Global Payments is aware that individuals attempting to perpetuate fraud via emails and phone calls may be using the Global Payments name to deceive merchants and consumers. Stay alert and watch for phishing email scams and fraudulent phone calls. Criminals may pose as someone investigating a fraud situation and ask you to confirm account or personal credentials.
Phishing uses email and fraudulent websites designed to steal your personal information including account details, passwords, credit card numbers, names, social security numbers and other data. Perpetrators of phishing scams send millions of fraudulent email messages with links or attachments that appear to come from websites you trust. The phishing emails often request that you “confirm” or provide information for the criminals to open new accounts in your name, obtain official documents using your identity or even embezzle funds from your accounts.
Please review the following Frequently Asked Questions to assist in protecting your information.
What should I do if I receive an email phishing scam?
If you think you've received a phishing scam, immediately delete the email message and do not click any links in the message or open any attachments.
What should I do if I receive a possible phishing scam that says it’s from Global Payments?
Global Payments never sends emails requesting customer or cardholder passwords or log in credentials. Protect your information and never click on unsolicited Web links provided in an email or other correspondence. Attach the suspicious email message to a new email message and send it to Global Payments at firstname.lastname@example.org. We will need the original phishing email (not just a forwarded copy) to be able to analyze the message. Delete the email message and do not click any links in the message or open any attachments.
What should I do if I've responded to a phishing scam?
To minimize any damage after responding to a phishing scam with personal or financial information, immediately change the passwords or PINs for all the online accounts that could be compromised. If you provided credit card numbers, contact your card issuing bank or institution immediately.
If you believe your information may be compromised you can also place a Fraud Alert on your credit report. To do this, you’ll need to contact one of any of the three credit bureaus listed below. The company you call is required to contact the other two, which will place an alert on their versions of your report.
How do scammers get my email address or know which bank I use?
Perpetrators send out millions of phishing messages to randomly generated email addresses. They replicate fake websites of popular companies in order to target the largest number of people.
Can an email message that contains a company's official logo be a phishing scam?
Yes. Phishing scams often use the official logos of the companies they're trying replicate. Do not use website links in suspicious emails - type the web addresses directly into your browser or use your personal bookmarks.
Can I tell if an email message is a phishing scam just by reading it?
Not necessarily. Phishing email messages often include official-looking logos from real organizations and other identifying information taken directly from legitimate websites. They might also contain threatening phrases such as “Your account may be compromised, click here to protect your information.” “Your account will be suspended if…” or requests for action like “Log in now using this link to update or reset your password.”
How do I avoid phishing scams?
The number of sophisticated phishing scams sent to consumers is continuing to increase dramatically. While online banking and ecommerce are very safe, as a general rule you should be careful about giving out your personal financial information over the Internet.
The Anti-Phishing Working Group (APWG, www.antiphising.org) has compiled a list of recommendations to avoid becoming a victim of these scams.
How can I identify a fraudulent email?
Where do I report Phishing scams?
Report phishing emails to the following groups and include the entire original email with its original header information intact:
As of January 9, 2013