post featured image

5 tips for protecting your business from account fraud

Share this Story

Corporate account takeover is a type of fraud where thieves gain access to a business’ finances to make unauthorized transactions, including transferring funds from the company, creating and adding new fake employees to payroll, and stealing sensitive customer information that may not be recoverable. Choice Bank recommends following these tips to keep your business safe.

  • Educate your employees. You and your employees are the first line of defense against corporate account takeover. A strong security program paired with employee education about the warning signs, safe practices, and responses to a suspected takeover is essential to protecting your company and customers.
  • Protect your online environment. It is important to protect your cyber environment just as you would your cash and physical location. Do not use unprotected internet connections. Encrypt sensitive data and keep updated virus protections on your computer. Use complex passwords and change them periodically.
  • Partner with your bank to prevent unauthorized transactions. Talk to your banker about programs that safeguard you from unauthorized transactions. Positive Pay and other services offer call backs, device authentication, multi-person approval processes, and batch limits to help protect you from fraud.
  • Pay attention to suspicious activity and react quickly. Look out for unexplained account or network activity and remove any systems that may have been compromised. Keep records of what happened.
  • Understand your responsibilities and liabilities. The account agreement with your bank will detail what commercially reasonable security measures are required in your business. It is critical that you understand and implement the security safeguards in the agreement. If you don’t you could be liable for losses resulting from a takeover. Talk to your banker if you have any questions about your responsibilities.

For more cybersecurity tips and resources check out our Cyber Security Resources page.