We no longer support this browser. Using a supported browser will provide a better experience.

Please update your browser.

Close browser message

Treasury and Payments

Improve your working capital, reduce fraud and minimize the impact of unexpected disruptions with our treasury solutions—from digital portals to integrated payables and receivables—all designed to make your operations smoother and more efficient.

Learn more about our treasury solutions:

Commercial Real Estate

Get the strategic support to be successful throughout market and real estate cycles with insights, hands-on service, comprehensive financial solutions and unrivaled certainty of execution.

Learn more about our commercial real estate solutions:

International Banking

Global opportunities mean global challenges. But real success means understanding the local markets you serve—which is why we bring the business solutions, insights and market perspective you need. 

Learn more about our international banking solutions:

Cybersecurity and Fraud Protection

How to Cyber-Sanitize Your Home Office

Working from home can put your personal and business information at risk. Consider using these best practices to stay secure while working, learning and socializing remotely.

Working from home can put your personal and business information at risk. Consider using these best practices to stay secure while working, learning and socializing remotely.

One afternoon, Kristen’s son downloaded a free app from an unsecured, third-party website to add special effects to selfies. The app contained malware, and when the phone was connected to her home network, the virus was able to spread to other devices, giving cybercriminals access to valuable financial data.

Email accounts used to log into apps often contain sensitive information, including banking information that cybercriminals can use to commit fraud. By the time Kristen discovered several suspicious transactions on her personal bank accounts, the cybercriminals had already transferred funds to an account out of the country.

This is just one example of the increasingly sophisticated techniques that cybercriminals are using to access personal information. More than a year into the COVID-19 pandemic, many people continue to work from home and use personal technology—including devices and networks—to access critical business information. As you’ve probably learned over the last year, working from home can put your personal and business information at risk. These fundamental best practices remain critical to helping you and your family stay secure while working, learning and socializing remotely.


Getting started

Cybercriminals use malware to infect personal devices through apps and downloaded files. Below are some examples of securing your digital presence by cleaning your personal work computers and mobile phones. Encourage your family to do the same.

  • Delete apps you are not using to help save space and keep your phone secure.
  • Purge files from folders that contain downloaded or deleted files because these may contain sensitive information.
  • Unsubscribe from emails and newsletters that you do not regularly read to help reduce the risk of clicking on malware or suspicious links.
  • Download and archive emails you want to save; delete those you don’t need—including sent items.
  • If possible, use one Wi-Fi network for devices to conduct transactions with sensitive data (e.g., work, banking, online shopping). Set up a separate network for your children to use for school, gaming or socializing with friends.
  • Protect all Wi-Fi networks with unique and complex passwords and remember to change the default password on your wireless router.


Practice safe video conferencing

With the rapid adoption of video conferencing platforms for work meetings and social gatherings, hackers have discovered new ways to become uninvited guests. Some additional best practices to help you practice safe videoconferencing include:

  • Set passwords for meetings and monitor the participants. Remove unrecognized or unauthorized attendees immediately.
  • Do not publish meeting invites in public forums. If you attend a public video meeting, consider modifying your profile name to protect your identity (e.g., John Doe).
  • Consider the background of your live video camera and ensure it does not expose too much personal information (e.g., diplomas or family photos).
  • Protect your video-capable devices with a webcam cover to block the lens when not in use or if you are not attending a video meeting.


Protect your devices

Best practices include, using reliable protections to encrypt files and passwords, such as:

  • Install mobile security software to help keep the device secure from cybercriminals.
  • Update your anti-virus software and operating system on all devices, including laptops, personal computers, tablets and phones.
  • Encrypt files on laptops and PCs, so that no one can access information without your permission.
  • Ensure all personal and work devices are updated to the most recent software versions.


Stay anonymous online

Less is more when it comes to social media. Cybercriminals use what data is posted, such as location, hobbies, family pictures, etc., to find potential victims and harvest personal information that can help them gain access to your financial accounts.  Some best practices to protect yourself include:

  • Use of separate email addresses for communication, shopping receipts and subscriptions.
  • Review the privacy and security settings on your mobile devices, apps and web browsers.
  • Limit who you share information with and confirm apps are only accessing information they need to work accurately, such as your location for mapping apps.


Strengthen your defenses

Here are some additional best practices to help keep your data safe:

  • Only download apps from secure sites. Inform your children about the dangers that rogue apps pose to the entire family.
  • Use a combination of numbers, letters and special characters to create strong passwords, and consider using a reputable password manager to help manage all passwords.
  • Use two-factor authentication to protect your email, social media, banking and retail accounts.
  • Sign up for alerts on credit card and banking accounts to help identify potential fraudulent activity as quickly as possible.
  • Put a freeze on your credit with each of the three major credit-reporting agencies to prevent cybercriminals from opening new accounts in your name.
  • Verify, verify, verify. Whether it appears to be an email from a known contact or an invoice from a trusted vendor, you should remain cautious. Call the sender using a phone number from a system of record to validate authenticity.
Business Resiliency Cybersecurity and Fraud Protection covid19

Get in Touch

Prefer to talk directly to one of our experts?