Enable Accessibility
×
Close
Personal Online Banking
All personal banking clients, please enter your online credentials here:
e‑Treasury Business Banking
Log in
Safeguarding your online banking sessions is our top priority. For information about how you can help protect your online banking sessions, or if you need additional assistance with your e-Treasury log-in, please contact Client Support at [email protected] or 855.274.2800.

Download our e-Treasury Secure Browser

Business Online Banking
If you need assistance, please contact Client Services at [email protected] or 855.274.2800.
e‑Treasury
Log in
Safeguarding your online banking sessions is our top priority. For information about how you can help protect your online banking sessions, or if you need additional assistance with your e-Treasury log-in, please contact TM Service at [email protected] or 212.575.8020.


Download our e-Treasury Secure Browser

Download the Sterling e-Treasury Token Client


Business Online Banking
If you need assistance, please contact Client Services at [email protected] or 855.274.2800

For optimal viewing experience, please use a supported browser such as Chrome or Edge

Download Edge Download Chrome

Data Protection on the Go

Published on October 16, 2020 |

If you or your employees are touching base on projects after hours or traveling regularly, it’s likely that you’re conducting work activities on personal cellphones and placing valuable data at risk. Consider these strategic steps you can take to protect your business’s data.

DECIDE DEVICE VS. DATA: Ultimately, you can protect information by protecting the device it’s stored on, or the data itself, or some combination of the two. You’ll want to choose if your employees have the option to use personal devices for work or if their activities are to be limited to devices owned by the company.

DEFINE POLICIES AND PROTECTIONS: Based on your decision above, provide a clear outline of your expectations and determine the appropriate protective measures that need to be taken. These might include two-step password authentication for important accounts, tracking procedures for stolen devices, and required antivirus and anti-spyware programs.

Related Resources

Commercial BankingWhite Papers
The New Normal: Law Firms And Credit in a Period of Financial Uncertainty
The New Normal: Law Firms And Credit in a Period of Financial Uncertainty Fill out the form to get this free, 7 page white paper. Even under the best of economic conditions, well-managed law firms need a smart credit strategy—optimally, one that deploys a tactical mix of short- and long-term borrowing to help them maintain […]
Commercial BankingArticles
Virtual Account Management: A Smart Solution for the Next Generation of Escrow Processing
Any business that uses escrow accounts knows the challenges that come along with managing a large number of them. While they can sometimes be onerous to set up and administer, being able to utilize them effectively and efficiently is key across a range of industries. A new web-based solution from Webster Bank improves upon traditional […]
Commercial BankingInfographics
Stay Vigilant Against Fraud and Scams During the COVID-19 Pandemic Infographic
With over 300,000 instances of fraud related to COVID-19 reported as of February 1, 2021—and with losses exceeding $320 million1 and counting—it is vital that you understand what the most common types of fraud being practiced look like and the steps you can take to protect your organization.
Connect With Us
Learn more about Webster products, services and the communities we serve.
We’d love your feedback
×