GBC is committed to protecting our customers' personal and financial
information. Maintaining our customers'
trust and confidence is our priority
More and more
frequently, consumers are using their mobile devices for online banking, payments, and shopping. We can now check
our bank account balances, deposit a check
using a mobile device's camera, pay bills, transfer money between friends, and make purchases directly on our mobile
devices. However, since these activities require users to provide sensitive personal information such as their
names, account numbers, email
addresses, and passwords, it is important to weigh the perceived benefits and potential
risks associated with mobile payments and banking.
Always opt to enable stronger
authentication when available, especially for accounts with sensitive information including
your email or bank accounts.
A stronger authentication helps verify a user has authorized access
to an online account. For example, it could be a one-time
PIN texted to a mobile device, providing an added layer of security beyond the password and username.
Use unique passwords.
Use different passwords for different
programs, accounts, and devices. By having multiple
passwords, even if attackers
do get one of your passwords,
they will not have access to all of your accounts. Do not choose options that allow your device
to remember your passwords.
account statements regularly.
Review your banking, credit card, or payment
service statements regularly to ensure there are no unauthorized charges or withdrawals.
Be sure to review and understand the details of an app before downloading and installing it. Be aware that
apps may request access to your location and personal information
and determine what information you want the app to be sharing or transmitting. Delete any apps that you do not
use regularly to increase your security.
social media permissions.
If a payment service is linked to your social media account, your payment or purchase history could
accidentally be shared with your
larger network. The more you post about yourself, the easier it might be for someone to use the information you post to
access your accounts, steal your identity,
and more. Be sure to review and understand those privacy permissions and settings.
Be up to date.
Keep your software
updated to the latest version available. Maintain
your security settings
to keeping your information safe by turning on automatic
updates so you don't have to think about it and set your security software
to run regular scans.
Be cyber secure at workplace
Business information typically includes a mix of personal and proprietary data. While you may think of trade secrets and company credit accounts, it also includes employee personally identifiable information (PII) through tax forms and payroll accounts.
Do not share PII with unknown parties or over unsecured networks.
Technology has its
As "smart" or data driven technology evolves, it is important to remember
that security measures only work if used correctly
by employees. Smart technology runs on data meaning
devices such as smartphones, laptop
computers, wireless printers, and other devices
are constantly exchanging data to complete
tasks. Take proper security precautions and ensure correct configuration to wireless devices
in order to prevent data breaches.
Social media is part
of the fraud toolset.
By searching Google and scanning your organization's social media sites, cybercriminals can gather information about your partners
and vendors, as well as human resources and financial departments. Employees should avoid oversharing on social media and should not conduct
official business, exchange
payment, or share PII on social media platforms.
You should always backup your data.
Backing up your
data is crucial for your business. A regular data backup preferably daily or
weekly saves your important files from inevitable data loss situations due to cyber
attack events such as ransomware attack, system crash, malware infection, hard
drive corruption and failure.
It only takes one time.
Data breaches do not typically
happen when a cybercriminal has hacked into an organization's infrastructure. Many data breaches can be traced back to a single security
vulnerability, phishing attempt, or instance
of accidental exposure. Be wary of
unusual sources, do not click on
unknown links, and delete suspicious messages immediately.
Report as soon as you can.
Law enforcement can use tools and legal authorities that are unavailable
to private entities to identify and apprehend whoever is responsible for the
incident. Federal investigators can obtain data to trace an intrusion or attack
to its source using search warrants, court orders and subpoenas. You can report
a security breach to:
FBI field offices www.fbi.gov/contact-us/field
U.S. Secret Service field offices www.secretservice.gov/contact
· Internet Crime Complaint Center www.ic3.gov
Trade Commission https://www.identitytheft.gov
Your local law enforcement