Fraud and Security Fraud and Security

Safe Online Practices for Consumers

Back to Safe Online Practices for Consumers

[Webinar] How to Avoid Email Scams

Unfortunately, as phishing attacks become more sophisticated, it is very difficult for the average person to tell if a message is fraudulent. That is why phishing schemes are so prevalent and successful for criminals. For example, many phony email messages use real company logos of well-known brands.

Pinnacle developed a list of the "Super 6" questions you can ask yourself to help determine the legitimacy of any email.

  1. Is this an unsolicited email?
  2. Is the source of the email unfamiliar to you?
  3. Does the email ask you to click a link, download or open an attachment or log in to proceed?
  4. After reading the email, does the request seem suspicious?
  5. When you hover your mouse over the link, is the redirect address different or unfamiliar?
  6. Does the redirect link end with “.exe”, “.bat”, “.pdf” or “.zip”?

If your answer is “yes” to multiple questions, use extreme caution with the email and strongly consider deleting it.

Click here to watch our 20-minute webinar that provides real examples of how to use the "Super 6" questions.

Tips on Reporting Fraud

How to Report Identity Theft

Read this for steps you should take immediately.

Report a Lost or Stolen Debit/Credit Card

If you believe your Pinnacle debit or credit card is lost or stolen, call us immediately.

Finding a Legitimate ID Theft Protection Service

Depending on the services you want, you should be able to discover an option that fits your needs and your budget.


Protecting your Privacy

Federal law gives consumers the right to limit some of how your personal information is shared. See how Pinnacle protects your personal data.

Stop Email Fraud

Pinnacle developed a list of the Super Six questions you can ask yourself to help determine the legitimacy of any email.

Trusteer Rapport

We have teamed up with IBM to offer Trusteer Rapport—a leading provider of online fraud protection software. Find out how it delivers an extra layer of security.