Online Security Best Practices for Businesses

Establish a Security-First Culture

  • Train and test employees regularly on cybersecurity awareness (e.g., phishing tests)
  • Use secure methods to handle and protect sensitive data
  • Verify everything, even internal requests to transfer funds

Use Strong Passwords and Authentication

  • Avoid common words, phrases, or personal information
  • Use a mix of uppercase, lowercase, numbers, and symbols
  • Require complex, unique passwords for each system requiring a log in
  • Avoid writing passwords down or saving them in unsecured files
  • Promote the use of password managers to store/generate strong passwords
  • Require multi-factor authentication (MFA) (SMS code, authenticator app, biometric) for all critical systems

Keep Systems and Software Updated

  • Apply security patches and updates promptly
  • Use automated patch management tools
  • Perform regular backups of data and testing restoration of data
  • Regularly audit and remove unused or outdated software

Secure Your Network

  • Use firewalls, intrusion detection/prevention systems (IDS/IPS), and VPNs
  • Secure Wi-Fi
  • Segment networks to limit access to sensitive data
  • Monitor network traffic for unusual activity
  • Restrict internet usage to necessary sites
  • Have a cyber incident response plan

Control Access and Privileges

  • Grant access based on necessity, not convenience
  • Use role-based access control
  • Regularly review and revoke unnecessary access rights

Secure Third-Party Relationships

  • Vet vendors for their security practices and limit/restrict access to your network
  • Monitor third-party access and integrations

Foster Continuous Improvement

  • Conduct regular security assessments
  • Stay informed about emerging threats and security trends by subscribing to various alerts through services like CISA, SANS Institute, FTC, and IC3.

How to Keep Your Accounts Safe

Be Cautious with Email and Links

  • Do not click on suspicious links or attachments
  • Verify sender addresses and look for signs of phishing
  • Report suspicious emails to your IT or security team

Monitor Account Activity

  • Regularly review login history and account changes
  • Regularly review and enable account features and alerts that may help you protect your account (email address, phone number changes, added users, account activity)
  • If something doesn’t look right, report it immediately to your financial institution or credit card company

Log Out of Shared Devices

  • Always log out when using public or shared computers
  • Avoid saving login credentials on browsers in shared environments

User Access Controls

  • Require two-person approval for transactions
  • Utilize out-of-band authentication
  • Establish dollar-amount limits for transactions
  • Limit administrator profiles

Store and Dispose of Information Securely

  • Sensitive information like bank account numbers should be encrypted or stored using secure methods
  • Shred documents that contain sensitive information such as your account numbers, including debit cards
  • Never email sensitive account/personal information; use secure email

Find your Carrollton Bank

Third Party Site Disclaimer

You are leaving Carrollton Bank's website and will be redirected to another site. Carrollton Bank makes no endorsement or claims about the accuracy or content of the information contained in these sites. The security and privacy policies on these sites may be different than Carrollton Bank.

« Cancel Continue » ×

Warning!

Regular email is not secure. Please do not include any personal or financial information when contacting Carrollton Bank via email.

« Cancel Continue » ×