Keep your money secure

Staying safe from fraud and scams

A run-through of what to look out for — and how to act
fast if you spot something unusual.

Quick access

Need help? here’s what to do

  • Authorized Push Payment (APP) Fraud
    APP fraud occurs when fraudsters manipulate you into transferring money to them by pretending to be someone you trust. They often claim to be from your bank, a utility company, or even a family member in need. Fraudsters create a sense of urgency to pressure you into acting quickly.

    How to Recognize APP Fraud

    1. Unexpected Payment Requests: You’re asked to transfer money immediately, often under the guise of preventing fraud or resolving an issue.
    2. Urgent Tone: The fraudster will make it seem like something terrible will happen if you don’t act immediately, making you feel like you don’t have time to think.
    3. Trust-based Manipulation: They will impersonate someone in authority (a bank employee) or someone close to you (family) to gain your trust quickly.

    What to Do

    1. Stay Calm: Take a moment to breathe and think. Fraudsters rely on panic.
    2. Verify Independently: Contact the person or organization directly using a phone number you know is legitimate—not one provided in the message.
    3. Don’t Rush: Legitimate organizations will never pressure you into making a decision on the spot.
  • How HenriPay Protects You
    HenriPay uses real-time fraud detection and monitoring systems to safeguard your transactions. Our platform alerts you to suspicious activity and takes immediate action to block fraudulent transactions when detected. However, staying informed and vigilant is the best way to protect yourself. If you suspect fraudulent activity, contact our fraud prevention team immediately.
  • Phishing
    Phishing is one of the most common forms of fraud. Fraudsters send emails that look like they’re from legitimate companies (e.g., your bank, online stores, or service providers) to trick you into giving them sensitive information like passwords or account numbers.

    How to Recognize Phishing

    1. Impersonal Greetings: Fraudsters often use generic greetings like “Dear Customer” instead of addressing you by name.
    2. Suspicious Links: Hover over any links in the email to see the actual URL. If it doesn’t match the official website, don’t click it.
    3. Grammar and Spelling Errors: Many phishing emails contain poor grammar or spelling mistakes, which is a red flag.
    4. Unsolicited Attachments: Be very cautious with email attachments. Legitimate companies rarely send attachments without prior notification.

    What to Do

    1. Don’t Click on Links: If you’re unsure about an email, do not click on any links or download attachments.
    2. Verify with the Sender: If the email claims to be from your bank, contact them through their official website or phone number to verify.
    3. Use Official Channels: Always log in to your account by typing the URL directly into your browser, rather than clicking on links in unsolicited emails.
  • Smishing (SMS Phishing)
    Smishing involves receiving fraudulent text messages that try to trick you into providing personal information or clicking a malicious link.

    How to Recognize Smishing

    1. Unfamiliar Senders: You receive a message from a number or organization you don’t recognize.
    2. Urgent Claims: The message might claim there’s a problem with your account or a package delivery to create urgency.
    3. Links to Fake Websites: Fraudsters will include a link to a website that looks legitimate but is designed to steal your information.

    What to Do

    1. Avoid Clicking Links: Don’t click on any links in the message. Even if it appears to be from a known organization, it’s better to verify through official channels.
    2. Contact the Company: If the message claims to be from a bank or service provider, contact them directly using their official website or customer support line to confirm the message.
    3. Report the Number: Most phones have a feature that allows you to block and report fraudulent numbers.
  • Social Engineering
    Social engineering is a broader category of fraud where criminals manipulate human emotions to gain confidential information. They may pose as someone trustworthy, such as a friend, colleague, or official, and play on emotions like fear, sympathy, or trust.

    How to Recognize Social Engineering

    1. Unusual Requests: You’re asked to provide information or perform actions that seem out of the ordinary.
    2. Emotional Manipulation: The fraudster might use stories that play on your emotions, such as claiming they’re in a tough situation and need help.
    3. Posing as Authority Figures: They might impersonate your employer, a government official, or law enforcement to intimidate you into complying.

    What to Do

    1. Stay Skeptical: If someone you don’t know or weren’t expecting contacts you with an unusual request, question the validity of the request.
    2. Verify Their Identity: Contact the person or organization through trusted methods before giving any information.
    3. Keep Personal Information Private: Avoid sharing personal details in public spaces (including social media) that could be used to build trust or impersonate you.
  • Vishing (Voice Phishing)
    Vishing is where fraudsters call you pretending to be from a legitimate organization, like your bank, to trick you into giving up personal information. They may claim there’s been fraudulent activity on your account and they need your details to "fix" it.

    How to Recognize Vishing

    1. Unsolicited Calls: You receive a call from someone claiming to be from a reputable organization, but you didn’t initiate the contact.
    2. Pressure Tactics: The caller might insist that immediate action is necessary and pressure you to provide sensitive information over the phone.
    3. Caller ID Spoofing: Fraudsters can manipulate caller IDs to make it appear as though the call is coming from a legitimate source, like your bank.

    What to Do

    1. Hang Up and Verify: Never give out personal information over the phone if you did not initiate the call. Hang up and contact the company using a verified phone number.
    2. Question the Caller: Ask detailed questions about the caller’s identity and the reason for the call. Fraudsters often struggle when you ask for specifics.
    3. Don’t Be Intimidated: Legitimate organizations will never threaten or rush you into providing information.