Skip to main content

Business Security Center

Go Search
Personal
Business
Customer Service
  

Protecting Your Information 

Password and logon Information

1. Make sure you keep your logon IDs,  passwords and token in a safe place. Never
    store your login, password and token information in clearly visible places.

2. Do not share your logon information with other users and never disclose your token
    serial number, or token code to anyone.

3. Choose passwords that are difficult for others to guess and use a combination of letters and
    numbers. Use a mix of upper and lower case characters do not use a complete dictionary
    word, your name, birth date or company name.


Review account activity and controls

1. Review the Audit log and account activity daily. Report any suspicious activity to your
    financial institution immediately.

2. If you have the ability to initiate financial transactions via the Internet banking application,
    one of the most effective security measures is to segregate duties. Consider requiring
    dual control for these transactions.

3. Set up Alerts for financial transactions such as ACH or Wire transfers.


PC Security

1. Make sure your computer has an anti-spyware protection program that detects and removes
    all forms of spyware or malware. Be sure to keep this software up to date.

2. Scan your computer regularly for both spyware and viruses

3. Add a firewall to your network or computer system.

4. Use a current web browser that has additional security features

5. Install all software fixes or updates that may address security holes


Personal Computer Usage

1. Control physical access to your computer; make sure your computer is protected with
    password enabled screen savers.

2. If you have a laptop, do not leave it unattended while traveling or keep it locked at work to
    prevent theft.

3. Never leave your laptop in the back seat of your car. Hide your laptop in places such as the
    trunk or underneath the seat to prevent thieves from seeing your laptop in your car.


Email Tips

1. Open attachments only if you know the sender. Do not open links included in an email from
    unknown parties. These links may direct you to websites that contain spyware or viruses.

2. Question suspicious emails. Eastern will never send you an email asking you for your customer
    ID and password

3. Most emails are not secured so never send anyone an email with any account numbers or
    password information.


Threats to Your Information

The top two fraud threats identified by the FDIC are malware and phishing attacks. In April 2011, The FBI identified twenty incidents of attempted fraud totaling $20 million wherein online banking credentials of small to medium sized US business were compromised and used to initiate wire transfers to Chinese economic and trade companies.

Corporate bank accounts are sensitive targets and are increasingly being attacked by fraudsters. One of the biggest risks is actually the computer used to bank with. Criminals use two sophisticated attacks to access online accounts using your computer.

Malicious software (or malware) - automatically and silently downloaded onto the computer when browsing the Internet, malware silently captures login information and transfers it to criminals as log-in is performed and can also silently change transactions executed.

Phishing - criminals build fake websites that look very similar to your bank’s website to lure you into visiting them and submitting your online banking log-in information which is later used to access your account.


Online Protection - Anti-Virus & Firewalls

Anti-Virus solutions take days, sometime even weeks, to detect new financial malware variants and remove them. However, fraud occurs hours after a new malware variant is released. So when your anti-virus provider eventually cleans your computer of the malware, it is already too late to prevent fraud from occurring.

Trusteer Rapport protects your computer and mitigates financial malware infections. It also communicates with your bank and allows them to take immediate action against changes in threat.