2025 MEETING DATES | CUT OFF DATE FOR APPLICATIONS |
February 11 | February 4 |
March 17 | March 10 |
May 13 | May 6 |
July 15 | July 8 |
September 9 | September 2 |
November 18 | November 11 |
Above are the list of scheduled CDF Board Meetings for 2025, and their cut off dates for all loan/overdraft
applications to be received at CDF in order to be presented at the meeting.
Update your Contact Information for One Time Password (OTP)/2 Factor Authentication (2FA)
Please complete this form to ensure we have your most up to date information. https://forms.office.com/r/SpjQEab4uR
Following a resolution by the CDF Board, it was decided that the following interest rates will apply effective from 1 September 2023:
The decision to increase interest rates for loans and term deposits was made after an analysis of the impact Reserve Bank decisions and forecasts over the year to date, market trends, and current available investment rates.
How to recognise fraud and scams.
From suspicious emails and SMS to unexpected phone calls, NAB can help you learn how to spot a scam. If you're ever unsure if a call, SMS or email is really from NAB, here are some simple tips to keep in mind:
The threat of email scams for businesses is very real and it’s growing. According to the Australian Competition and Consumer Commission (ACCC), in 2022 Australians reported $224 million in losses attributed to business email compromise (also known as payment redirection scams). This is one of the scams causing the biggest impact to Australian businesses. Based on the report from the ACCC, the most financially damaging business email compromise scams involve invoices between businesses, suppliers or individuals being intercepted and amended with fraudulent banking details.
Types of email-based scams
Business email compromise occurs when an organisation’s email account is taken over by criminals to conduct fraudulent activities such as sending fake invoices, requesting updates to bank account details, or intercepting and altering inbound payment details. Criminals often gain access to business email accounts by sending a phishing email which appears to come from a trusted organisation or contact. This email might request the recipient’s email account username and password or ask them to click on a link which downloads malicious software to their device. Often the email has been sent from a trusted contact who has had their own email account compromised. The other common way that username and password credentials are gathered is if they’re exposed through a data breach.
In invoice scams, a business or individual receives an emailed invoice from a supplier whose email account has been compromised by a criminal. The criminal has been able to alter the payment details on the invoice to an account they control. As the invoice looks legitimate the recipient may not question the payment details and send the payment to the account controlled by the criminal. Often the contact number on the invoice has also been altered. Another variation of an invoice scam is when a business receives a request from a supplier to cancel a recent payment or update the bank account details held on file and is asked to make the payment to a new account.
Also known as ‘CEO phishing’, a CEO scam is when an email appears to come from a senior person in a business such as a Chief Executive Officer (CEO) or Chief Financial Officer (CFO), requesting an urgent transfer of funds. By making the email appear to come from a senior person, the criminals hope the recipient will action it quickly without verifying the request. These emails may come from the real executive’s email account if it’s been compromised or from a very similar email address.
Another type of email scam is the payroll scam, where the email account of an employee is imitated or compromised, and an email is sent to their employer requesting an update to their bank account details for their salary. Criminals are opportunistic and looking for people to act on messages being sent, so keep an eye out for urgent requests to update payroll details. These scams can also be carried out via a phone call, so having a validation process for each channel is recommended. Best practice is to verbally confirm over the phone (using a known phone number) or face to face.
Criminals target email communication as it’s a common way individuals and business exchange information. For criminals, email is a scalable way to target many people at one time but can also be used to target individuals in a spear-phishing attack. Criminals want their messages to appear genuine, so they’re specifically created to trick the recipient into taking some sort of action.
These messages may be sent from: