Be aware of phishing attempts in which individuals spoof our main phone number, and call clients claiming to be from ConnectOne Bank in order to acquire financial information.

ConnectOne Bank employees will never call you to ask you for your online banking password or token numbers, pin, or personal information.
If you receive a suspicious call, text or email from someone claiming to be a ConnectOne Bank representative do not share any information or reply. If it is a suspicious call, please hang up immediately and contact either your local banker or our main line at 844-266-2548 to report the incident. 

Be aware of phishing attempts in which individuals spoof our main phone number, and call clients claiming to be from ConnectOne Bank in order to acquire financial information.

ConnectOne Bank employees will never call you to ask you for your online banking password or token numbers, pin, or personal information.
If you receive a suspicious call, text or email from someone claiming to be a ConnectOne Bank representative do not share any information or reply. If it is a suspicious call, please hang up immediately and contact either your local banker or our main line at 844-266-2548 to report the incident. 

Fraudsters: Professional Exploiters of Vulnerability

Education and vigilance can safeguard your identity
Fraudsters: Professional Exploiters of Vulnerability

October 2, 2023

In today's digital age, fraudsters have become increasingly sophisticated in their tactics, exploiting individual's unique vulnerabilities to their advantage. They prey on our emotions, manipulate our feelings of love and fear, and take advantage of our readiness to react swiftly to certain situations. This predatory behavior serves as a stark reminder to remain vigilant and exercise caution throughout the multitude of ways in which we communicate and connect daily.

Emotional Exploitation: Leveraging Love and Fear

Fraudsters are adept at tapping into our most profound emotions - love and fear. In romance scams, for instance, they create fake profiles on dating platforms or social media, build relationships with their targets, and then exploit these feelings to extract money or personal information. The 'love' victims think they've found blinds them to the reality of the situation, making it difficult for them to recognize they're being scammed.

In contrast, fear-based scams, like those involving ransomware or threats of legal action, operate by creating panic - a quick-response trap. The goal is to make the victim feel that they have no time to think or seek advice, pushing them to take immediate, hasty action causing serious financial implications.

Real-Life Exploitation: Capitalizing on News and Tragedies

Fraudsters never hesitate to seize opportunities presented by real-life events, no matter how tragic. They exploit major news headlines and even personal tragedies, leveraging the relevancy and timeliness of the tragedy to create an emotional narrative. This compels individuals to react more promptly, reducing the likelihood of doubting the authenticity. When a natural disaster strikes or a pandemic breaks out, they quickly set up fake charities, posing as legitimate organizations urgently seeking donations. They spin convincing stories to tug at the heartstrings of their targets, compelling them to donate instantly without verifying the credibility of the so-called charity. Similarly, they exploit high-profile news topics, creating phishing scams that appear to offer more information or exclusive insights, but are in reality designed to steal personal and financial information. Being aware of these tactics can help us protect ourselves from these cruel and opportunistic scams.

Unique Vulnerabilities: Different Categories and Their Cybersecurity Risks

There are particular groups on which cybercriminals focus their attention due to their perceived vulnerabilities:

  • The elderly may not be as technologically savvy, and their lack of familiarity with digital platforms makes them prime targets for scams. It is crucial to educate and empower them to navigate the online world safely and confidently.

  • Youngsters, despite being more technologically literate, tend to have an inherent trust in digital platforms and may overlook potential red flags and unwittingly disclose sensitive information, leading to serious cybersecurity breaches. Gen Z in particular, faces significant cybersecurity risks due to their extensive digital footprints. With the increased exposure to the digital world, from social media usage to online gaming, shopping and e-learning, comes an amplified risk of falling prey to sophisticated online scams and hacking attempts.

  • Businesses, big or small, present lucrative opportunities for fraudsters. They often house a wealth of data - from financial information to sensitive client details, which, if compromised, can have far-reaching consequences.

  • Employees can unknowingly grant access to company systems by falling for tactics like "CEO Fraud". In this type of phishing, cybercriminals impersonate executives or high-ranking officials. Due to the authority these figures hold, employees lower in the hierarchy often comply without questioning the request's validity.

By being aware of these unique vulnerabilities, we can implement strategies to mitigate risk and enhance our collective cybersecurity posture.

Staying One Step Ahead

Having an understanding of the strategies that fraudsters utilize is the first step towards protecting ourselves from falling victim to their scams. Being aware of our unique vulnerabilities – whether it's our emotions or our tendency to act quickly – can help us stay one step ahead. Remember, caution is your strongest ally in the digital world. Always take a moment to pause, verify, and think before you click.

How can we help you?

Contact a ConnectOne Bank representative to learn more.

You come first. We aren't like those other banks.

At ConnectOne Bank, we understand that little things matter and focus on those things when providing personal and business banking solutions for our clients.