Cybersecurity: Are You and Your Business Prepared?

Mike Terriere, Chief Technology Officer, and Devin Cassity, Network and Systems Administrator at Hilltop Bank, address the current threats individuals and businesses face in the world of cybersecurity and what you can do to protect yourself and your business.

Hilltop's Security:

Here at Hilltop Bank, we possess a full-time IT staff dedicated to protecting the bank-- and you-- from outside threats. We implement multiple preventative measures to shield the bank and the information we maintain, by using Firewalls, Intrusion Prevention, Data Loss Prevention, Anti-SPAM, Anti-Phishing, and much more.

Our Online Banking Security:

There are several factors that make Hilltop’s online banking secure, including our “.bank” domain. A “.bank” domain is a more trusted and controlled domain and is much more secure than a “.com” because they are required to meet robust security technologies and practices. Only verified members of the banking industry can register a “.bank” domain ensuring a higher level of security involved within the domain.

Other security software we use in our online banking include:

  • Notifi: allows you to control what automatic alerts you want to be notified on account activity.
  • CardValet: manages debit cards and controls limits and locations; can also turn your card on or off at will.

Current Threats and What They Are:

8 Current Threats to you and your Business’s Cybersecurity:

  1. Phishing Emails: Fraudulent emails purporting to be from a reputable company in order to gain personal information such as passwords, credit card numbers, and more.
  2. Social Engineering: Psychological manipulation of people into performing actions or divulging confidential information.
  3. Software Vulnerabilities: Keep software updated by patching within a 3-day window.
  4. Mobile Devices (cell phones, tablets, smart watches, laptops): Convenient but not secure. Keep your mobile device up-to-date, know what is on your mobile device, and what to do if you lose it.
  5. IoT (Internet of Things): The extension of Internet connectivity into physical devices and everyday objects, i.e. security cameras, baby monitors, vacuum––Roomba, etc.
  6. Human Beings: The weak link. It’s easier to trick people than to hack in.
  7. Malware & Ransomware: Malware is software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid.
  8. Polymorphic Malware: Viruses, worms, bots, etc.

What You Can Do: