Fraud and Security Fraud and Security

Safe Practices for Businesses

Business Email Compromise: A Big Problem

“Business Email Compromise” (or BEC), is becoming an all too common scam executed by cyber thieves. Criminals work to understand and monitor your business processes, request forms, and partners involved over a period of days or weeks, then they generate a highly targeted attack designed to fool you into thinking you are working with a legitimate business partner. Often times these types of scams result in a significant financial loss to the business.

Protect Yourself from a Data Breach

In today’s environment chances are good that your card information could be compromised in the future. Here’s what to do if you’re a consumer, a merchant or another type of small business to protect yourself from a security breach.

Security Procedures for Online Account Holders

Evidence is mounting that cyber crimes are on the increase. We’ve heard about the elevated risk from law enforcement and security experts. Financial institutions across the country have experienced ACH cyber crimes. With the growth in malware and ability for fraudsters to load virus programs on unsuspecting client computers, the need for heightened awareness and protection is of extreme importance.

Businesses Should Beware of Check Scams

A surge of fraudulent activity is being directed at attorneys, title companies and other businesses. Everyone should be on the alert for check scams. Read about some common scenarios and how you can protect your business.

Making Cybersecurity a Priority

The federal government has called cyber threats one of the most serious challenges the nation faces. Find out what you can do to protect yourself online.

Guard Yourself Against Online Fraud

Pinnacle is partnering with Trusteer, a leading expert in financial security, to offer Trusteer Rapport online fraud protection software.

[Webinar] How to Avoid Email Scams

Unfortunately, as phishing attacks become more sophisticated, it is very difficult for the average person to tell if a message is fraudulent. Pinnacle developed a list of the "Super 6" questions you can ask yourself to help determine the legitimacy of any email.

Destroy Data before Replacing Your PC

If you’re getting rid of an old computer or laptop, take the necessary steps to protect yourself and your identity.

Don’t Wait to Update

Microsoft is no longer supporting its Windows XP operating system. Computers that run XP will be vulnerable to viruses, malware and other security threats. Learn more about the importance of updating your computer's software.

Tips on Reporting Fraud

Report a Lost or Stolen Debit/Credit Card

If you believe your Pinnacle debit or credit card is lost or stolen, call us immediately.

How to Report Identity Theft

Read this for steps you should take immediately.

How to Obtain Your Free Credit Report

Here's how to get a free copy of your credit report once every 12 months.


Protecting your Privacy


Federal law gives consumers the right to limit some of how your personal information is shared. See how Pinnacle protects your personal data.

Stop Email Fraud


Pinnacle developed a list of the Super Six questions you can ask yourself to help determine the legitimacy of any email.

Trusteer Rapport

Trusteer Rapport

An additional layer of protection for your computer that works alongside anti-virus and firewall to safeguard your sensitive information.