Online Business Banking
Online Banking allows you to control your business finances with greater accuracy and efficiency than ever before. With just a few clicks you can access balances, transactions and other cash management tasks securely without ever leaving your office.
- View balances and transactions
- View cleared checks and statements
- Transfer funds and pay loans
- ACH origination (credit or debit accounts at other financial institutions)
- Process payroll direct deposits
- Pay bills
- Tax payments
- Wire transfers
- And much more
Small business package (basic retail features and 10 bill pays) $5.95 per month additional bill pays $0.50 each.
Cash Management (full ACH capabilities and unlimited bill pays) $20 per month, $125 set up fee. Your monthly fee could be waived based on your Business Analysis checking account balance through your offsetting earnings credit – ask us how.
Try a demo of our online business banking.
Tips for Online Security at Your Office
If you currently bank online or plan to use electronic services in the future, we recommend you develop a plan and policies for doing so. The following are suggestions from the Small Business Administration:
Here are 9 cyber security tips for small business owners:
1. Use the FCC’s Small Biz Cyber Planner to create a cyber security plan
The Small Business Cyber Planner is valuable for businesses that lack the resources to hire a dedicated staff member to protect themselves from cyber threats. The tool walks users through a series of questions to determine which cyber security strategies should be included in the planning guide, and generates a customized PDF that serves as a cyber-security strategy template.
2. Establish cyber security rules for your employees
Establish rules of behavior describing how to handle and protect personally identifiable information. Clearly detail the penalties for violating cyber security policies.
3. Protect against viruses, spyware, and other malicious code
Install, use, and regularly update antivirus and antispyware software on every computer used in your business. Such software is readily available online from a variety of vendors.
4. Educate employees about safe social media practices
Depending on what your business does, employees might be introducing competitors to sensitive details about your firm’s internal business. Employees should be taught how to post online in a way that does not reveal any trade secrets to the public or competing businesses. This type of safe social networking can help avoid serious risks to your business.
5. Manage and assess risk
Ask yourself, “What do we have to protect? And, what would impact our business the most?” Cyber-criminals often use lesser-protected small businesses as a bridge to attack larger firms with which they have a relationship. This can make unprepared small firms a less attractive business partner in the future, blocking potentially lucrative business deals.
6. Download and install software updates when they are available
All software vendors regularly provide patches and updates to their products to correct security problems and improve functionality. Configure all software to install such updates automatically.
7. Make backup copies of important business data and information
Regularly backup the data on every computer used in your business. Critical data includes word processing documents, spreadsheets, databases, financial files, human resources files, and accounts receivable/payable files. Backup data automatically if possible, or at least weekly.
8. Control physical access to computers and network components
Prevent access or use of business computers by unauthorized individuals. Laptops can be particularly easy targets for theft, so make sure they are stored and locked up when unattended.
9. Secure Wi-Fi networks
If you have a Wi-Fi network for your home business make sure it is secure and hidden. To hide your Wi-Fi network, configure your wireless access point or router so that it does not broadcast the network name, known as the Service Set Identifier (SSID). In addition, make sure that passwords are required for access. It is also critical to change the administrative password that was on the device when it was first purchased.