Enable Accessibility
Personal Online Banking
All personal banking clients, please enter your online credentials here:
e‑Treasury Business Banking
Log in
Safeguarding your online banking sessions is our top priority. For information about how you can help protect your online banking sessions, or if you need additional assistance with your e-Treasury log-in, please contact Client Support at [email protected] or 855.274.2800.

Download our e-Treasury Secure Browser

Business Online Banking
If you need assistance, please contact Client Services at [email protected] or 855.274.2800.
Log in
Safeguarding your online banking sessions is our top priority. For information about how you can help protect your online banking sessions, or if you need additional assistance with your e-Treasury log-in, please contact TM Service at [email protected] or 212.575.8020.

Download our e-Treasury Secure Browser

Download the Sterling e-Treasury Token Client

Business Online Banking
If you need assistance, please contact Client Services at [email protected] or 855.274.2800

For optimal viewing experience, please use a supported browser such as Chrome or Edge

Download Edge Download Chrome

two men sitting in a conference room looking at laptop

Cybersecurity FAQ’s

Published on May 16, 2024 | Webster Bank

Cybersecurity is important for businesses to help safeguard data, privacy, and critical systems. There is a lot to understand about protecting your business from cyberattacks. These frequently asked questions will help to simplify the basics of cybersecurity.

Q: What is Cybersecurity?

Just like you’d protect your home with house security (locks, gates, doors), cybersecurity protects your business from malicious (and accidental) attacks through your internet-connected networks, computers, mobile devices, software, and applications. These cybersecurity measures are designed to defend against attackers seeking to gain access to your data, destroy, or use stolen information to your customers, or divert funds into an attacker-controlled account. Good examples of cybersecurity measures include strong passwords, two factor authentication, staff education and pre-prepared disaster recovery plans.

Q: What is a data breach?

A data breach is when an intruder gets unauthorized access to your information such as customer records and personal information, intellectual property, or company secrets. It’s often a PR nightmare having to inform the customers and suppliers that their data has been stolen.

Q: What is malware?

Malware is short for ‘malicious software’, which has been surreptitiously installed in your environment and may affect the confidentiality, integrity, or availability of your data or systems. It could be executable code, computer viruses, worms, trojans, bots, spyware, ransomware, or other malicious programs. Often picked up when installing or clicking on malicious links inappropriately.

Q: What is a denial of service?

A denial-of-service is when your computer/laptop or your network crashes because someone or something has flooded your devices with unwanted traffic or information. It literally denies you access to the internet and your data, with the attack typically consuming all your hard disk space, memory or server capacity. Usually, the attacker demands money in exchange for ceasing their attacks, calculating the financial and reputational damage of you being shutdown is worse than the ransom.

Q: What is a phishing email?

Phishing is when someone disguised as a trusted contact or source tries to defraud you, often through email, text message or social media contact. Attackers try to get personal data such as passwords or bank/credit card numbers by hoping that you’ll click on fake links to sites or open attachments which install malware or direct you to pay an invoice or amount owed to an account controlled by the attacker.

Q: What are business email compromise hacks?

Business email hacking involves someone gaining access to an employee’s business email account so they can pose as the employee, to then trick others into fraudulent wire transfers, gift card purchases or other financial transactions. Often, the hack involves the attacker impersonating the business owner, but can include pretending to be a supplier requesting you use a new bank account for your latest purchase.

Q: What is ransomware?

Ransomware is when you’ve mistakenly installed a rogue piece of software (from clicking on a link or opening an attachment), allowing the attacker access to your data, which they then encrypt and demand money for the decryption keys. If you don’t pay (usually by an untraceable currency such as Bitcoin), the attacker will delete your data, or lock your screens and deny you access.

Q: What is scareware?

Scareware is similar to ransomware, this time threatening to swamp you with annoying notifications, reveal your online behavior (real and not real) or threaten you with consequences, like a tax audit.

Q: Do I need cyber insurance?

Cyber-risk insurance depends on your risk profile. You’re less likely to need it (or not as much coverage) if you have robust cybersecurity protection, security-aware staff and a well-defined process for restoring business systems. But every time your business connects to the Internet, you expose it to potential hackers, cyber insurance coverage protects you from financial loss and can cover you for liability claims if your use of the Internet caused someone else to suffer a loss.

Q: How do I write a digital disaster plan?

First, list all the things you have connected to the internet (servers, desktops, laptops, phones, wireless devices, etc.), and outline how you keep these safe (passwords and back-up for example), then all the data and mission critical software you can’t do without. Once you’ve identified the assets and data you want to protect, next to each, outline what you do to keep hackers out (passwords, two factor authentication, staff training etc.) and what you’ll do if that fails (back-up and system recovery). Then test to make sure it all works.

Q: What is two-factor authentication?

Two-factor authentication (or 2FA) is when you are asked for one more security step before getting access to what you have logged into. Often, it’s an email or a text asking you to enter a code or confirm you logged in, to prove that it’s you at the other end. These codes are randomly generated at the moment they’re required, often only valid for one use and usually time-out if not used within a certain, short, period of time.

Q: What is three-factor authentication?

Three-factor authentication (3FA) is even more secure and usually needs three different types of security, typically, knowledge (something you know, like a PIN, username or password), possession (something you have with you, like a phone that gets sent a one-time password, a key fob or ID card) and inherence (something biological, such as a fingerprint, retina or voice recognition).

Q: How do I know I’ve been hacked?

It’s not always obvious, but some common hints you’ve been hacked include an inability to log in to an account, unknown program opening when starting your computer, pop-up windows, lots of spam emails, social media posts appearing that you didn’t write, or your computer isn’t performing as it usually does (slowed down or crashes more frequently).

Q: What’s the best way to back up my data?

There are multiple ways to back-up your data, the easiest is to copy everything to a USB stick or burn to a CD or DVD but it’s not always practical with large amounts of data. You can back up using cloud storage services like Google Drive and Dropbox, but they’re more to sync files across devices than a pure back-up especially if you need to save terabytes of stuff. Experts often recommend the 3-2-1 rule: three copies of your data, two local (on different storage media) and one off-site. For most people, this means the original data on your computer, a backup on an external hard drive, and another on a cloud backup service.

Q: Who can help me with practical cybersecurity advice?

If you have internal staff or an external IT provider that manages your cybersecurity then great, otherwise we suggest go to https://www.fbi.gov/investigate/cyber to access information on potential or real-time cyber-attacks. Use the Two Factor Directory to check what IT services use 2FA, which is a recommended pre-requisite for accessing critical data.

Q: Who do I contact if I’ve been hacked? The police, the bank, someone else?

First, if you’ve been hacked, get it fixed! Either your in-house or external IT support person. If you don’t have anyone, there are lots of consultants and IT support businesses you can call. Then report it to the FBI’s Internet Crime Complaint Center (or ‘IC3’) at https://www.ic3.gov/.Other people to tell include staff, customers and anyone else that supports your business (bank, accountant, business colleagues).

Visit our Business Banking Resource Center to learn more about how to add value to your business.

Related Resources

Small Business BankingArticles
Building a HABITAT: How Carol J. Ott Created NYC’s Go-To Resource for Co-Op Governance and Management
Since its founding in 1982, HABITAT magazine has been the trusted source of information and reporting for co-op, condo and homeowner association board members in the New York City greater metropolitan area. For founder, publisher and editor-in-chief Carol J. Ott, her commitment to serving a unique audience with journalistic integrity is unwavering. Ott is no […]
Small Business BankingArticles
Embracing Their Rebel Soul: How a Family-Owned Lifestyle Brand Is Elevating Experiences with Wine, Excursions and Design
When three cousins connected, they blended their shared passion for travel, wine and elevated design to build Rebel Soul Lifestyle Brands. For Executive Director Theresa O’Neal Redd, the start of Rebel Soul Lifestyle Brands allowed her to feed her own “rebel soul.” The term, coined by her cousin and business partner Tenisha Ramsay, captures the […]
Small Business BankingArticles
Planning ahead in a time of uncertainty
When you’re running a business, it can be tough dealing with unforeseen circumstances and a fast-changing business landscape. We have five tactics to help you plan ahead in an ever-changing environment. 1. Identify your drivers and how you’ll measure them While sales revenue is often the best indicator of how well your business is performing, […]
Connect With Us
Learn more about Webster products, services and the communities we serve.
We’d love your feedback