Enable Accessibility
×
Close
Personal Online Banking
All personal banking clients, please enter your online credentials here:
e‑Treasury Business Banking
Log in
Safeguarding your online banking sessions is our top priority. For information about how you can help protect your online banking sessions, or if you need additional assistance with your e-Treasury log-in, please contact Client Support at [email protected] or 855.274.2800.

Download our e-Treasury Secure Browser

Business Online Banking
If you need assistance, please contact Client Services at [email protected] or 855.274.2800.
e‑Treasury
Log in
Safeguarding your online banking sessions is our top priority. For information about how you can help protect your online banking sessions, or if you need additional assistance with your e-Treasury log-in, please contact TM Service at [email protected] or 212.575.8020.


Download our e-Treasury Secure Browser

Download the Sterling e-Treasury Token Client


Business Online Banking
If you need assistance, please contact Client Services at [email protected] or 855.274.2800

For optimal viewing experience, please use a supported browser such as Chrome or Edge

Download Edge Download Chrome

Get your small business cyber-smart in 5 steps

Published on May 18, 2022 | Webster Bank

Safeguarding your company against a cyberthreat has never been more critical. Cybercriminals steal more than data – they steal from your brand. Your customers place their trust in your company, and a breach in cybersecurity undermines that trust — especially when it involves confidential financial or personal information.

Not to worry. We pulled together a list of key things to do to reduce your cyber exposure and protect your company – and your customers – against data breaches, system hacks, phishing schemes, fraud, and other threats.

Ready to get started?

Step 1. Shore up your internal systems

  • Top priority! Update company software with the latest security patches
  • Establish firewall security for your networks and systems
  • Install vulnerability management, endpoint protection, anti-spam and anti-phishing software on all machines – and update with new releases
  • Engage a trusted SOC (Security Operations Center) and SIEM (Security Information and Event Manager) to monitor infrastructure activity
  • Encrypt all company networks
  • Block all non-company devices from networks, including WiFi
  • Set up secure remote access via VPN with multi-factor authentication
  • Require password protection and multi-factor authentication on all devices
  • Eliminate all shared credentials and remove unnecessary admin-level access
  • Conduct regular computer and server data backups

Top priority! Update company software with the latest security patches

Step 2. Work with trusted partners only

  • Confirm that your bank, payroll processor, web host providers, IT vendors, and any other new or current partners with access to your system follow cybersecurity best practices
  • Consult with your banker to ensure that your company adheres to the latest fraud protection controls and standards to protect cash management functions, including payables and receivables

Webster Customers: Did you know that Positive Pay can help detect fraud? Monitor incoming check and ACH payments on your business account(s) and identify potentially questionable activity right away, all through Webster Web-Link¨.

Step 3. Foster a culture of cybersecurity to get employees on board

  • Implement regular security awareness & phishing training
  • Alert employees of phishing schemes, scams, and emerging risks – like the charity scams that are currently rampant
  • Require verbal verification of requests to avoid compromise of email systems and to thwart spoofing and spearfishing attempts to scam employees into revealing confidential information

Consult with your banker to ensure that you’re using the latest fraud protection controls and best practices to protect cash management functions, including payables and receivables.

Step 4. Update your operations planning

  • Appoint a team member or team to spearhead security operations
  • Define, document, and communicate security policies
  • Develop and institutionalize a company-wide Security Incident Response Plan
  • Draft financial procedures to reconcile payments and identify potential risk
  • Determine an incidence response action plan to trigger in the event of a cybersecurity breach

Step 5. Consider cybersecurity insurance

  • Explore coverages to protect against privacy, data, and network exposure, should your system be compromised or targeted
  • Research the ROI of insurance costs over lost business revenue, data recovery costs, data breach resources, etc.

 

Want more tips? Check out our Ransomware Prevention Guide, or download our printable Fraud Awareness Checklist.

 

 

Disclosure:

The opinions and views expressed in this blog post are not intended to provide specific advice or recommendations for any company. Please consult professional advisors with regard to your company’s specific situation.

Related Resources

Small Business BankingArticles
The who, what, where, when, why & how of SBA loans
Thanks to new capital access measures, a more streamlined eligibility process is helping bridge the small business lending gap, fuel job creation, and drive economic development. Find out if an SBA loan is right for your company, learn how they work, explore their benefits, and get started on propelling your company’s growth. WHAT | What […]
Small Business BankingArticles
Protecting your business online
Fraud and cybersecurity continue to be important topics for businesses. There are a range of risks – from cybercrime and data breaches to fraud related financial losses. Here are a few ways to help safeguard your business. Watch out for warning signs First, it’s worth paying attention to anything that seems out of the ordinary […]
Small Business BankingArticles
Unleashing the full potential of your modern workforce: Tips to propel organizational success.
In the dynamic workforce environment of recent years, businesses have successfully adapted to stay in lockstep with a changing market. As you evaluate what you can do today to secure a promising tomorrow, start your most valuable asset: your workforce. By adopting an inside-out approach to business growth, you can fortify your company from within […]
Connect With Us
Learn more about Webster products, services and the communities we serve.
We’d love your feedback
×