Criminals are constantly searching for new and effective ways to obtain money and personal/private information from banks and their customers. Each year, more and more consumers and businesses depend on computers, tablets, and smart phones to perform their banking transactions and their purchases, making Cybersecurity and Fraud vulnerabilities more prevalent. At The Provident Bank, Cyber and Information Security is a priority and we are committed to raising awareness and educating employees and our customers in an effort to protect confidential information.

Here are some examples of the different types of fraud to watch out for:

Identity Theft

Identity theft is the most prevalent type of fraud. This crime occurs when someone gains access to your personal information and uses it to open new accounts, conduct transactions in your name or completes fraudulent purchases. Not only can there be significant financial losses for the victim, but the activity can also damage your credit. These thieves can not only obtain personal information using online resources, but can also use offline methods such as dumpster diving, stealing wallets or even stealing or rerouting your mail.

Click here to watch a fun video on how to protect your personal information.

Wire Fraud

Cyber criminals want money and they will take the time to research who works in finance or accounts payable at your business. These criminals will then send an email impersonating the recipient’s boss. The content of the email will state that there is some sort of an emergency and they need money transferred right away to a particular account. In actuality, the email is fraudulent and an attempt to get you to send the criminal money.

Tax Fraud

This cyber crime involves the attempt to gain access to your employees or co-workers' information to commit tax fraud. The criminals will research your organization and determine who handles employee information and then send emails pretending to be a senior executive or someone from the legal department and request documentation with urgency. If you get an email like this that seems suspicious, always check with the person the email appears to be coming from just to make sure they actually sent it.


A type of attack that utilizes email or messaging services to trick a recipient into opening an attachment, clicking on a link, or simply to get you to fall for a scam with a promise that you will either be helping out a great cause or that you will receive money. By falling victim to these types of attacks, you risk having your computer infected or confidential information released. Attackers work hard to create convincing communications and do this by either impersonating someone you know, or acting like an organization you would normally interact with or care about. The attackers often include email addresses that look familiar or logos that appear to belong to a legitimate site, such as your bank. Phishing emails and messages are sent out to millions of people all at once in an attempt to raise the chances of success. Just like using a net to catch fish, attackers do not know what or how much they will catch, but they know that the bigger the net, the more fish they are bound to find. 

Click Here to Learn More About Phishing Scams

Social Engineering

Social engineering is an attack that relies heavily on human interaction and it often involves tricking people into breaking normal security procedures. Attacks can include Phishing, Spear Phishing, Pretexting, Ransomware or Baiting. For organizations, it is recommended that penetration tests are performed on a regular basis, using social engineering techniques to help learn what types of attacks cause the most weaknesses and what users cause the most risk. It is also a great opportunity to identify areas or employees that require additional training. Security awareness is critical in preventing successful social engineering attacks. 

What is Social Engineering and How You Can Protect Yourself

Click Here for a Link to Some Tips to Protect Yourself From Ransomware.

Elder Abuse Fraud

Financial or material exploitation often can involve the mistreatment or exploitation of property, possessions or assets of adults without consent, under false pretense, or through coercion and/or manipulation. Financial exploitation is a fast-growing form of abuse of seniors and adults with disabilities. Situations of financial exploitation commonly involve trusted persons in the life of the vulnerable adult, such as:


Family Members


Friends & Acquaintances


Doctors & Nurses

Protecting Your Home

Most homes have devices linked to their wireless networks, including computers, laptops, gaming devices, TVs, tablets and smart phones that access the Internet. To protect your home network and your family, you need to have the right tools in place and confidence that you can use the Internet safely and securely. Below are some tips for keeping your home network and family safe. 

Creating a Cyber Secure Home - What does that look like?

Securing Your Home Network

Parent's Guide to Protecting Your Family Online

Keeping Your Kids Secure

Protecting Your Business

No matter how small or large your business may be, it is a target for potential hackers. How can you keep your business network secure? Here are a few tips to keep in mind:

Why Your Business May Be A Target

What is CEO Fraud?

The Federal Trade Commission Offers Free Security Guides

Would you like to learn more about how you can protect yourself, your family and your business? The Federal Trade Commission (FTC) offers valuable free guides to keep you safe. Check out a few of the FTC's resources below:

Start with Security

Protecting Personal Information

Data Breach Response

Careful Connections: Building Security in the Internet of Things