How We Protect You
A secure banking environment is a partnership between you and your bank, and one we take seriously. The following information describes the steps we take to protect your confidential information.
Consumer Complaints [ENGLISH] | Como Submitir Quejas de Clientes [ESPANOL]
Federal Trade Commission Website
Customer Notice of User Safety at Unmanned Automated Teller Machines (ATM)
7 Tips For Protecting Yourself Online
Though the internet has many advantages, it can also make users vulnerable to fraud, identity theft, and other scams. Check out these helpful tips to keep you safe.
9 Must-Know Ways to Spot a Fake Credit or Debit Card
With the rise of technology, counterfeit, cloned, altered and forged (CAF) cards, this article provides you a primer on how to detect a fake card.
What is Jugging And How To Protect Yourself
Jugging is a dangerous and costly crime that involves a robbery. Below are some helpful tips to keep you and your money safe from Jugging crimes.
BEC Attacks: What They Are and How To Protect Yourself
To help you keep one step ahead of this multi-billion-dollar threat, we put together a quick walkthrough of what a business email compromise is, how it works, and how you can best protect your organization.
Top 10 Practical Cybersecurity Strategies for Businesses
Corporate account takeover is a type of fraud where thieves gain access to a business’ finances. We have put together ten tips to help create a strategy to keep your business safe.
5 Ways to Protect Your Business from Ransomware Attacks
Ransomware infiltrates enterprise networks and servers and individual laptops or computers, leading to the loss of critical information and data. These tips can help your businesses thwart attacks.
6 Tips To Protect Yourself When Using QR Codes
Cybercriminals are taking advantage of this technology by using QR codes to direct victims to malicious sites to steal personal information. Here are some tips for protecting yourself.
Banks Never Ask That
WestStar will never call and ask for sensitive information, including online banking login information, balances, account details, or one-time passcodes. If you receive a call that you suspect may be fraudulent, remember to Hang Up. Look Up. Call Back.
Protect Yourself Against Check Fraud
Fraudsters aim to modify the amount and/or payee on checks before attempting to cash or deposit them, often using mobile deposit services. Here are ways you can guard yourself from check fraud.
What You Need to Know about Card Skimming
When you use an ATM, the most you may worry about is forgetting to take back your card or grabbing the money. However, you have more to fear if an ATM skimmer is secretly working in the background.
Identity Theft: What You Should Do, What You Should Know
Is someone using your personal or financial information to make purchases, get benefits, file taxes, or commit fraud? That's identity theft. Here are some tips to help you spot identity theft.
Sound Business Practices for Companies to Mitigate Corporate Account Takeover (CATO)
Corporate Account Takeover is a type of business identity theft in which a criminal entity steals a company’s valid online banking credentials. Here are some sound practices to secure your business.
Beware Email Spoofing and Wire Fraud
Some messages could be lurking from fraudsters attempting to convince you to wire money to them, all while acting as legitimate companies. Know the signs of email spoofing to safeguard your accounts.
Scam Alert:
"Secret" Federal Reserve Accounts
Scammers are telling people they can pay their bills using so-called "secret accounts" or "Social Security trust accounts" and routing numbers at Federal Reserve Banks. Here is what to look for.
5 Things to Know about Safe Deposit Boxes and Home Safes
Over time, your valuables change, and so do your options to protect them. Here are a few choices, including safe deposit boxes and home safes, along with suggestions on how to assess each option for your specific needs.
Phishing for Wire Transfer Fraud
In today's digital age, wire fraud schemes rely on targeted email phishing. Although they have become increasingly common, many people believe they cannot fall victim to this type of fraud. Check out how the scam works.
16 Tips To Best Protect Your Personal Information
With technological advances, protecting your personal information is of paramount importance. We have compiled 16 tips to keep yourself safe online.
Your Password: Keys to the Castle
Passwords provide the first line of defense against unauthorized access to your computer. Weak passwords make it easier for attackers to access your computers and network. Here’s how to create a secure password.
Defend Yourself Against Wire Fraud and CEO Email Scams
Business email compromise scams (BECs) typically combine spear phishing, email spoofing, social engineering, and occasionally malware, and have steadily grown into a prolific problem for businesses of all sizes. Learn about each scam here.
5 Email Scams Costly to Your Business
Business Email Compromise (BEC) scams, also known as “whaling’ or “CEO fraud,” involve crafted emails sent to recipients by fraudsters pretending to be senior executives. Here are five scenarios.
Choosing and Protecting Your Passwords
Choosing a strong password is often the key to keeping your account safe from hackers who use several types of programs to help guess or crack passwords. We want to help you understand the process of creating and maintaining a secure account.
4 Ways to Protect Your Business From Account Fraud
Criminals use spoofed emails to spread software through infected attachments and online social networks to obtain login credentials, transfer funds, and steal your private information. This fraud is referred to as "corporate account takeover."
6 Easy Social Networking Security and Safety Tips
While you can make new friends through social networking sites, you may also be exposed to embarrassing situations and people who have bad intentions. Protect yourself by taking some common-sense precautions.
Freeze Your Credit File for Free
One way to keep identity thieves from stealing your information is to "freeze" your credit report. A credit report freeze restricts access to just your existing creditors and can only be lifted at your request, making it harder for someone obtain credit in your name fraudulently.
Don't Take the (Phishing) Bait
Phishing is when you get emails, texts, or calls that seem to be from companies or people you know, but they are from scammers. They want you to click on a link to steal your money and/or identity. Here are some helpful tips to avoid phishing.
8 Tips to Protect Your Identity
Identity theft continues to be one of the fastest growing crimes in the United States. WestStar recommends following our tips to keep your information – and your money – safe from scammers.
Fake Checks: Tip-Offs to Rip-Offs
Fake checks drive many types of scams – like those involving online sales, phony prize wins, mystery shoppers, and others. If you have deposited the check, you may feel safe because there is money in your account. Just because the check has cleared does not mean it is good.
Vishing: Avoid Being Taken Hook, Line, and Sinker
Unfortunately, criminals also use those same skills. The result? When you answer your phone, you might not know for sure who you are talking to or if you are a "vishing" target. Here are some examples to help you avoid this plan.
Protect Your Small Business From Financial Fraud
Criminals use spoofed emails, malicious software and online social networks to obtain login credentials to businesses’ accounts, transfer funds from the accounts and steal private information, a fraud referred to as “corporate account takeover.”