Your Security is Imperative!
At Inspire FCU, we hold ourselves to the highest standard when it comes to providing you with a safe banking experience and the resources needed to protect yourself.
How Are We Doing Our Part?
In addition to our dedicated team working around the clock to monitor member accounts for suspicious activity, we’ve also implemented the following measures.
-
Two-Step Authentication in Digital Banking
-
-
Lock/Unlock Debit Card From Your Phone or Computer
-
We Never Sell Personal Information
Develop Secure Habits
Although Inspire utilizes technology to keep you secure, you should consider implementing the recommendations below for added peace of mind.
-
Update Passwords Every 90 Days
-
Use Multi-Factor Authentication
-
Never Share Login Credentials
-
Check Your Account Frequently to Verify Accuracy
-
Avoid Unusual Looking ATMs
Popular Scams:
Scammers have taken extreme measures to make their fraud appear legitimate. Keep an eye out for these popular scams and stay vigilant.
How It Works:
Fraudsters are impersonating banks, typically via email, phone calls, or text messages. They might claim there’s an issue with your account, such as unauthorized charges, or ask you to confirm personal details to “secure” your account.
How to Protect Yourself:
Always be skeptical of unsolicited calls, emails, or texts that ask for your account details or personal information.
Contact us directly using official contact information to verify any claims.
If you receive a suspicious email from us, don’t click on any links; instead, go directly to our official website by typing the URL into your browser.
Set up account alerts for transactions, so you can quickly spot any unauthorized activity.
How It Works:
Scammers claim to be from a reputable tech company (e.g., Microsoft, Apple, or other well-known software providers) and tell victims that their computer has a virus or security issue. They ask the victim to give remote access to their computer, often installing malicious software or stealing personal information. They may also demand payment for “repairs” or “software licenses” that don’t exist.
How to Protect Yourself:
Be wary of unsolicited calls or pop-up messages claiming to be from tech support companies.
Never grant remote access to your computer unless you are absolutely certain it’s a legitimate request.
If you think there’s an issue with your computer, contact the company directly through official channels (e.g., their customer service phone number or website).
Keep your operating system and software up to date with the latest security patches.
How It Works:
Scammers convince victims to buy gift cards (e.g., Apple iTunes, Google Play, or Amazon gift cards) and provide the gift card details (PIN and card number). They may impersonate a loved one, a government agency, or a business, claiming that gift cards are needed for emergencies, tax payments, or urgent transactions.
How to Protect Yourself:
Never purchase gift cards to send to someone you don’t know or have only met online.
Legitimate organizations (including your bank or the government) will never ask you to pay in gift cards.
If you’re ever unsure about a request for gift cards, call us or the company directly using a trusted contact number to verify the legitimacy of the request.
How it works:
Scammers will contact you via phone call or email to inform you that they owe you a refund. The refund is commonly for an Amazon purchase you did not make or a subscription you did not sign up for. While you are on the phone with them, they will attempt to gain access to your bank account by either asking you for your information or having you grant them access to your computer via help desk software such as ReadyDesk. They will then make it look like your account was refunded an amount way more than you initially discussed. They will ask you to return the excess money via wire transfer, mailing a check, or gift cards. There was never a refund deposited into your account, leaving you paying the scammer out of your own pocket.
How to protect yourself:
Make sure that the email or phone number that reached out to you is legitimate. You can contact the merchant they are posing as to make sure or contact us to ensure the charges they are claiming they owe you a refund for are reflected on your account.
How it works:
Phishing scams are a type of social engineering attack in which you receive an email or text that looks like it’s from a popular service provider like Apple or your bank. The message might tell you that someone signed into your account and that you need to reset your password.
Unfortunately, when you click the link provided, you’ll end up sharing your personal information with scammers or downloading malware onto your device (which can allow them to hack your email).
Phishing scams also happen via text and even through phone calls, but phishing emails are most common.
How to protect yourself:
Be extra diligent when responding to official-looking emails. Again, if you’re unsure, contact the company directly and ask if the request is legitimate.
How It Works:
Scammers send text messages pretending to be from your bank or other trusted sources. The text may contain a link that leads to a fake website or prompts you to call a number that connects you to the scammer.
How to Protect Yourself:
Do not click on any links or respond to unsolicited texts asking for personal information.
Verify the authenticity by contacting your bank or institution directly.
Use a spam filter on your mobile device to block fraudulent messages.
How It Works:
Scammers send fake checks (often for large amounts) and ask the victim to deposit them into their bank account. The victim is then asked to send a portion of the money to the scammer, often claiming it’s for a “deposit” or “shipping fees.” The bank eventually discovers the check is fake, and the victim is left responsible for the full amount.
How to Protect Yourself:
Be cautious when dealing with checks from unknown sources.
Wait for a check to clear fully before taking any action.
Never send money to anyone you’ve only met online, especially if they send a check that needs to be deposited.
How it works:
Fraudsters will stoop to lows you couldn’t imagine. Some scammers pretend to run a reputable charity (such as a veterans charity) and may call or email you for a donation. Many of them may go as far as to request personal information or banking details, such as your, granting them full access to your account.
How to protect yourself:
Research the organization they are posing as. You can ask them questions related to your research to verify their legitimacy. You can also reach out to the organization and ask if the solicitation for a donation is legitimate.
How it works:
You will receive an email claiming you’ve won the lottery, some sweepstakes, a sum of money, or other prizes. In order to claim your prize, the scammers will ask you to provide sensitive information.
How to protect yourself:
Emails claiming you’ve won a large sum of money can be exciting. Be on high alert if they demand you share sensitive information or send money to the organizers. If it sounds too good to be true, it likely is.
More Resources

“Smishing” is the New Phishing
Look out — there’s a new scam in town! “Smishing” is a scam format that has recently encountered a boost in scammer popularity, and it’s surprisingly

6 Popular Types of Phishing and Phone Scams
Don’t Be The Next Victim: Protect Yourself From Today’s Scams Online scams can be hard to spot and difficult to avoid. They are enticing. They