Protection Center

Protect your accounts, loans, home, property, and loved ones with our loan protection and insurance options! 

Debit/ATM Card Fraud Protection

EnFact

In order to ensure your Debit/ATM card is protected we use the leading fraud prevention service called EnFact. No matter how careful you are with your financial records, criminals may still find ways to access your card information. By monitoring your normal spending patterns, our fraud protection service evaluates your transactions for suspicious activity. This service helps protect you from fraudulent activity. There are multiple reasons a transaction can be flagged as potentially fraudulent. This may include sudden changes in purchase locations, an increase frequency in high dollar transactions or your card is used unexpectedly overseas or in a foreign country. 

Once EnFact identifies the transaction as suspicious, the EnFact automated system will contact you to verify the transaction in question. Your response to this call is critical to prevent potential risk and avoid restrictions we may place on your card. If you confirm that the transaction is not legitimate, the card is immediately blocked to prevent fraud from recurring. 

You should expect the following when being called: 

  • Our automated call center will ask you to verify recent transaction activity on your card.
  • You’ll be asked to verify your identity and provide your 5 digit zip code.
  • You’ll be able to respond via your touchtone keypad.
  • You’ll also be provided a toll free number to call in case you have any additional questions.
  • EnFact does not ask members to validate their identity by asking for social security numbers or a date of birth.


What you can do to protect yourself… 

  • Make certain your contact information is up-to-date in case EnFact needs to contact you.
  • If you’ll be traveling, please provide us with the dates of travel, countries you will be traveling to and a good phone number where you can be reached while traveling.
  • Update your mobile phone contacts to include the EnFact Call Center in case you need to follow up with them while you are traveling. The phone numbers are: 

               o EnFact (Domestic) 1.877.253.8964
               o EnFact (International) 1.973.682.2652

  • Safeguard your ATM/Debit card and PIN
  • Monitor your statements regularly for suspicious activity
  • Your lost or stolen card should be reported immediately by calling 1.800.472.3272
  • Carry a backup form of payment

Show Fraud Who's Boss with CardValet!

Save time and maintain security safeguards to protect against fraud by controlling the cards in your wallet with the phone in your pocket.

Learn more about CardValet

Loan Protection

Every time you take out a loan, it impacts your financial picture. Loan Protection products can ensure your loan doesn't turn into a financial burden. 

Payment Protection

Credit Life Insurance is designed to reduce or pay the insured balance of your loan if you die during the term of your loan.

Credit Disability Insurance is designed to pay your loan payments (up to the contract limit) if you become ill or disabled and are unable to work at any time during the term of you loan. 

Payment protection may make sense for you. It could be an effective way to supplement any other life or disability insurance you carry (check with your employer to determine if you have any current short-term or long-term disability benefits).

Payment Protection Benefits

Protect your family's financial security. 
Protects your credit rating. Ensures your loan will not end up in default in the event of your disability or death. 

Simplified eligibility. You can usually obtain Payment Protection up to the age of 65 and even up to the age of 70 in some states. Also, a medical exam is usually not required, although, general health questions may be asked. Your insurance becomes effective as soon as your loan is finalized. 

Convenient. Applying for Payment Protection is easy and usually done at the same time of the loan application. Your premium is included with your monthly payment. If you do not sign up for Payment Protection at the time of your application, you can do so at any other time after your loan closing. However, once the loan has been in place for 30 days, you'll have to provide evidence of good health in order to receive coverage.

*Note: This advertises the following Group Credit Insurance Policy Forms: Minnesota Mutual XXX-4000 series, and Minnesota Life MHC-XX-4000 series and XX-60000 series as well as any applicable state variations. 

Guaranteed Asset Protection (GAP)

Your credit union can also help close the gap with protection that picks up where auto insurance leaves off. Guaranteed Asset Protection (GAP) is a voluntary non-insurance program that helps pay the difference between a vehicle’s actual cash value and your loan balance according to your policy, subject to limitations and exclusions. It protects you in the event your vehicle is declared a total loss by your insurance company or stolen and not recovered. Coverage can be conveniently included in your loan payment. With GAP Advantage, members receive $1,000 towards their new GSCU auto loan if financed within 90 days from the date of total loss of the covered vehicle.

Call 24-Hours a day!
Have questions? Call 24/7 to speak to a lending representative anytime with Lending After Hours at 1-800-645-4728.

Mechanical Breakdown Protection

Mechanical Breakdown Protection (MBP) provides protection against mechanical breakdowns beyond your existing manufacturer's warranty. Get the most comprehensive coverage for your car, truck, SUV, motorcycle, or ATV, at a discounted rate from your credit union.

Although you should consider refinancing your existing auto loan with GSCU, you do not need to have a consumer loan with us to qualify for this extended warranty offer.

  • NO Deductible
  • 24/7 Roadside Service (365 days a year!)
  • Rental Car Benefits
  • 30-Day Money Back Guarantees
  • Nationwide Coverage
  • Fully Transferable!

Get an Instant Quote

Secure Email

To ensure the confidentiality of private information sent via email and comply with privacy laws, Granite State Credit Union has implemented an email encryption service. 

GSCU offers a two-way email encryption solution that eliminates the need for specialized software or certificates. All you need is an Internet connection, a web browser that supports 128-bit SSL encryption, and a Granite State Credit Union Secure Email account.

If you have not received an expected email from us, please check your spam folder first. Steps to add trusted email addresses to your "whitelist" so that they can pass easily through your spam filter vary across different email and Internet security platforms. It may be as simple as adding gscu.org to your Contacts list or clicking sender name "Mark as Not Spam."

Instructions

How To Open Your Email
When the credit union sends you a secure email message, you will receive a notification email with instructions on how to open the message. The notification message arrives in your email Inbox. You should select Open Message in the notification to go to the Secure Message Center and view your email.

You must go through a simple one-time registration process.

How To Set Up Your Email Account
Enter your email address and a password to register and begin sending and receiving secure messages.

After you register and sign in to the Secure Message Center, your message will open and you can view the message details and Reply.

Login Secure Message Center
To help protect your privacy, if you should need to send personal account information, such as your member number or Social Security Number, to the credit union we recommend using our Secure Message Center.

Frequently Asked Questions

  • How do I reset my password?

    After 3 failed logon attempts to Granite State Credit Union’s Secure Message Center, your account for the secure messaging portal will be locked. 

    You will receive an email at the address you registered notifying you that your account is locked. Click on the Granite State Credit Union link to return to the login page.

    At the bottom of the login page click on "Forgot your password?"

    To Reset your password, enter your email address and your new password then click on Reset.

    You will receive an email at the address you registered notifying you to confirm your account change.

  • Can I send an encrypted email back to GSCU?

    Yes. After you view your email, you can select Reply or Reply All to send an encrypted email back to the credit union. You can also use the Compose page to initiate a secure email to the credit union.

  • How long do I have to read the message?

    Messages sent to you by the credit union will expire 14 days from the date sent.

  • What mobile devices can be used?

    Most major mobile devices can be used to access secure messaging, including Apple iPhone® and iPad®, BlackBerry®, devices and Android® devices.

  • What Internet browsers are recommended?

    Most Internet browsers will work with secure messaging, including Microsoft Internet Explorer®, Mozilla Firefox®, and Apple SafariTM.

  • Why Secure Messaging?

    For many members, email has become the preferred method of communication. However, email is not a private conversation. Unencrypted email can be intercepted and ready by people for whom the email was not intended. Secure Messaging is an email encryption solution that uses the best method of delivery.

Fraud Tips

Safeguarding our member’s accounts and financial information remains GSCU’s top priority. While GSCU utilizes sophisticated security technology, we recommend members take steps to protect themselves.

Cyber Security Tips

  1. Realize that anyone is an attractive target to hackers. Don’t assume it won’t happen to you.
  2. Practice good password management by utilizing a strong mix of characters. Don’t use the same password for multiple sites and don’t share your password with others or write it down.
  3. Never give out login credentials over the phone, in person, or via email. This includes your user names and passwords.
  4. Never leave your devices unattended. If you need to leave your computer, phone, or tablet for any length of time—no matter how short—lock it so no one can use it while you’re gone. If you keep sensitive information on a flash drive or external hard drive, make sure to secure it as well.
  5. Be careful when clicking on attachments or links in email. If it’s unexpected or suspicious for any reason, don’t click on it. Double check the URL of the website the link takes you to. Attackers will often take advantage of spelling mistakes to direct you to a harmful website.
  6. Roll the mouse pointer over a link to reveal its actual destination before clicking on it. It will display in the bottom left corner of the browser. In Microsoft Outlook it is displayed above the link.
  7. When using public Wi-Fi, refrain from sending or receiving private information.
  8. Use virus protection software on all computers connected to the Internet and ensure it is updated regularly. Most commercially available security software provides anti-virus, malware and firewall protection.
  9. Keep all applications, including your operating system patched, by setting your PC to automatically install updates.
  10. Turn off your computer or disconnect from the network when not in use. An intruder cannot attack your computer if it is turned off or disconnected from the network.
  11. Back up your data regularly, and make sure your anti-virus software is always up to date.
  12. Be conscientious of what you plug in to your computer. Malware can be spread through infected flash drives, external hard drives, and even smartphones.
  13. Watch what you’re sharing on social networks. Criminals can befriend you and easily gain access to a shocking amount of information—where you go to school, where you work, when you’re on vacation—that could help them gain access to more valuable data.
  14. Offline, be wary of social engineering, where someone attempts to gain information from you through manipulation. If someone calls or emails you asking for sensitive information, it’s okay to say no. You can always call the company directly to verify credentials before giving out any information.
  15. Be sure to monitor your accounts for any suspicious activity. If you see something unfamiliar, it could be a sign that you’ve been compromised.
  16. ATM, Credit, and Debit Cards or Checks should be signed as soon as they arrive and only used for transactions in a secure setting (not on unfamiliar or suspicious websites). Do not utilize the “remember my card number” options on websites and do not leave the cards out in visible, unsecured locations. Immediately report if your card goes missing or is stolen. Tamper resistant checks are available through GSCU and utilize security features such as chemically sensitive paper to deter alterations.
  17. Statements, e-statements, bills and e-bills should be reviewed promptly upon receipt to verify that all transactions were made by authorized parties. Any transactions made by unauthorized parties should be reported to the appropriate financial institution, card issuer, or biller. Statements, bills, and transaction receipts that are to be discarded should be eliminated securely, for example by shredding, and should not be discarded in a readable form.

How to Detect Phishing or Spoofing Emails

  1. Probably the easiest way to identify if an email is legitimate or not, is to simply hover your mouse arrow over the name in the From column. By doing so, you will be able to tell if the email is from a recognizable domain that is linked to the actual sender name. For example, an email from Match.com should typically have the from domain of “match.com” (not "motch.com" or “humbletemper.com").
  2. Pay attention to the email in the reply field. Does it match the sender of the original email? This is similar to hovering over the From column and may help you detect a phishing attempt.
  3. Are the URLs legitimate? Similar to hovering over certain parts of the email, another place to check would be any URLs the email is trying to direct you to visit. Always make sure the link is legitimate and uses encryption (https://). However, it is a recommended best practice to always open a new window and go to the site directly without using the email link provided in an email.
  4. A common practice of many hackers is the use of misspelled words on purpose. While it may seem that would easily reveal an illegitimate email, it is actually a tactic used to find less savvy users. Spammers have learned that if they get a response from a poorly written email, they have found an easy target and will focus their efforts to gain access to that user's information.
  5. Most legitimate messages will be written with HTML and will be a mix of text and images. A poorly constructed phishing email may be missing images, including the company’s logo. If the email is plain text and looks different than what you’re used to seeing from that sender, go with your gut feeling and delete the message.
  6. A common practice of many spammers is using an image for the message body. Make sure the email is a mix of text and images. Also, if there are embedded links, hover over them within the image for an extra step of precaution.
  7. One tactic that is commonly used by hackers is to alert you that you must provide and/or update your personal information about an account (e.g., Social Security number, bank account details, account password). Phishers will use this tactic to drive urgency for someone to click on a malicious URL or download an attachment aiming to infect the user’s computer or steal their information.
  8. Is this new email the first time your bank has sent you an attachment? Most financial institutions or retailers will not send out attachments via email, so be careful about opening any from senders or messages that seem suspicious. High risk attachments file types include: .exe, .scr, .zip, .com, .bat.
  9. If an email seems too good to be true, it most likely is. Be cautious with any message offering to place money into your bank account by simply “clicking here”. If the content places any kind of urgency, such as prompts saying “you must click into your account now”, it is most likely a scam and should be marked as “junk”.
  10. If you notice that your email address is being identified as the From address, this is a sign of a fake email message. You should also be cautious if the "To" field reflects a large list of recipients. Legitimate emails will be sent directly to you and you only. You may see “undisclosed recipients” and this is something to keep an eye on as well. It could be a valid send, but double check by using the other tips identified above.

ATM Skimming

Criminals attach a card-skimming device to an ATM or payment processing terminal to steal card information. This can be done with skimmers that read the magnetic strip or computer chip on the card, small cameras to record finger movement when entering passwords, electronic equipment directly installed into the ATM or payment terminal, or an overlay device on top of the keyboard area to record PINs.

Machines in public areas such as airports, gas stations, or stores are the most vulnerable.

How to protect yourself:

  • Check all ATMs and other card-reading devices before use.
  • Use ATMs inside buildings or in high-traffic areas that are harder to target.
  • Opt for credit (or use your debit card as credit) to prevent access to you PIN.
  • If an ATM looks suspicious, don’t use it. Report it to the bank or police.
  • Monitor your accounts and check you bank statement regularly. Report any suspicious activity to your bank and/or card company.

Definitions

Malware – software that is intended to damage or disable computers and computer systems

Social Engineering – the act of obtaining, or attempting to obtain, secure data by conning an individual into revealing secure information

Firewall Protection – software programs designed to protect a network by preventing unauthorized users from gaining access or by monitoring transfers of information to and from the network

Anti-virus Protection – computer software used to prevent, detect, and remove malicious computer viruses

Hacker – a person who uses computers to gain unauthorized access to data

Virus – a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data

Contact Member Services if you experience any of the following scenarios:

  • If you receive an email alert regarding a wire, ACH, or bill pay transactions you did not initiate;
  • If you receive an email alert regarding a change of password or email address you did not create;
  • If the login screen looks different or has unusual fields or prompts. GSCU will notify members prior to any changes.

Insurance Products

Mortgage Life & Disability Insurance

Peace of mind is the perfect addition to any home. Mortgage Life Insurance, underwritten by Minnesota Life Insurance Company, pays off or reduces your mortgage balance in the event of your death* - helping your family keep the home they love. 

In the event of your untimely death, Mortgage Life Insurance benefits are sent directly to your lending institution to pay off or reduce your mortgage debt, relieving your family or co-homeowner of a major, long-term debt. All homeowners under the age of 70 are eligible to apply. Benefits include:

  • 12 Months Return of Premium - After you have paid 12 consecutive premiums, you are eligible to have an amount equal to 12 months of premium payments returned to you.
  • Living Insurance Benefit** - If you're diagnosed with a terminal condition that leaves you with a life expectancy of 12 months or less, you have the option of accelerating payment of the death benefit while you are still alive.

Email our Mortgage Department for more information.

* Plan does not cover suicide during the first two years of coverage.
**If two borrowers are insured for joint Mortgage Life Insurance, only one living insurance benefit will be payable under the policy.
Mortgage Life Insurance offered under Minnesota Life policy form series MHC-88-15323T, MHC-99-15730V, and any state variation thereof. 

Nationwide Pet Insurance Discount

Nationwide brings you health insurance coverage for your pets. A pet insurance policy from Nationwide helps pay for your pet's treatments, surgeries, lab fees, X-rays, and much more. You'll have the peace of mind knowing you can care for your pet no matter the cost. You're eligible for a discount when you enroll through your company or organization. Save even more when you enroll multiple pets. 

  • 1 pet - 5% discount on base medical or wellness plan
  • 2-3 pets - 10% discount on base medical or wellness plan for each pet
  • 4+ pets - 15% discount on base medical or wellness plan for each pet 

Learn more about Nationwide Pet Insurance

Live Chat