In observance of Columbus Day on Monday, October 14th, no wires, or ACH will be transacted on this day. If you have any questions or concerns, please contact your local branch, or call 414-421-8200.

Fraud Prevention Tip! Do question "family and friends" who contact you out of the blue to offer you money or ask for money thru mobile checks, pictures of checks, Cash App, Venmo, etc. 

In today’s connected world, everyone benefits from advanced cyber defense programs. At an individual level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of important data like family photos. Everyone relies on critical infrastructure like power plants, hospitals, and financial service companies. Securing these and other organizations is essential to keeping our society functioning.

Everyone also benefits from the work of cyber threat researchers, like the team of 250 threat researchers at Talos, who investigate new and emerging threats and cyber-attack strategies. They reveal new vulnerabilities, educate the public on the importance of cybersecurity, and strengthen open-source tools. Their work makes the Internet safer for everyone.

Types of Cybersecurity Threats

Phishing:

Phishing is the practice of sending fraudulent emails that resemble emails from reputable sources. The aim is to steal sensitive data like credit card numbers and login information. It’s the most common type of cyber-attack. You can help protect yourself through education or a technology solution that filters malicious emails.

Ransomware:

Ransomware is a type of malicious software. It is designed to extort money by blocking access to files or the computer system until the ransom is paid. Paying the ransom does not guarantee that the files will be recovered or the system restored.

Malware:

Malware is a type of software designed to gain unauthorized access or to cause damage to a computer. 

Social engineering:

Social engineering is a tactic that adversaries use to trick you into revealing sensitive information. They can solicit a monetary payment or gain access to your confidential data. Social engineering can be combined with any of the threats listed above to make you more likely to click on links, download malware, or trust a malicious source.

For more information on how you can protect yourself and loved ones click here