Free ATM Locator & Safety/Security Tips
At Firefighters and Company Federal Credit Union we know how important access to your money is to you. We have two surcharge free networks to choose from to give you unlimited access to your money 24 hours a day, 7 days a week and for FREE!
Just put in your address to find the closest FREE ATM!
MasterMoney® ATM/Debit Card Safety Tips
Using your MasterMoney® ATM/Debit Card is the simple, hassle-free way to get cash, make deposits, check account balances, transfer funds, make purchases and more. To enjoy the many conveniences electronic banking offers, you should make ATM/debit card security a priority. Here are some important safety tips.
Treat your card like cash. Always keep your card in a safe place.
Keep your "secret code" a secret. MasterMoney® ATM/Debit Card transactions and PIN debit purchases require the use of a secret code known as a personal identification number of PIN. Memorize your PIN, and never write it on your card or store it with your card. Never let someone else enter your PIN for you.
Do not disclose information about your card over the telephone. No one needs to know your PIN...not even the credit union. If you perform transactions over the telephone using your MasterMoney® ATM/Debit Card, never disclose your PIN.
Do not expose your card's magnetic stripe to magnetic objects. Magnetic objects can damage your card.
Report a lost or stolen card at once. Promptly call the credit union if your card is lost or stolen to reduce the chance that it will be used improperly. Prompt notice of lost or stolen cards will also limit your potential liability for unauthorized transactions.
Review your account statements. Review all account statements from the credit union promptly, and report any errors (including transactions you believe may be unauthorized) as soon as possible. Again, a prompt notice will limit your potential liability for unauthorized transactions.
MasterMoney® ATM/Debit Card Security
Always observe the ATM surroundings before conducting a transaction. If anyone or anything appears to be suspicious, leave the area at once. If you drive to an ATM, park as close as possible to the terminal. Observe the entire area from the safety of your car before getting out.
If an ATM is obstructed from view or poorly lit, go to another ATM. If possible, report the problem to the financial institution that operates the ATM.
It is a good idea to take another person with you when using an ATM, especially at night.
Minimize the time spent a the ATM when conducting a transaction. Have your card out and ready to use. Do not allow a stranger to assist you in making a transaction, even if you have trouble or your card gets stuck. When your transaction is complete, put your money and receipt away and immediately leave the area. Never count your money while at the ATM.
Block the view of others when using the ATM. Stand between the ATM and anyone waiting to use the terminal. Shield the keypad as necessary when entering your PIN and transaction amount.
If you see anyone or anything suspicious, cancel your transaction and leave the area at once.
If anyone follows you, go immediately to a crowded, well-lit area and call the police.
Look for possible fraudulent devices attached to the ATM. If the ATM appears to have any attachments or alterations to the card slot or keypad, do not use the ATM. If possible, report the potential problem to the financial institution that operates the ATM.
Drive up-ATM Security
- Keep your doors locked, windows up and engine running when in line at a drive-up ATM
- Always leave enough room between vehicles to allow for a quick exit should it become necessary.
- Before rolling down the window to use an ATM, observe the entire area.
- Minimize the time spent at the ATM.
- If anyone or anything appears suspicious, cancel the transaction and drive away at once.
- If anyone follows you after making an ATM transaction, drive immediately to a crowded, well-lit area and call the police.
Point-of-Sale (POS) Security
- Never allow the cashier or any other person to enter your PIN for you, even if they are assisting you with the transaction.
- Block the view of others when using a POS terminal.
- Be certain the transaction is complete and review your receipt before leaving.
- If you receive cash back from a transaction, put it away before leaving.
- When using an outdoor POS terminal such as at a gas station, always observe your surroundings before making a transaction.
- When using an outdoor terminal, if anyone or anything appears to be suspicious, leave the area at once.
- It is a good idea to take another person with you when using an outdoor POS terminal at night.
- If anyone follows you after making a POS transaction, drive immediately to a crowded, well-lit area and call the police.
Security Awareness Videos
Banking Safety Tips
Urgency scams can play with your instincts. Trustworthy companies won't pressure you for payment or your information.
Don't get hooked by phishing scams!
Don't stay in the dark about imposter scams!
For this attack, time is essential, don’t fall victim to fraudsters who are attacking bank accounts through ACH transactions.
Every year, cyber-criminals try to find ways to capitalize on the stresses of preparing for tax season. But through staying calm, and following these simple rules, we can all keep our money and information safe.
In the first video on foundational cyber-habits, we discussed using passphrases. The second video on this topic will dive into two more practices that will help keep you and your information secure.
Cybersecurity threats continue to evolve, and the frequency of these attacks grow every year. Although cyber-criminals may be getting more sophisticated in their approach, there are some never-changing habits that will always help in securing your data. This is the first part in a two-part video series on foundational cyber-habits.
Child Identity Theft is where a cyber-criminal uses a child’s personal information to obtain services, receive benefits, or commit fraud. These scams can go undetected for years, so to help protect your children’s information and identity, please follow these simple guidelines.
Whether through a phone call, email, or text message, the majority of us have seen some kind of Amazon order scam . These types of scams have been growing in popularity and complexity, resulting in thousands of people losing money every year. Don’t be a victim of a Scamazon Order, protect yourself with these simple guidelines.
Whether it’s through a fake advertisement on social media, or bogus sales through virtual marketplaces, cyber criminals attempt to take advantage of unsuspecting victims every year. During this holiday season, don’t fall for their malicious tricks. Protect yourself and your money with these simple guidelines.
Not all money laundering is done with malicious intent, but the repercussions can still be severe. Take a few minutes to learn how to avoid falling into being a money mule.
Between Card Skimming, Cash Trapping, PIN overlays, and many more sophisticated attacks, ATMs continue to be target locations for thieves trying to steal your money and card information. Take a couple of minutes to learn how you can protect yourself from these ATM scams.
With the increased popularity of QR Codes, cyber criminals have found a way to embed phishing attacks within those barcodes. Check out this video for information on Quishing attacks and how to avoid them.
Summer is a popular time for families to plan trips. It’s also a popular time for scammers to take advantage of families looking for a great deal. Check out this video for tips on how you can avoid falling for these summer vacation scams.
Password security is critical to securing your sensitive information. Watch this video to understand: (1) How to create a complex password that you can remember! (2) How to secure your password. (3) Implementing MFA. (4) Common password protection mistakes.
Your mobile device contains many of the same vulnerabilities as your home and work PC. Understanding these threats is critical to securing your sensitive information. Check out this video to understand those threats and how you can stay secured. Watch until the end for a couple bonus tips!
As cryptocurrency increases in popularity and demand, so does the demand for higher security. Watch this video to understand how you can practice safe security habits with your cryptocurrency and crypto wallet.
Every tax season, innocent citizens fall victim to tax scams. In this video, you will learn how to identify an IRS masquerading scam by understanding how the IRS does and does NOT communicate with tax payers.
Due to the generous nature of many, scammers are seeking the opportunity to capitalize on our willingness to give freely by masquerading as non-profit organizations. Check out this video to understand how you can combat and verify your donations are going to a legitimate 501c3.
When you walk through your home, how many smart devices do you have? Phones, TVs, tablets, security systems, doorbells, thermostats, refrigerators, gaming systems, even light bulbs! Each of these items require access to your home internet and WiFi, which opens a door for cyber criminals. Unfortunately, most devices offer little to no protection against cyber-attacks, so it is up to you to put in place extra protocols to protect your home network.
Children are connecting to the internet and web applications at an all-time high. The importance and urgency of putting protections and boundaries around a child’s internet activity is very important to protecting them. Check out this video to understand how you can protect your children and setup notifications to help you monitor their activities.
As mobile payment app transactions gain popularity, so do the malicious intentions of scammers. Check out this video to understand how you can protect yourself from some of the most common payment app scams.
Beginning July 15th 2021, the IRS will begin sending Child Tax Credit payments. Fraudsters are attempting to use this as an opportunity to steal your information. Check out this video to understand how to identify IRS communication versus the attacker.
As mobile banking continues to become mainstream, users should also familiarize themselves with some common security practices to increase the security of your personal information.
Juice jacking is an attack using a charging port, typically by USB. These attacks aim to install malware onto your device in an attempt to access and steal your sensitive information. Watch to find out how you can avoid these attacks!
Did you know your selfies may lead to a compromise? The oversharing of images is unknowingly handing over personal and company information to snooping hackers. Check out this video to learn more!