How do I report fraudulent transactions and activities?
On this page you will learn how to identify and report suspicious activity or unauthorised transactions to protect your business and prevent fraud. We'll also share tips on how to protect your business from fraudulent activity.
Emails and text messages: stay vigilant
Did you receive a text message or email prompting you to click on a link? Carefully review the sender’s information before clicking on anything, and do not provide any personal information. National Bank will never use this method to request confidential information such as your password.
If you received such a message but didn’t click on the link, ignore and delete it.
If you’re a National Bank client and clicked on the link or provided your personal information, please contact us immediately at 1-888-835-6281 to secure your file.
Report fraud
Our advisors are at your service 7 days a week from 6 a.m. to midnight (ET). Contact us at 1-888-835-6281.
Report a fraudent communication
Never click on a link in an email or text message that appears to come from National Bank but looks fraudulent to you. Forward the message immediately to telnat.securite@bnc.ca.
Identifying suspicious activity
Monitor your account regularly for any suspicious activity. Signs of suspicious activity may include, but are not limited to:
- Unusual transactions: Transactions that you do not recognize, because of the recipient for example, or the transaction date or amount.
- Suspicious connections to your account: Actions carried out on your account without your consent.
- Unexpected changes to your settings: Changes that you have not authorized, such as changes to your email address, phone number or security settings.
Reporting suspicious activity
If you spot any suspicious activity or unauthorized transactions, take the following steps immediately:
- Screenshot everything: Take a screenshot of the suspicious activity to serve as evidence.
- Report it to National Bank: Contact us as soon as possible. Provide as much detail as you can, including the screenshot, date and time of the incident, and any other relevant details.
- Change your sign-in information: If you suspect that your sign-in information (e.g., password) was compromised, change it immediately.