Security Corner

Identity Theft Resources

Nassau Financial will never request your personal information via email or text message. If you are ever unsure that a message you receive is from us, call the number you know: 516.742.4900 to speak with a Representative.

Fraudulent Requests for Information via Text, Email, and Phone

Members and non-members have reported receiving fraudulent texts and emails purportedly from us and other financial institutions indicating that their online banking and/or debit cards have been suspended. These messages include a link or phone number for people to contact and confirm their personal information in order to re-instate and regain full access to these services. The message typically includes a threat that if immediate attention is not taken, you will permanently lose access. Please remember that Nassau Financial would never request personal information by text or email. For the safety and security of your personal information, do not reply to any such requests.

Fraudulent Official Checks

We are receiving calls from people in various parts of the country attempting to verify if funds are available for the official checks they receive in the mail (usually priority mail) as payment for agreeing to act as a mystery shopper or display product ads on their cars. These checks are fraudulent and will not be paid. (See sample checks.) Please beware if you receive an email or phone call with requests like this. Be sure to do a thorough investigation before doing business with any company, particularly if they call you.

ATM Skimming

You may have heard that hidden devices in ATMs can be used to steal your PIN and account information when you make ATM transactions. A few simple steps can help protect your account information from fraudulent activities.

Use ATMs you are familiar with, such as Nassau Financial and shared branch ATMs. Avoid ATMs that are hidden or in out-of-the-way places. These are easy targets for thieves to place a skimming device or tiny camera without being noticed. If any part of the ATM looks or feels unusual (if it feels loose when you insert your card, for instance), do not use the machine.

Cover the keyboard when you enter your PIN. This will prevent your PIN from being stolen by a hidden camera. And remember, never give your PIN to anyone!

Check your balances regularly by using Call-24, Mobile-24, or Access-24 Online Banking. Contact us as soon as possible if you notice anything suspicious.

OnGuard Online

The Federal Trade Commission has created a website to help fight cybercrime. OnGuard Online provides practical tips from the federal government and the technology industry to help you be on guard against Internet fraud, secure your computer, and protect your personal information. Topics range from Identity Theft, Spyware, Phishing, Online Shopping, Password Protection, and more. Visit OnGuard Online.

In addition, The Federal Trade Commission has information on their Indentity Theft Site where consumers can learn how to avoid identity theft - and learn what to do if their identity is stolen.


Be aware of a type of Internet piracy called "phishing." It is pronounced "fishing," since that's what thieves are doing: "fishing" for your personal financial information. They look for your account numbers, passwords, Social Security numbers, and other confidential information in an attempt to loot your checking account or run up bills on your credit cards. Click here to view some useful information and learn how to protect yourself from a phishing scam or what to do if you fall victim.


The term vishing is a combination of "voice" and phishing. Vishing exploits the public's trust in landline telephone services, are known to the telephone company, and are associated with a bill-payer. To be protected, consumers are advised to be highly suspicious when receiving messages (telephone, email, or otherwise) directing them to call and provide personal, confidential, and/or account related information. Always contact your financial institution or credit card company directly to verify the validity of the message using contact information they already have in their possession (i.e. do not use contact information provided in the suspicious message).