Category Archives: Events
Since 2013, cyber criminals have attacked over 17,000 businesses via business email scams with losses totaling over $2.3 billion. Businesses of any size are vulnerable. The “2014 Internet Crime Report” said Arizonans submitted 6,040 of the Internet crime complaints the previous year, reporting losses of nearly $25.4 million, and cyber crime rates have continued to rise since that time.
Experts estimate that 80% of cyber attacks are avoidable through basic cyber hygiene. By implementing a variety of safety and prevention measures, you can significantly reduce the chances of your business suffering losses due to cyber crime.
The Department of Homeland Security has designated October as National Cyber Security Awareness month and provided some helpful resources here.
To help businesses understand the risks and the ways they can help protect themselves from this growing threat, we’re getting a head start on Cyber Security Awareness month by hosting a cyber security seminar on September 15 at Viscount Suite Hotel. We’ve already got a large RSVP list, so sign up soon here if you’d like to snap up this valuable information.
In the meantime, we want to share some sneak peaks of advice you’re likely to hear about in more detail at our seminar… and may have read about on our blog. We assure you, there’s plenty more information to be shared at our seminar, so don’t miss it.
- Employee training throughout your organization is critical. Make sure you have clear policies about cyber security and that they are clearly communicated to your staff, contractors and anyone else who has the ability to expose your company to risk. Educate all of your employees about the risks of clicking on links in emails and sharing business information via phone or email with people they don’t know or trust.
- Limit access to software to employees who really need it and make sure that each employee has their own log-in (don’t have employees share log-ins) so you can track activity back to a specific person.
- Keep software updated regularly. Cyber thieves exploit vulnerabilities in older versions of software.
- Use two-factor authentication to access your internet email and other sensitive applications such as online banking. Two-factor authentication requires you to use a one-time password in addition to your regular password, making it more difficult for hackers to hack.
- Make sure your back-up files are capturing all of your critical data and that your employees are following your prescribed protocol for backing up their files. Also make sure you are backing up your files in a different physical location so you can use them in the event of a natural disaster.
- Look at your third party vendor contracts to understand what cyber risk you might assume through your relationship with that vendor, particularly with cloud providers who typically accept little, if any, liability associated with cyber crime.
- Take information security as seriously as operations and finance.
- Create a VPN (virtual private network) to secure communications to your business network that are initiated by authorized employees using devices outside of your network.
- Secure your wi-fi with a password and encryption.
- Use different passwords for different sites and make them long and complex.
- Check any existing cyber security insurance you may have to look for gaps or exclusions in the coverage. Business interruption is typically limited to physical causes so most insurance won’t cover business interruption due to a cyber attack.
- Before your business is targeted by cyber criminals, establish a relationship with your local FBI office. They’re the lead federal agency for investigating these kinds of attacks.
For banking (online as well as offline):
- Use dual control for all ACH and wire transfers. Dual control means that another person or account has to authorize a transfer in addition to the person who initiates it.
- Never trust wire instructions or other funds transfer instructions sent via email. Always call the person or company to verify the instructions.
- Set up alerts that automatically notify you about log-ins, password changes, transfers, etc. This way if an unauthorized change is made, you know and can respond quickly.
- Use Trusteer Rapport software (available free) to provide a secure web channel between your computer and the bank’s online banking site.
- Use our ACH Fraud Protection Service, which enables business clients to review ACH transactions before they are complete and to choose to pay or return each item.
- Use ACH blocks or restrictions, if you know you won’t be using these electronic payments, or if you want to limit ACH withdrawals to only specific vendors.
To address the risks of funds transfer fraud and cyber deception, our bank has also introduced a new way for our business banking clients to protect themselves through a first-of-its-kind cyber insurance group policy. The policy provides gap insurance, since most cyber crime insurance policies don’t cover losses for money sent out of a business banking account “voluntarily;” that is, when someone in your firm is tricked into sending funds to a cyber criminal posing as a trusted colleague or vendor. For more information on this policy, please visit grandpointinsurance.com.
Insurance Products are:
Insurance Products are offered through Grandpoint Insurance Services, Inc., a non-bank insurance agency affiliate of Grandpoint Bank, and facilitated through LBW Insurance & Financial Services, Inc., an unaffiliated insurance agency.
Linking to Non-Bank of Tucson Websites
This icon appears next to every link that directs to a third party website not affiliated with Bank of Tucson. Please be advised that if you click this link you will be taken to a website hosted by another party, where you will no longer be subject to, or under the protection of, the privacy and security policies of Bank of Tucson. We recommend that you review and evaluate the privacy and security policies of the site that you are entering. Bank of Tucson assumes no liability for the content, information, security, policies or transactions provided by these other sites.