Criminals and scammers use a variety of methods to obtain your personal or organizational
information. These include:
Email Fraud
Email fraud is usually harsh, demanding and threatening. Please remember these are not
legitimate messages; Do NOT reply to these messages.
Email spoofing: Forging an email header so that the message appears to have
originated from someone or somewhere other than the actual source. Although most spoofed
email falls into the "nuisance" category and requires little action other than deletion, the
more malicious varieties can cause security risks and other problems. For example, spoofed
email may purport to be from someone within your company or a vendor with which your company
has a relationship. These emails may contain new payment instructions or changes to the
beneficiary account on a recurring payment.
-
Be very suspicious of emails from the CEO, Director, etc. that direct you to transfer a
large amount of funds
-
Verify all instructions verbally with the sender
Phishing: When criminals use email to try to lure you to fake websites,
where you are asked to disclose confidential financial and/or personal information.
How to recognize common Phishing tactics:
-
You do not recognize the "From" email address as valid
-
The email requests you to verify your account/personal information (account number, user
ID, password, etc.)
-
A hyperlink within the email address does not display the actual address
-
The email conveys a sense of urgency or threatens some dire consequence if you do not
respond
Never respond to any email that:
-
Requires you to click a link, open an attachment, confirm, verify or refresh account
information
-
Asks for personal or organizational information
-
Asks you to enter your user ID, password or account number(s) into an email or
non-secure webpage
-
Threatens to close or suspend your account if you do not take immediate action by
providing specific information about you or your company
Impersonation Fraud
Occurs when someone assumes your identity to perform a fraud or other criminal act.
Criminals can get the information they need to assume your identity from a variety of
sources, such as the theft of your wallet, your trash or from credit or bank information.
They may approach you in person, by telephone, text message or on the Internet and ask you
for the information.
Remember:
-
J.P. Morgan will not send email notifications stating your account has been
compromised or passwords need to be changed
-
J.P. Morgan will never ask you for your password
-
We will never call you to offer log-in assistance unless you have contacted us first
-
When you call J.P. Morgan, only call your J.P. Morgan
Access Regional Help Desk or your J.P. Morgan representative
back to top
Back to top