×
Close
Personal Online Banking
All personal banking clients, please enter your online credentials here:
e‑Treasury Business Banking
Log in
Safeguarding your online banking sessions is our top priority. For information about how you can help protect your online banking sessions, or if you need additional assistance with your e-Treasury log-in, please contact Client Support at [email protected] or 855.274.2800.

Download our e-Treasury Secure Browser

Business Online Banking
If you need assistance, please contact Client Services at [email protected] or 855.274.2800.
e‑Treasury
Log in
Safeguarding your online banking sessions is our top priority. For information about how you can help protect your online banking sessions, or if you need additional assistance with your e-Treasury log-in, please contact TM Service at [email protected] or 212.575.8020.


Download our e-Treasury Secure Browser

Download the Sterling e-Treasury Token Client


Business Online Banking
If you need assistance, please contact Client Services at [email protected] or 855.274.2800

For optimal viewing experience, please use a supported browser such as Chrome or Edge

Download Edge Download Chrome
A man in front of his computer

Protecting Your Business From Fraud

“The best defense is a strong offense” — words to keep in mind as you work to protect your business from internal and external risks designed to undo all you’ve worked for. Let’s work together to minimize those risks.

Fraud is rampant

Fraud is a continual risk and you need to be ready to take action. We’re here for you with help and advice.

According to the 2020 AFP® Payments Fraud and Control Report:

  • 81% of businesses were targets of payments fraud last year
  • 75% of organizations experienced Business Email Compromise (BEC)
  • 74% of organizations experienced check fraud in 2019
  • 33% experienced ACH Debit and 22% ACH Credit fraud

Unlike consumers, businesses share responsibility with their bank for the protection of their accounts from internal and external fraud. Your business is responsible for providing fraud education to employees to help them stay ahead of attempts by ever-more-sophisticated cyber criminals. Plus, take advantage of resources from your technology department, insurance carrier and banking partners.

What to know

placeholder

External Threats

External threats typically come in two broad types: cybercriminals attacking your systems and identity theft perpetrators trying to cash checks or otherwise gain unauthorized disbursements from your business.

placeholder

Internal Threats

Internal threats come from within your own organization, usually in the form of embezzlement Including check forgery, theft of services, skimming and other related financial crimes.

Educational Resources

Malware and phishing

Learn about the basic types of malware and how you can best avoid them. Malware can include phishing, which are malicious attempts to extract information through messages, emails or links.

Cybercrime and your business

Cybersecurity is not an IT issue; it’s a business issue. The financial ramifications sink many companies every year. Be aware and take basic steps to protect your business and your customers.

Fraud checklist

Put the fraud controls in place now to manage risk and guard against identity theft, embezzlement and other financial crimes. You must diligently guard your systems, staff and transactions.

A woman deals with how to protect her business from fraud

Protect against threats

Your keys to security

Knowledge and action are the key ingredients to protect against the threats facing your business. Once you know the challenges, you can work with Webster for solutions to safeguard your business and enjoy peace of mind.

What to Do

External Threats

For external threats, there are products that verify checks written against your account are genuine, including an option to review payee names to find discrepancies. There is also a product to protect your accounts from unauthorized or potentially fraudulent ACH debits.

Internal Security

To ensure internal security, restrict access to your checking accounts. Consider setting up dual control, which allows your business to designate user roles and responsibilities that can crosscheck activity.

Trust but Verify

Regular, unannounced audits from a qualified third party can review transactions to help identify current and potential security problems.

Information Security Policy

Create (or update) an Information Security Policy, obtain formal acknowledgement from all relative parties and make sure you develop a Disaster Recovery Plan so you are prepared in the event your business is disrupted by a cyber attack, natural disaster or other event. Criminals take advantage of those that are unprepared!

Connect With Us
Learn more about Webster products, services and the communities we serve.
We’d love your feedback
×