possible.
  8. Consider ongoing credit monitoring services to minimize future incidents, fraudulent transactions, and their potential impacts.
  9. Stay vigilant in regards to your information security!
  10. Repeat all of the above when needed and with some frequency.

Remember, each potential breach is different and may require the order of the steps to change. They are all important and should be treated as such.

a woman holding a child

Identity Theft/Fraud

Take these steps to help recover or minimize the effects of Identity Theft/Fraud. Although these are not all inclusive, they do provide a good starting point on the road to recovery.

  1. Notify your bank(s)/credit union(s). CVCU Locations
  2. Close or Transfer from compromised account to new account(s). Be sure to redirect any of your automated payments
  3. Close any credit/debit cards affected and have new one issued.
  4. Change usernames and passwords of any affected account from a known trusted computer.
  5. Request all fraudulent accounts be closed.
  6. Put a "Fraud Alert" on your credit report.
  7. Obtain and review your credit report (disputing any unauthorized activity).
  8. File a police report.
  9. File a report with the Federal Trade Commission.
  10. Monitor your account(s) and credit for potential future problems.
a road with trees on the side

Credit Card Fraud

Credit Card Fraud Take these steps to help recover or minimize the effects of Credit Card Fraud. Although these are not all inclusive, they do provide a good starting point on the road to recovery.

  1. Notify your bank(s)/credit union(s) who hold the card that was compromised.
  2. Close or Transfer from any compromised credit/debit card affected and have new one issued.
  3. Change usernames, passwords, and PIN of any affected card from a known trusted computer.
  4. Obtain and review your credit report (disputing any unauthorized activity).
  5. File a police report.
  6. Monitor your account(s) and credit for potential future problems. .
a woman holding a child

Debit/MasterCard Fraud

Take these steps to help recover or minimize the effects of Debit/MasterCard Card Fraud. Although these are not all inclusive, they do provide a good starting point on the road to recovery.

  1. Notify your bank(s)/credit union(s) who hold the card that was compromised. For Coosa Valley Credit Union members, call 1-800-500-1044 to report your compromised debit card(s).
  2. Close or Transfer from any compromised credit/debit card affected and have new one issued.
  3. Change usernames, passwords, and PIN of any affected card from a known trusted computer.
  4. Obtain and review your credit report (disputing any unauthorized activity).
  5. File a police report.
  6. Monitor your account(s) and credit for potential future problems.
a woman holding a child

Phishing Scam/Fraud

Take these steps to help recover or minimize the effects of a Phishing Scam/Fraud. Although these are not all inclusive, they do provide a good starting point on the road to recovery.

  1. Do NOT provide any additional information to the phishing sender/site.
  2. Notify your bank(s)/credit union(s) of what was received and what pertinent information has been given out. For Coosa Valley Credit Union members, call one of our branch locations nearest you to report/dispute your Phishing Scam.
  3. Review information given out and contact any additional financial institutions if needed.
  4. Close or Transfer from any compromised credit/debit card affected and have new reissued.
  5. Change usernames, passwords, and PIN of any affected card from a known trusted computer.
  6. Obtain and review your credit report (disputing any unauthorized activity).
  7. File a police report.
  8. Monitor your account(s) and credit for potential future problems.
a woman holding a child

Internet Malware

In case of suspected compromise via Internet Malware/Fraud, take these steps to help recover or minimize the fraud.

  1. Change usernames, passwords, PIN, etc. (of any potential site or card affected) from a known trusted computer. For Coosa Valley Credit Union members, call one of our branch locations nearest you to aid in your password & PIN changes.
  2. Clean infected computer with Anti-Virus and Anti-Malware OR take to a reputable computer technician to have the infected computer cleaned.
  3. Obtain and review your credit report (disputing any unauthorized activity).
  4. Review account(s) for suspicious/fraudulent activity