Security Tips - Sunwest Bank
Important Articles
 

Security Tips

  • All
  • Cyber Tips
  • Family Safety
  • Identity Theft
  • Information Security Awareness
  • Small Business Security

Tips, advice, and additional resources for those who think they might be a victim of cybercrime. How and where to report a cybercrime incident whether it concerns ID theft, social security fraud, or online stalking. ...

Identity theft, data loss and malware infections are increasing as a result of widespread social media use. Social media includes social networking sites such as Facebook and Twitter, blogs, community sites and email....

Whenever there is a major natural or other disaster, disaster scams begin to appear. It happened with past hurricanes, and it’s no surprise that bad people will try to exploit any type of disaster. Scams quickly begin to spread. For example, within days of Hurricane Katrina, about 4,000 websites appeared claiming to offer help to victims; however, the FBI investigated and presumed 60% were bogus....

Data security is essential for all small businesses. Customer and payment information, payroll files, marketing plans, financial records - all of this information is often impossible to replace if lost in a fire or stolen by cyber criminals. How you handle and protect your systems and your data is paramount to the security of your business, as well as the privacy expectations of your customers,...

Social engineering is the human side of breaking into a corporate network. Instead of hacking into the technology, social engineers attempt to gain sensitive information or unauthorized access privileges by building inappropriate trust relationships with insiders, and fooling them into providing valuable information or access to that information.  Their goals: theft, fraud or espionage.  An organization’s best defense against social engineering attacks is properly trained...

Does your company keep sensitive data — Social Security numbers, credit reports, account numbers, health records, or business secrets? If so, then you’ve probably instituted safeguards to protect that information, whether it’s stored in computers or on paper. That’s not only good business, but may be required by law....

Identity theft is usually associated with financial transactions but it also happens in the context of medical care. Medical identity theft occurs when someone uses an individual’s personal identity to fraudulently receive medical service, prescription drugs and goods, including attempts to commit fraudulent billing....

Business email compromise fraud was the fastest-growing type of spear phishing attack last year. According to the latest figures from the FBI, cyber thieves have stolen $2 billion from 12,000 businesses using this scam which begins with compromising or spoofing a business executives’ or employees’ email account. The fraudster is able to steal money with the help of an unwitting accomplice, an employee who is...

Loading new posts...
No more posts