How Did My Card Number Get Stolen?
It is estimated that there are over 450 million check and debit cards tied to checking accounts in the United States alone, and unfortunately, the rate of fraud surrounding check cards is growing exponentially each year. To this end, Shamrock Bank is taking steps to help you protect your accounts and your identity.
Please notify us immediately if your Shamrock Bank ATM or Check card is lost or stolen, or you suspect any unauthorized use. The Shamrock Bank To Go! App is the best way of keeping your financial loss to a minimum.
You may also notify us toll free at
866.927.2311 During regular business hours
You can also deactivate your Shamrock Bank Debit card online through NetTeller.
To Deactivate Your Card by Shamrock Bank To Go! App
Login to the Shamrock Bank To Go! App
Choose Manage Your Cards from the Menu
Select the Card in Question
Choose-- Suspend (card is turned off, but you can activate it later)
Choose-- Report Lost or Stolen (card is immediately turned off and cannot be re-activated)
To Deactivate Your Card Online
Log in to Shamrock Bank Online Banking
Select the gray "Options" tab
Select ATM/Debit Card from the green Menu Bar
Checkmark the Lost/Stolen box that corresponds to the Check Card that has been compromised.
Tips to protect yourself against Check Card fraud
- Report missing cards immediately!
- Never share your PIN with others. Do NOT write your PIN on the back of your debit card or keep it with your debit card/wallet. Never give your PIN to a cashier. If you can't safely enter your PIN, run the debit card transaction as a "credit".
- Keep your card number concealed when standing in line at check-out. Be aware of your surroundings at the ATM/retail merchants. Guard your PIN & debit card numbers at all times.
- When traveling, always contact Shamrock Bank first so that we can make certain your card will work while you are out-of-state or out of the country.
- Be aware of ATM skimmers, gas pump skimmers and other related fraud devices.
Safe ATM Tips
- Always pay close attention to your surroundings. Don't select an ATM at the corner of a building -- corners create a blind spot. Use an ATM located near the center of a building. Do your automated banking in a public, well-lit location that is free of shrubbery and decorative partitions or dividers.
- Be wary of people trying to help you at the ATM. Hit the “cancel” button and leave if a person makes you feel threatened. Be aware of anyone sitting in a parked car nearby. When leaving the ATM make sure you are not being followed. If you are, go immediately to a police/fire station, or to a crowded, well-lit location or business.
- Don’t use an ATM that appears unusual, tampered with or offers options which you are not familiar or comfortable with.
- Don’t allow people to look over your shoulder as you enter your PIN, even if the people are known to you. Memorize your PIN; never write it on the back of your card.
- Don’t wear expensive jewelry or clothing that might draw attention. Don’t carry personal valuables to the ATM. Don’t hold out your wallet while waiting for cash. These are all added incentives to a thief.
- If you are on foot, turn your back towards the machine while waiting for cash and take a quick look around before removing it.
- Never count cash at the machine or in public. Wait until you are in your car or another secure place.
- When using a drive-up ATM, keep your engine running, your doors locked and leave enough room to maneuver between your car and the one ahead of you in the drive-up line.
- Closely monitor your statements, as well as your balances, and immediately report any problems to us.
- If you are involved in a confrontation with an assailant who demands your money, COMPLY.
- Identify theft involves the use of a person's social security number, date of birth and identifiable information to obtain credit or others services under the assumed identity. Although not related to Check Card Fraud, you should be aware of what to do in case you are the victim of Identity Theft.
- Identity thieves are creating new ways of obtaining personal information every day – be on your guard in every aspect of your life. If you have questions about any transaction please call us. The number one way to avoid identity theft? Hit delete.
- Billions of e-mails are hitting computers each day. Many look legitimate or even threatening – don’t engage, don’t reply – forward to the anti-spam/anti-phishing site provided by your Internet provider.
Thieves can steal your card number in a number of ways.
- Skimming—Thieves attach a device over the card reader at an ATM machine or pay-at-the-pump terminal and wait for unsuspecting cardholders to use them. The device itself may be difficult to detect. Thieves may also utilize a skimming device by keeping it hidden on their person and then swiping your card through it. Card Skimming has become too common and can happen almost anywhere like; restaurants, retail stores, gas stations or ATMs.
- Merchant/Acquirer Data Theft—Each time you visit a merchant and pay with your check card, your card number is stored with the merchant/acquirer for a short time before the information is deleted. This is a normal practice accepted by all credit card companies. Merchants and acquirers are almost entirely in compliance with the requirement to delete their stored data. In rare cases, the data is not deleted and becomes vulnerable to compromise. Internet savvy thieves have learned how to obtain this data, which can contain millions of card numbers.
- Key Logging spyware—Scammers use a wide range of tricks to get their spyware and key-loggers loaded on to your computer. This usually involves tricking you into clicking on a link in a spam email they have sent, or visiting a website that they have set up solely to infect people’s computers. Other sources of spyware and key-loggers are free games or music that you can download from the internet. When they are delivered in this way, they are sometimes called ‘Trojans’—a file that claims to be for some harmless purpose so it can get under your guard, but in fact contains a nasty surprise. Look for these warning signs:
- You visit a website or click on a link contained in a spam email.
- A pop-up box appears on your screen which may have a simple question or a button that says ‘close’. Just by clicking on this, you may be allowing the spyware to be downloaded
- You notice new icons on your computer screen, or your computer is not as fast as it normally is.
- Music files, games, or access to adult sites is offered free of charge as long as you download a particular program or agree to a pop-up box.