Enable Accessibility
×
Close
Personal Online Banking
All personal banking clients, please enter your online credentials here:
e‑Treasury Business Banking
Log in
Safeguarding your online banking sessions is our top priority. For information about how you can help protect your online banking sessions, or if you need additional assistance with your e-Treasury log-in, please contact Client Support at [email protected] or 855.274.2800.

Download our e-Treasury Secure Browser

Business Online Banking
If you need assistance, please contact Client Services at [email protected] or 855.274.2800.
e‑Treasury
Log in
Safeguarding your online banking sessions is our top priority. For information about how you can help protect your online banking sessions, or if you need additional assistance with your e-Treasury log-in, please contact TM Service at [email protected] or 212.575.8020.


Download our e-Treasury Secure Browser

Download the Sterling e-Treasury Token Client


Business Online Banking
If you need assistance, please contact Client Services at [email protected] or 855.274.2800

For optimal viewing experience, please use a supported browser such as Chrome or Edge

Download Edge Download Chrome

Cyber Security Is Everyone’s Priority

Published on April 8, 2016 |

One of the biggest concerns surrounding the Internet of Things (IoT) is data security. More devices than ever are transmitting more data than ever, posing a significant threat to businesses tied into the IoT.

In the past, an individual or department might be responsible for data and cyber security within a company, but now the responsibility is shouldered at every level across an organization. Security directly affects many levels of business, from human resources practices to operational configurations and legal considerations.

Interconnected devices open the door for possible breaches in security. If one device is hacked, other devices may be at risk. A lost smart phone could connect to an individual’s personal data and information, as well as serve as a possible link to sensitive company data and information.

Three Ways You Can Protect Your Company

1. Training and education. Make each employee aware of potential points where a breach can occur—theft, loss, neglect, and insecure practices. Provide education about the points of risk, such as phishing, spyware, and password protection.

2. Policy. The IoT represents many devices and moving parts communicating with each other. It’s crucial to have policies in place that ensure data safety without locking it down, as the exchange of information among technology and employees is what makes the IoT so powerful. Set guidelines for Bring Your Own Device, if necessary. Keep in mind, many industries require, regulate, and audit these standards.

3. Practice. Enforce best practices for cyber security across every department. Encourage personal responsibility—data safety requires all team members’ participation. Enact a system for holding employees accountable, and create a plan for worst-case scenarios.

It’s About the People
Is your technology, or your tech management practices, failing?

  • According to one data breach investigation, cyber security depends on people as much as it does on technology.

Nearly 30% of data breaches involved tactics like phishing that entice users to click on insecure emails. The same study shows that mid-level security measures, like implementing security patches that correct a potential vulnerability, could prevent more than three-quarters of low-difficulty data intrusions.

Resolving management enforcement and accountability and being proactive about midlevel security measures may be just the fix for data safety and security.

  • According to a Pew Internet and Society poll, 91% of Americans surveyed either agree or strongly agree that consumers have lost control of their personal information and data.

Hackers Cost Jobs
There is significant damage that’s caused when companies steal information from a competitor, perhaps even driving that competitor out of business. In fact, it’s estimated that hacking costs the U.S. Economy up to 500,000 jobs each year. 

Related Resources

Commercial BankingWhite Papers
The New Normal: Law Firms And Credit in a Period of Financial Uncertainty
The New Normal: Law Firms And Credit in a Period of Financial Uncertainty Fill out the form to get this free, 7 page white paper. Even under the best of economic conditions, well-managed law firms need a smart credit strategy—optimally, one that deploys a tactical mix of short- and long-term borrowing to help them maintain […]
Commercial BankingArticles
Virtual Account Management: A Smart Solution for the Next Generation of Escrow Processing
Any business that uses escrow accounts knows the challenges that come along with managing a large number of them. While they can sometimes be onerous to set up and administer, being able to utilize them effectively and efficiently is key across a range of industries. A new web-based solution from Webster Bank improves upon traditional […]
Commercial BankingInfographics
Stay Vigilant Against Fraud and Scams During the COVID-19 Pandemic Infographic
With over 300,000 instances of fraud related to COVID-19 reported as of February 1, 2021—and with losses exceeding $320 million1 and counting—it is vital that you understand what the most common types of fraud being practiced look like and the steps you can take to protect your organization.
Connect With Us
Learn more about Webster products, services and the communities we serve.
We’d love your feedback
×