Recognize Red Flags and Respond to Scams with Confidence

Scam calls, texts, and emails (often referred to as "phishing"), are rapidly increasing and becoming more sophisticated. Scammers often impersonate trusted financial institutions to steal authentication codes and member credentials.  Staying vigilant is key to protecting your accounts, even for the most careful among us.

Below, we will give you a breakdown on how the most common scams work, red flags to look out for, a step-by-step response plan, and introduce you to Logix's Fraud Risk Meter, to ensure you can better understand and manage your personal scam risk and protect yourself.

Read more

Protect Yourself from Scams After Wildfires

 

The recent wildfires in our community have left many members dealing with significant financial hardship and in need of assistance to recover. Unfortunately, times of crisis also attract scammers who aim to exploit disaster survivors. At Logix, we want to ensure you have the resources to avoid scams and access legitimate assistance.

Here’s how you can protect yourself and your family from fraud while recovering from wildfire damage:

Read more

How Impersonation Scams Work

I Thought I Was Saving My Daughter, But I Was Being Scammed

Read more

How Scammers Use Social Engineering to Steal Money

As digital payment scams become more prevalent, they are also more sophisticated, making them harder to detect. Scammers employ what is known as “social engineering” to manipulate people into revealing sensitive information. It’s all about the psychology of persuasion. These scammers take advantage of human nature, aiming to lower your defenses so you’ll act on impulse rather than reason.

Read more

How Does Identity Theft Happen?

Identity theft occurs when someone steals your personal information and uses it fraudulently for their own financial gain. In a world where our digital footprints leave traces of our lives everywhere, understanding the mechanisms behind identity theft is paramount. By staying informed and adopting vigilant habits, we can navigate the digital landscape with confidence, ensuring that our identities remain securely our own. 

Read more

1 2 3 4 5