BBVA Security Center
The first step in stopping fraud is to contact us
If you were the victim of fraud or experience suspicious activity, report it to us. Taking quick action can help minimize the impact to your credit, identity, and accounts.
Types of bank fraud
Protect yourself by learning about each type of bank fraud. Find out how you can detect and avoid them and get tips on how to quickly identify them. You'll find information about:
How we help protect you
As we transition to PNC, BBVA USA is no longer enrolling new customers to the BBVA ClearBenefits Program. Customers enrolled in the program prior to June 19, 2021 will continue to receive their benefits, subject to the monthly $4.00 fee.
Get to know how to set up alert notifications and how we protect the privacy of your online information. That includes:
- Online and Mobile Banking alerts
- Online Security
- BBVA ClearBenefits Program
From social engineering to unemployment scams, fraudsters use a range of methods to steal your information and money. Our tip sheets help you identify the most common scams.
5 Tips to protect your financial accounts
Weak passwords can leave your accounts exposed and have played a role in numerous data breaches.
Make sure your bank account and others with links to your financial data use two-factor authentication.
Think before you click any message asking you to follow a link to a website that requires sensitive information.
If your phone falls into the wrong hands your accounts may be quickly compromised. Use a Pin that scammers won't easily guess.
If you've fallen victim to scammers, it's important to act quickly. Financial institutions may be able to limit the damage and help you recover funds.
What to do if your data is breached
In most cases, when large companies have been victims of data breaches they send affected customers a letter. Read this information to learn what types of personal data may have been stolen.
Contact your bank (or your credit card’s issuing bank) to alert them of the possible theft and find out what steps they can take to help you.
Immediately change your password on any accounts that may have been compromised. Use a stronger, unique password on each site, and use a password manager to keep track of them.
Multi-factor implementation means a user has to present two or more authentication factors to access an account. Requiring two layers of authentication lowers the likelihood a fraudster could access your account.
You can sign up for a monitoring service for a monthly fee, and it will alert you to any new activity or fraud on your credit reports as soon as it happens.
Unemployment identity theft: What is it and what to do if you are a victim
Unemployment identity theft is the fraudulent application for unemployment benefits using another person’s personal information.
If when filing for unemployment benefits you are informed that an application has already been filed.
You receive tax reporting Form 1099-G showing you received benefits you did not apply for.
Report the fraud to your state unemployment agency and employer.
Go to IdentityTheft.gov and report the fraud to the Federal Trade Commission.
Don’t respond to any calls or texts about returning mistaken unemployment benefits.
Never provide personal or financial information to anyone who contacts you by phone, email, mail or text unless you are absolutely certain they are legitimate. In addition, check your credit report often.
Social engineering: What is it and how can you protect yourself
When used in reference to cybercrime, social engineering is the act of deceiving or manipulating someone into providing personal information.
- Phishing: Deceptive emails, websites, chat or text messages designed to trick people into giving out personal information or infect their computer with malware.
- Spear phishing: While regular phishing emails are typically sent to a mass audience, spear phishing targets an individual or specific group.
- Vishing and smishing: These are phishing attacks via voice call (vishing) and SMS texts (smishing).
- Scareware: Communications that misled the victim into believing their computer is infected, then offer to remove the bad software for a fee.
- Baiting: Emails, texts, chats and web ads that offer a prize or reward for clicking a link or download an attachment. Baiting can be used to get the victim to provide information or infect their computer with malware.
- Quid Pro Quo: Like baiting, these communications request information in exchange for a service or benefit.
- Pretexting: With pretexting, the hacker posed as an authority figure, such as a police officer or investigator. If the victim responds, the hacker will then make some kind of request for information.
Aggressively protect your personal information. Always be overly cautious when it comes to sharing your personal or financial information.
Be suspicious of all electronic communications requesting information or asking you to perform a task.
Keep your software updated. Many software updates include security upgrades, so it’s wise to install the updates when they are available.
Report fraud and identity theft
If you think you have been a victim of fraud, you need to take action. Here you will learn our recommendations for steps to follow if you have been or might have been a victim of fraud.