As James Cagney would say, “You dirty, double-crossing rat.” That's the sentiment credit unions and small banks feel after falling for “social engineering” tactics.

Social engineers pretend to be someone they're not in hopes that you'll fall for their ploy and click on a link or attachment they send you that will surreptitiously download malware.

Here's an example of how social engineering works: Someone sends to one person or many people at your credit union an email posing as a prospective member. The email might say, “Our company is thinking about opening a business account with your credit union. Please review our attached financial data and let me know which type of account would work best for us.”

Continue Reading for Free

Register and gain access to:

  • Breaking credit union news and analysis, on-site and via our newsletters and custom alerts
  • Weekly Shared Accounts podcast featuring exclusive interviews with industry leaders
  • Educational webcasts, white papers, and ebooks from industry thought leaders
  • Critical coverage of the commercial real estate and financial advisory markets on our other ALM sites, GlobeSt.com and ThinkAdvisor.com
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.