Skip to main content

Mitigation: Best Practices

 Section Menu

Best Practices to Mitigate Cybersecurity Threats

Mitigating cybersecurity threats requires a proactive approach and the implementation of effective security measures. By adopting these best practices, organizations can strengthen their defenses and reduce the risk of cyber attacks.

Key Best Practices

1. Secure Devices: Access Cash Management only from trusted devices with up-to-date security software. Ensure that operating systems, antivirus programs, and firewalls are all regularly updated and active.
2. Secure Network Connection: Connect to Cash Management using a secure and private network, such as a wired connection or a trusted Wi-Fi network with WPA2 encryption. Avoid using public Wi-Fi networks, as they may not be secure.
3. Monitor Account Activity: Regularly monitor your Cash Management account activity for any unauthorized transactions or suspicious activity. Report any discrepancies to your bank immediately.
4. Beware of Phishing Attempts: Be cautious of emails, messages, or phone calls asking for your Cash Management credentials or personal information. Banks will never ask for this information via email or phone.
5. Secure Access Controls: Limit access to Cash Management accounts only to authorized personnel. Implement strong access controls and user permissions within your organization to ensure that only those who need access have it.
6. Employee Awareness Training: Conduct regular training sessions to educate employees about the risks associated with cybersecurity threats. Employees should be trained to recognize suspicious emails, unauthorized login attempts, and other signs of potential attacks. They should also understand the importance of verifying requests for sensitive information or financial transactions, especially if they seem unusual or unexpected.
7. Keep Software Updated: Regularly update your software and any related applications to patch security vulnerabilities and ensure that you're using the latest security features.


These suggestions are not meant to be an exhaustive list and do not guarantee safety. They are merely provided as a courtesy to our customers. The information provided on this webpage is for educational purposes only and does not constitute legal or professional advice. It is recommended to consult with a qualified cybersecurity professional or legal advisor for specific guidance on addressing cybersecurity threats in your organization.

Back to Top