With increased online banking access comes the risk of your business’s information being compromised through cybercrime. Cybercrimes are not new; cyber-criminals employ various technological and non-technological methods to manipulate or trick you or other victims into divulging your personal or account information.
Modern cybercrime is about money. Cyber criminals are targeting the financial accounts of owners and employees of small and medium sized businesses, resulting in significant business disruption and potential monetary losses.
What Can You Do?
Having protection software is only half of the equation. No single layer of protection is enough; you need a layered security approach, especially when employees are engaging in risky or potentially unsafe behavior online. The best practices outlined here are intended to raise your awareness of ways to help protect, detect, and educate business employees on today’s online risks.
Much of the information is based on the extensive experience and knowledge of our security teams.
Secure your Business’s Network of Devices
Dedicate a Device:
Protection Software:
Firewalls – Install this hardware on your network to prevent unauthorized access and create a strong password.
Back-up:
Wireless:
User IDs, Tokens and Passwords – Do not share your secure User ID and password with anyone, even with a co-worker. Comerica will ask for your User ID when you initiate a call, but Comerica will never ask for your password.
Dual Control creates safety checks – Initiate ACH and wire transfer payments under dual control using two separate computers. For example: one person authorizes the creation of the payment file and a second person authorizes the release of the file from a different computer system.
Block Sites – Consider enlisting the help of an Internet service to automatically block sites that employees do not need to access for business purposes (i.e., social networking sites, blogs, instant messenger, and free software sites) to reduce the risk of downloading malware or spyware. Look to disabling full internet access completely on sensitive systems if possible.
Monitor and reconcile your accounts regularly – The quicker suspicious activity is detected, the sooner you can take action to prevent or minimize losses.
Note any changes in the performance of your computer/device:
Site Navigation