How to Protect Your Business from Cybercrime

It’s your worst nightmare: a cyberattack on your business. Businesses are increasingly becoming the victims of this crime and the majority cite reputational damage as the most destructive consequence of a cyber breach. According to Symantec’s report, about 1 in 40 small businesses are at risk of being the victim of a cybercrime – this number escalates to 1 in 2 for large businesses.

Ideally, creating an incidence response plan will help guide you through this nightmare. However, if you’re not prepared to create one, follow these tips to help mitigate financial risk:

  • Use a Restricted Computer Workstation
    Identify a restricted computer workstation for your online banking functions, specifically treasury management (ACH and wire) transactions. This computer workstation should not be used for email or web browsing.

  • Ensure Anti-Virus Protection
    Ensure all anti-virus and security software and other mechanisms installed in your computer workstations that are used for online banking and payments, are effective and up-to-date.

  • Promote Fraud Awareness
    Fraudsters use official-looking emails and websites to lure individuals and businesses into revealing confidential financial information. Train your employees to not respond, open attachments or click on links in unsolicited emails or respond to any unsolicited requests.

  • Secure Your Computer Network
    Install security systems, including routers and firewalls, to prevent unauthorized access to your computer or network. Do not use public internet access points for online banking. Apply security patches for operating systems and third-party applications, like Adobe and Java, as soon as possible after they are released.

  • Review Your Bank Accounts Frequently
    Review your bank accounts frequently to ensure fast detection of any unauthorized activity. Any suspicious activity should be reported immediately.

  • Establish Strong Administrative Controls
    A unique administrator password (changed frequently) and token PIN should be used and not written down or shared. We recommend utilizing multifactor authentication, dual controls, alerts, daily and weekly limits and transaction verification.
  • Establish Strong Internal Controls
    Establish a method of verifying requests received via email for wire and ACH transactions. We recommend a call back to the original requester when funds are being sent to a new recipient.

It’s imperative to take a proactive stance when it comes to cybersecurity and privacy. Cybercrime should be discussed and reviewed with all employees. In a world where data breaches are becoming all too common, it’s important to consult with your IT team and experts to develop an action plan so you are armed when an incident occurs. Ultimately, it will protect your business from significant financial loss, legal fees and reputational damage.

Rate this Article

Questions? Please call us toll free at 800-860-8821 
or visit your local banking center.

This article is for informational purposes only and is general in nature. It’s provided for educational purposes only. The information contained herein may not be applicable to every situation or jurisdiction, and we encourage you to consult with your professional advisor prior to acting on information contained herein for advice applicable to your specific situation. Camden National Bank makes no representations as to the accuracy, completeness, timeliness, suitability, or validity of any information presented.