Security Tips - Sunwest Bank
Important Articles
 

Security Tips

  • All
  • Cyber Tips
  • Family Safety
  • Identity Theft
  • Information Security Awareness
  • Small Business Security

What would you do if you suddenly noticed that huge chunks of money had been drained from your business account into overseas accounts? Unfortunately, online criminals are using increasingly sophisticated techniques to commit payments fraud against commercial business accounts....

Did you know a cybercriminal can gain access to your phone without touching it? When Bluetooth is activated on your phone, a malicious individual can connect to it, run a code and gain full control of it, ultimately viewing keys and passwords....

With the widespread use of computers and mobile devices, password security has become an important part of computer security. Bank, email and social networking accounts store personal information--such as date of birth, address and even credit card numbers--which are protected only by a password....

As parents, we want to trust that our children will do the right thing or stand up to peer pressure, but it’s not always that simple.  Traversing cyberspace is a useful tool for education and social interactions; however, there are perils on the web that can threaten your child’s well-being....

There is good news and bad news for consumers that shop online or use a retailer’s custom mobile application....

Every day, you give away personal information about yourself, sometimes without even realizing it.  You do this when you bookmark a page on the Internet, add an item to an ecommerce “wish list,” or complete an “All About Me” quiz on a social network....

Today, smartphones and other mobile devices are playing a major role in how people are entertained, communicate, network, work, bank, and shop. The number of smart mobile devices in the world has increased dramatically in recent years, and so has the challenge to find ways to secure those mobile devices....

The Internet is now very secure for credit card use, far more so than for everyday use, where you hand your card over without thought to waiters and store clerks, and far safer than giving out your credit card number over the phone....

The number and size of insider breaches continue to rise year on year. Databases, file servers, and the cloud hold vast amounts of sensitive corporate assets. With 89 percent of organizations feeling somewhat vulnerable to insider attacks, changes are needed to keep corporate assets safe. ...

Impersonation is one of several social engineering tools used to gain access to a system or network in order to commit fraud, industrial espionage or identity theft. The social engineer "impersonates" or plays the role of someone you are likely to trust or obey convincingly enough to fool you into allowing access to your office, to information, or to your information systems....

Loading new posts...
No more posts