• Protect Your Employees’ Computers

  • Protecting your computers is just as important as protecting your network. These steps will help protect your computers from malware and other threats.

    • Keep your operating system and web browser up to date on your company’s PCs. Malware exploits vulnerabilities in operating systems and software applications, so install updates on a regular basis. Most operating systems have update services, such as Windows Update and Mac X Software Update, which update your systems automatically. This eliminates the majority of methods that attackers use to gain access to computers.

    • Use anti-virus software and keep it up to date. Use a reputable anti-virus package on all of your computers. Most ISPs offer anti-virus, anti-spyware and personal firewalls free of charge to their customers. New malware is created daily, be sure to keep your anti-virus software updated. Most packages can perform updates automatically.

    • Beware of Wi-Fi hotspots. Wi-Fi hotspots are available in hotels, airports, coffee shops and many other places. When on the go, hotspots are a convenient way to work remotely, but most are not secure. When using a hotspot, be aware that others may be able to see what you are doing. If you need to perform sensitive work, consider using a VPN connection, which will ensure that any activity you do is encrypted.

    • Do not install software without knowing what it is. The Internet is a great source of information, especially for software, but your computer can become infected through documents attached to emails, links in emails, infected search engine results, or by simply clicking on links, videos, and documents on websites. These are the ways that malware can be installed on your computer without your consent. Once there, it can record keystrokes, re-direct your browser, or display fake websites, all in an effort to impersonate your business in online banking transactions.

    • Downloading a new application is simple and convenient, but be cautious about what you install. Fraudsters often try to disguise malware as legitimate applications. Only download from trusted sources, such as vendor web sites.

    • Log off when you are through using SVB’s online banking platform. Always use the log off button as it terminates your connection immediately. This prevents what is known as "session hijacking," which a hacker can use to gain access to your account by assuming control of your session. After 15 minutes of inactivity your session will automatically end as a safety precaution in case you forget to log off.

    • Do not click inside pop-up windows unless they are from a trusted web site. Pop-up windows are not only annoying, they can be dangerous. They may contain links to malware sites. Refrain from clicking inside a pop-up window unless the pop-up is from a trusted web site. Always use your web browser's "close" button to terminate a pop-up window.

    • Watch for people looking over your shoulder. Use a screensaver with password when you are not at your computer. If you frequently work on a laptop in public areas, such as airports, planes or coffee shops, you may want to consider a privacy screen, a thin sheet of tinted plastic that makes it difficult to read the screen unless one is directly in front of it.


    Train Employees How to Protect Themselves and Your Company when Using Email

    Educate your employees not to use email to communicate sensitive information. People seeking information for malicious purposes can very easily read email. Here are some warning signs of fraudulent emails:

    • Nonsensical greeting: A phish may contain a greeting that doesn’t make sense or may not refer to the customer by name.

    • Typos: This may reflect a deliberate effort to avoid being blocked by email filters.

    • Poor grammar: This may represent another tactic used to bypass email filters.

    • Strange links: Take note when the text of a link has a source code that points to a completely different web site when the mouse curser passes over it. Do not click embedded links or open attachments within e-mail unless you can verify the source. The links may appear to be legitimate but may actually be links to web sites that can infect your computer with malware. Always type a URL into your web browser instead of clicking on a link.

    • Urgent language: You should be suspicious of any communications that state an urgent need to communicate with you for your own security, or request that you update your information immediately.