Important Service Disruption:
Online and mobile capabilities have created countless new opportunities for businesses. And at NBT Bank, we're committed to helping you safely take advantage of those opportunities. You can start with a few tips and strategies on how to protect your business online and mobile devices. Click the headings below for more.
Be wary of anyone asking for your login IDs and passwords. If you give out your NBT Digital Banking login ID and/or password, you could be putting your NBT Bank accounts at risk.
Always be careful when choosing a password for online or mobile banking practices. You should avoid using the same password for multiple accounts. Never use easily guessable passwords that can be found through open source or social networking sites (such as your pet's name or your child's name). The most secure passwords include a combination of letters, numbers and special characters. You should change your passwords on a regular basis.
Be sure to keep your anti-virus and firewall software up to date on your computer. Make sure that you are cautious of offers for "free" anti-virus software. Always choose your software from a reputable company that will update regularly.
Be sure to initiate online transactions via dual control. Payroll ACH or wire transactions can be set up to require a user level and supervisory level authority. This will help provide additional online security controls. Please see our Cybersecurity Best Practices for more tips.
Smart phones add a lot of convenience to everyday life, but they can also add an additional level of risk to businesses and individuals when they are not used securely. Fraudsters are increasing their capacity to steal sensitive information from smart phones and use it for malicious purposes.
While you may be in the know on the latest apps and technology trends, are you staying up to speed on how to protect your smart phone and private information from falling into the wrong hands?
Tips to Help You and Your Business Stay Protected:
A Red Flag is anything that might seem unusual or make you feel uncomfortable about an email.
View a PDF document of Common Social Engineering Red Flags.