Fraud and Security
Safe Online Practices for Consumers
Back to Safe Online Practices for ConsumersHow to Avoid Email Scams
Unfortunately, as phishing attacks become more sophisticated, it is very difficult for the average person to tell if a message is fraudulent. That is why phishing schemes are so prevalent and successful for criminals. For example, many phony email messages use real company logos of well-known brands.
Pinnacle developed a list of the "Super 6" questions you can ask yourself to help determine the legitimacy of any email.
- Is this an unsolicited email?
- Is the source of the email unfamiliar to you?
- Does the email ask you to click a link, download or open an attachment or log in to proceed?
- After reading the email, does the request seem suspicious?
- When you hover your mouse over the link, is the redirect address different or unfamiliar?
- Does the redirect link end with “.exe”, “.bat”, “.pdf” or “.zip”?
If your answer is “yes” to multiple questions, use extreme caution with the email and strongly consider deleting it.
Tips on Reporting Fraud
How to Report Identity Theft
Read this for steps you should take immediately.
Report a Lost or Stolen Debit/Credit Card
If you believe your Pinnacle debit or credit card is lost or stolen, call us immediately.
Finding a Legitimate ID Theft Protection Service
Depending on the services you want, you should be able to discover an option that fits your needs and your budget.
Security Threats
Equifax Data Breach: What you need to know to protect yourself
Popular mSpy Smartphone Parental Control App gets Hacked
Merchants: PoSeidon malware targets point-of-sale systems
Protecting your Privacy
Federal law gives consumers the right to limit some of how your personal information is shared. See how Pinnacle protects your personal data.
Stop Email Fraud
Pinnacle developed a list of the Super Six questions you can ask yourself to help determine the legitimacy of any email.
Trusteer Rapport
Trusteer Rapport will not be supported in Tennessee after Dec. 31, 2018. Instructions for uninstalling the software are available here.