Choose an account you would like to open below. If you need assistance, feel free to contact us or visit a branch.
Business customers should be aware of Corporate Account Takeover (CATO), a type of business identity theft where cyber thieves steal employee credentials to access the company’s bank account and initiate fraudulent wire and ACH transactions.
Businesses across the U.S. have suffered large financial losses from such electronic crimes. The vast majority of cyber thefts begin with the thieves compromising the computer(s) of the business account holders. To minimize the threat, businesses should establish processes and procedures to protect, detect, and respond to incidents of actual or suspected CATO.
The following guidelines are provided to help Colony Bank’s business customers better protect themselves when utilizing electronic banking activities. These guidelines are provided to increase awareness of the risks and how to better protect your business, detect potential incidents, and respond to recognized incidents. While Colony Bank strongly encourages the implementation of these guidelines, it makes no representations or guarantees that the guidelines are all-inclusive or that they will actually prevent losses as a result of CATO. Colony Bank encourages its business customers to seek the advice of legal counsel, IT staff, and other consultants in implementing safeguards against CATO.
Business customers can help minimize the likelihood of a takeover or other security incident in their online banking activities by incorporating the following activities into regular business operations:
Early detection of a security incident is key to minimizing losses. To help identify any unusual activity, account holders should monitor and reconcile account activity at least daily. In addition, account holders should be alert for red flags related to computer and network anomalies. These signs include, but are not limited to, the following:
Attackers may also attempt to contact account holders to obtain sensitive information or compromise your systems. Examples of these methods include, but are not limited to, the following:
If an incident occurs, having established procedures within an Incident Response Plan can help minimize losses. Such a plan provides guidelines for employees to know what to do and who to contact for help. At a minimum, the plan should include:
Although implementing security controls for banking and customer information is a good business practice, there may be state, federal, or industry regulations or guidelines requiring specific controls or procedures to be in place. Businesses should ensure they are complying with such requirements.
Here are additional resources to consider when developing an information security program:
You will no longer be subject to, or under the protection of the privacy and security policies of Colony.Bank. Colony.Bank is not endorsing or guaranteeing the products, information, or recommendations provided by linked websites. Colony.Bank is not liable for any failure of products or services advertised on linked websites.
Ameriprise.com is not owned or operated by Colony Bank and has its own privacy policy and terms of use. We encourage you to read through the privacy policy (ameriprise.com/privacy) and terms of use (ameriprise.com/legal/website-rules) and familiarize yourself with the ameriprise.com site before opening an account or completing a transaction. Colony Bank is not responsible for the availability or content of information on ameriprise.com and Colony Bank does not represent either Ameriprise Financial, Inc. or you, should you open an account or enter into a transaction.
Investment Products:
Ameriprise Financial Services, LLC is not an FDIC insured bank; FDIC insurance only covers the insolvency of FDIC-insured banks.