

If you notice suspicious account activity, contact us immediately
It's important to act quickly. Contact us at 410-548-7892 or 800-787-4542 to report the situation. Then, file an Identity Theft Affidavit right away, which makes it easier to dispute charges. Once you've completed this important form, send it to us, your credit card companies, mortgage holder, other organizations with which you have financial relationships and all credit bureaus.
Protect yourself
- Never provide personal financial information, including your Social Security number, account numbers or passwords, over the phone or online if you did not initiate the contact.
- Never click on the link provided in an email you believe is fraudulent. It may contain a virus that can contaminate your computer.
- Do not be intimidated by an email or caller who suggests dire consequences if you do not immediately provide or verify financial information.
- If you believe the contact is legitimate, go to the company's website by typing in the site address directly or using a page you have previously bookmarked, instead of a link provided in the email.
- If you fall victim to an attack, act immediately to protect yourself. Alert your financial institution. Place fraud alerts on your credit files. Monitor your credit files and account statements closely.
- Report suspicious emails or calls to the Federal Trade Commission at ftc.gov, or by calling 1-877-IDTHEFT.
Elder financial abuse
This financial crime occurs when any person takes the personal property of an elderly individual by any means, including undue influence, for a wrongful purpose or with intent to defraud.
Fraudulent debit card telephone calls
Recently, a phishing scam targeted people with debit cards from The Bank of Delmarva. An automated telephone message stated that their debit card had been temporarily disabled, deactivated, or expired. THIS MESSAGE WAS FRAUDULENT! We will never solicit debit card information through an automated telephone message. Please consider any attempt to request personal or financial information from you by telephone, text message, email, or websites to be fraudulent unless initiated by you.
Phone solicitation scams
The bank has been made aware that some customers are receiving phone solicitations, with the caller I.D. identifying the caller as The Bank of Delmarva. These calls are NOT originating from The Bank of Delmarva, nor anyone associated with the bank.
These phone calls are apparently being made to phone numbers at random. The callers have spoofed one or more of the bank's phone numbers in an attempt to gain your confidence.
Please do not hesitate to contact customer service to confirm if any communication from the bank is genuine.
Check fraud information, and tips for preventing it
Despite the increasing popularity of mobile banking, check fraud remains a significant problem for bank consumers. Even now, it's very important to be educated about the different types of check fraud and the tips for protecting yourself.
Types of check fraud scams
Forgery: For a business, forgery typically takes place when an employee issues a check without proper authorization. Criminals will also steal a check, endorse it and present for payment at a retail location or at the bank teller window, probably using bogus personal identification.
Counterfeiting: Counterfeiting can either mean wholly fabricating a check - using readily available desktop publishing equipment consisting of a personal computer, scanner, sophisticated software and high-grade laser printer - or simply duplicating a check with advanced color photocopiers.
Alteration: Alteration primarily refers to using chemicals and solvents such as acetone, brake fluid and bleach to remove or modify handwriting and information on the check. When performed on specific locations on the check such as the payee's name or amount, it is called-spot alteration; When an attempt to erase information from the entire check is made, it is called-check washing.
Counterfeiting: Counterfeiting can either mean wholly fabricating a check - using readily available desktop publishing equipment consisting of a personal computer, scanner, sophisticated software and high-grade laser printer - or simply duplicating a check with advanced color photocopiers.
Alteration: Alteration primarily refers to using chemicals and solvents such as acetone, brake fluid and bleach to remove or modify handwriting and information on the check. When performed on specific locations on the check such as the payee's name or amount, it is called-spot alteration; When an attempt to erase information from the entire check is made, it is called-check washing.
Multi-factor authentication
No matter how long and strong your password is, a breach is always possible. And if just one of your accounts is hacked, your personal information and other accounts can become accessible to cyber criminals.
Multi-factor authentication (MFA) ensures that only you can access your account. Use it for email, banking, social media, and any other service that requires logging in. If MFA is an option, enable it by using a trusted mobile device, such as your smartphone, an authenticator app, or a secure token—a small physical device that can hook onto your key ring. This way, even if cyber criminals guess your password, they still can't access your accounts.
Wi-Fi safety
If devices on your Wi-Fi network are compromised, or if hackers break through an encrypted firewall, someone could be eavesdropping on you, even in your own home on encrypted Wi-Fi.
Always check for the “green lock” or padlock icon in your browser bar that signifies a secure connection. Avoid free online access with no encryption when you're away from home. If you do use an unsecured public access point, avoid sensitive activities (e.g., banking) that require passwords or credit cards. Your personal hotspot is often a safer alternative to free Wi-Fi.
App security
Have you noticed that apps you recently downloaded are asking for permission to access your device’s microphone, camera, contacts, photos, or other features? Or that an app you rarely use is draining your battery life?
Your mobile device could be filled with suspicious apps running in the background or using default permissions you never realized you approved, gathering your personal information without your knowledge while also putting your identity and privacy at risk. Don’t give your apps an all-access pass. The following are some steps to avoid “over-privileged” apps:
- Check your app permissions and use the “rule of least privilege” to delete what you don’t need or no longer use.
- Learn to just say “no” to privilege requests that don’t make sense.
- Only download apps from trusted sources.
Oversharing and geotagging
So many people post sensitive information on social media, from their personal addresses to where they like to grab coffee. But what many people don’t realize is that these seemingly random details help criminals target you, your loved ones, and even your physical belongings—online and in the real world. Avoid posting names, phone numbers, addresses, school and work locations, and other sensitive information (whether it’s in the text or in the photo you took). Disable geotagging, which allows anyone to see where you are—and where you aren’t—at any given time.
Password
Gone are the days when you needed to come up with a frustrating mixture of letters, numbers, and symbols. According to NIST guidance, you should consider using the longest password or passphrase permissible. NCCIC guidance suggests 16-64 characters. Some sites even allow for spaces.
It’s important to mix things up. Get creative with easy-to-remember ways to customize your standard password for different sites. Creating different passwords for various accounts can help prevent cyber criminals from gaining access to these accounts and protect you in the event of a breach. Always keep your passwords private. Every time you share or reuse a password, it chips away at your security by opening up more avenues in which it could be misused or stolen.
Device Protection
Our devices are great at making our lives easier and fun, but it’s important to be conscious about all the information you are generating and where it’s headed. Once your device plugs into cyberspace, you and your device could potentially be vulnerable to all sorts of risks.
These include malware that can steal information and data, destroy your hardware, log keystrokes, and infect other devices connected to your compromised device. Whether it’s your computer, smartphone, game device, or other network devices, the best defense is to stay on top of things by updating to the latest security software, web browser, and operating systems. If you have the option to enable automatic updates to defend against the latest risks, turn it on. If you’re putting something into your device, such as a USB for an external hard drive, make sure your device’s security software scans for viruses and malware. Finally, protect your devices with antivirus software. There are many kinds of antivirus software available, so find one that fits your needs and your devices.
Baiting
Baiting is a type of social engineering attack that lures victims into providing sensitive information or credentials by promising something of value for free. For example, the victim receives an email that promises a free gift card if they click a link to take a survey. The link might redirect them to a spoofed Office 365 login page that captures their email address and password and sends them to a malicious actor.
Check Fraud Tips for Consumers
Fraud professionals have become increasingly skilled and sophisticated, thanks to advances in readily available technology such as personal computers, scanners and color photocopiers. Criminals today can defraud you and your financial institution quite easily with a blank check taken from your check book, a canceled check found in your garbage, or a check you mailed to pay a bill. Therefore, it is important to follow a common-sense, logical approach with the way you use and store your checks.
- Store your checks, deposit slips, bank statements and canceled checks in a secure and locked location. Never leave your checkbook in your vehicle or in the open.
- Reconcile your bank statement within 30 days of receipt in order to detect any irregularities. Otherwise, you may become liable for any losses due to check fraud.
- Never give your account number to people you do not know, especially over the telephone. Be particularly aware of unsolicited phone sales. Fraud artists can use your account without your authorization and you may end up being responsible.
- Unless needed for tax purpose, destroy old canceled checks, account statements, deposit tickets, ATM receipts (they also frequently have your account number and worse yet, your account balance). The personal information on it may help someone impersonate you and take money from your account.
- When you receive your check order, make sure all of the checks are there, and that none are missing. Report missing checks to your bank at once. Should you fail to receive your order by mail, alert your bank. Checks could have been stolen from mail box or lost in transient.
- If your home is burglarized, check your supply of checks to determine if any have been stolen. Look closely, because thieves will sometimes take only one or two checks from the middle or back of the book. The longer it takes to detect any of your checks have been taken, the more time the criminal has to use them successfully.
- Do not mail bills from your mailbox at night. It is a favorite location from which a criminal can gain possession of your check with the intent to defraud you. Criminals will remove a check from your mailbox and either endorse it using bogus identification, photocopy and cash it repeatedly, scan and alter the check, or chemically alter it. The Post Office is the best location from which to send your bill payment.
- Limit the amount of personal information on your check. For example, do not include your Social Security, driver's license or telephone numbers on your check. A criminal can use this information to literally steal your identity by applying for a credit card or loan in your name, or even open a new checking account.
- Don't leave blank spaces on the payee and amount lines.
- The type of pen you use makes a difference. Most ballpoint and marker inks are dye based, meaning that the pigments are dissolved in the ink. But, based on ink security studies, gel pens, like the Uniball 207 uses gel ink that contains tiny particles of color that are trapped into the paper, making check washing a lot more difficult.
- Don't write your credit card number on the check.
- Use your own pre-printed deposit slips, and make sure the account number on your slip is correct. Thieves occasionally alter deposit slips in the hope you won't notice and the money goes into their account.
- Don't make a check payable to cash. If lost or stolen, the check can be cashed by anyone.
- Never endorse a check until you are ready to cash or deposit it. The information can be altered if it is lost or stolen.
Mail Theft
If you have had your mail stolen from your mailbox then you have become a victim of mail fraud, a federal crime. It is important to report this crime immediately and to take steps to protect your assets and credit rating.
Here's a checklist of actions you should take:
- Notify your local postal authority. Ask to fill out Form 2016, available at your local post office, or by mail.
- Call your local police agency. Report the theft to police or the sheriff's department, particularly if you suspect that checks or other valuables were stolen. Local law-enforcement authorities have caught some thieves by circulating lists of stolen checks to local banks, then nabbing suspects who showed up to clear out a victim's bank account.
- Close accounts: If you suspect the thief obtained a credit card, checks or bank statement, cancel your accounts immediately and notify creditors both by telephone and in writing.
- Take action on missing checks: If a check payable to you is stolen, ask the sender to stop payment and issue a new one. Give police the stolen check number.
Protect your credit: Make a list of creditors and see if any bills are overdue to arrive. - Call creditors and obtain duplicate copies to avoid late payments, which could damage your credit rating-or worse. Be sure to pay your mortgage payment and car payment to avoid the risk of foreclosure or repossession. Don't forget other bills that could be missing, such as an annual insurance premium, property-tax levy or income tax refund.
- Determine what else is missing: Contact professional organizations to learn if you've missed meeting notices or dues statements. Ask friends and relatives if they've mailed anything to you recently. Were you expecting a new driver's license? If so, contact your state Division of Motor Vehicle (DMV) promptly.
- Talk to neighbors: Find out if their mail was stolen. Ask if anyone saw a strange person around your home or an apartment mailbox, then pass any information along to postal and law enforcement authorities.
Protect Outgoing Mail
How can you make sure those cards, letters and packages you send will get to the recipients?
- Don't leave outgoing mail in your mailbox. That little red flag is an invitation to thieves. Take outgoing mail to your office, or mail it at a post office or mailing outlet store.
- Don't mail holiday gifts from home: They'll not only steal your package, they'll peel off the stamps and use those, too.
- Don't put mail in street mailboxes: The highest rate of mail theft locally is from those big, blue Postal Service mailboxes located on street corners and at other public places.
- Send valuables via registered mail: Registered mail is kept under lock and key, and it is signed for every time it changes processing centers.
Always beware of unsolicited offers and prizes sent through e-mail or text messages.
Learn More
These PDFs provide additional helpful information on various topics.
- What is Phishing?
- Other Definitions, Phishing, Pharming, Vishing and Smishing
- Protecting Your Computer
- Do's and Don'ts
- Tips to Prevent Computer Fraud
- Reporting Fraud
- Mobile Banking Security Tips
- ATM and Debit Card Safety Tips
- Bank Secrecy Act
- Fake Check Scams
- Free Credit Freezes & Fraud Alerts
- Tools to Protect Identity Theft
- Internet Devices & Safe Online Banking
- Cyber Security: Smart Cards & Chip Technology