Internet Security

Georgetown Federal Credit Union will never ask for any personal information in an email.

Be suspicious of any emails that request personal information, that ask you to “verify” information through email, or ask you to click on a link to a “special” website to verify or request personal information.

Things you should know about our emails

  • We never request personal information through email
  • We never ask you to “verify” information in an email
  • We will never ask you to click on a link to a “special” website to verify or request personal information

Protect Yourself from Phishing, Scams, & Fraud

“Phishing” is an attempt at identity theft where thieves send emails to consumers requesting that they “verify” or reveal personal data.

What if the email looks authentic?

To appear genuine, and gain your confidence, “phishing” emails may contain some or all of the following elements:

  • An institution’s branded logo
  • The institution’s name in the “sent from” line, subject line and/or body of the email
  • A recognizable employee name
  • A “special” link to a phony website built to extract personal data
  • An assurance of encryption for a secure transfer of personal data

Don’t be fooled. Emails containing these elements, requesting your personal information, are more than likely a scam! Do not reply to them.

In the event you receive a suspicious email, contact us immediately to confirm the authenticity of the communication and report the suspicious activity.

And beware of these other emails

  • Emails that inform you that you have won a lottery (or any contest) that you did not enter.
  • Emails instructing you to either “WIRE”, “Send” or “Ship” money as soon as possible, to a large U.S. City or to another country.
  • Emails asking you to facilitate money transfers through your account.

Protect Yourself

  • Never respond to a suspicious email. This will confirm to the sender that it is a “live” email address.
  • Don’t open a suspicious email. Delete it unread.
  • Avoid giving out your email address unless you know how it will be used.
  • Never purchase anything advertised through an unsolicited email.
  • Avoid filling out forms in email messages that ask for personal information.
  • If you are tempted to click on a link, always compare the link name to the actual web address before you click.
  • Log on to the official website, instead of clicking and linking from an unsolicited email.
  • Before you do anything, contact the business that supposedly sent the email to verify if the email is genuine.
  • Look for signs of security --- web addresses beginning with “https” or check for the security icons in your tool bar.