Skip to content

Debit Card Fraud and Blocks

Due to an increase in fraudulent transactions, we have implemented various blocks to protect our customers from unauthorized and fraudulent transactions. We understand this may be an inconvenience to some of you, but we have your best interest in mind when implementing these blocks. Listed below are some of our current blocks.

Blocked Merchants

  • Variety Stores – Transactions over $100 where chip terminal is not using chip card feature
  • Spring Airlines – All Transactions
  • Third Party Electronic Money Transfers (ex. Square, CashApp, PayPal, etc.) All Amounts

**Attention** Blocked Debit Cards does not mean you cannot continue to use “Cash App” products.  You will be required to use your bank information such as: the bank’s routing number (253271822), your checking account number, and “NOT” your Debit Card number when utilizing a “Cash App”.  Another option is to use your “Credit Card” as a “Cash App”.

  • Gas Stations – Must use chip reader if the option is available
  • Walmart – Must use chip reader if option is available
  • Skyticket.JP – All Transactions
  • Coolblue –All Transactions

 

Blocked Countries

  • Cuba – All Transactions
  • Kenya – Must use chip reader
  • The Netherlands – Electronic gaming transactions

 Tips to Reduce Fraudulent Transactions

  • If it sounds too good to be true, it usually is.
  • Nothing is free, not even “Free Trial” of products and services. Read the “fine” print.
  • “Always” read the terms and conditions of products and / or services. This is where the true price will be revealed or state the charges at a later date.

 

How to Protect Yourself from Online Fraud

Online fraud continues to grow in sophistication and frequency. These scams appear in many forms but they are especially prevalent in emails and websites. Here are a few tips on protecting yourself online.

  • First and foremost, be careful of what you click on links and attachments. They might contain malicious code or malware.
  • Be careful of Pop-up advertisements. They might attempt to obtain sensitive information from you or harbor malicious links. Use web blocking and filtering applications or services. Many of them contain software that will help you determine if a website is safe or not.
  • Do NOT use the same ID and Password for every online account you have. That way if one account is compromised, not all of them are.
  • Change your password frequently and use complex passwords (numbers, letters, special characters).
  • Do NOT store your ID and password information where others could gain access to it. It is best not to write the information down at all or share them with others. Use multifactor authentication.
  • Be aware of Phishing attempts (websites or emails) that try to obtain personal or confidential information from you.
  • Beware of public Wi-Fi connections and public computers because they could have malicious software installed on them that can collect your data. If possible, connect to the Internet using a VPN service.
  • Make sure your software and Operating system is up-to-date with the latest security patches.
  • Secure your PC with Antivirus, Firewall and Anti-Malware software.
  • Connect to websites using a secure connection (HTTPS). This helps secure a connection to your favorite site and prevents eavesdropping into your connection with that site. You can type in HTTPS into your address bar to see if that service is available for your favorite service. i.e. HTTPS://google.com.

  

Social Engineering/Phishing Attacks

In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. However, by asking questions, he or she may be able to piece together enough information to infiltrate an organization's network. If an attacker is not able to gather enough information from one source, he or she may contact another source within the same organization and rely on the information from the first source to add to his or her credibility.

Check out our Fraud & ID Theft Prevention page for more information.