NVB Risk Assessment
Nodaway Valley Bank is committed to helping you put controls in place to help keep your systems and records safe. Complete this short assessment to identify ways to improve your system's security.
Point of Sale Malware
If your business uses Point of Sale software, beware of potential malware that may be compromising your system. The Department of Homeland Security has issued a malware alert, click here to read the full alert on us-cert.gov.
Protect Against Cyber Threats
Security is one of the most important factors in maintaining a sound business. One careless step could cause fraudulent charges, compromised customer information, and more. Protect your business by creating a Cybersecurity Plan which helps mitigate your risk. The Federal Communications Commission (fcc.gov) provides an easy tool to create a custom Cybersecurity Plan and strategy.
FCC Cybersecurity Tip Sheet
Establish basic security practices and policies for employees
Utilize firewall security for your internet connection
Understand that mobile devices can also be susceptible to cyber attacks
Limit employee access to data systems
Read more tips at fcc.gov/general/cyber-security-and-network-reliability
Fraud & Phishing Prevention
Protect yourself against fraudulent emails & other phishing scams by staying up to date with NACHA - the Electronic Payments Association. Their website nacha.org provides valuable information on how to protect your business from falling victim to fraud. Keep up with the latest tips by visiting nacha.org/fraud-phishing-resources.
Awareness about NACHA's practices
How to recognize fraudulent emails
View examples of fraudulent examples
General online & mobile security tips
And much more!
Business Email Scam
Scams are on the rise with fraudulent emails to businesses. These emails use various tactics to trick businesses into thinking a legitimate employee is requesting a wire transfer be initiated for payment. Guardian Analytics, a leader in fraud intelligence, has compiled an article outlining the different tactics. Read the article to understand the potential risk
. Then check out the Best Practices
for businesses to detect an email compromise scam.