CitiBusiness Online

 Home     Contact Us   
Current Clients
Sign On to CitiBusiness Onlinesecurity
Sign On
Beware of fraudulent email
Solutions to Meet Your Needs
Account Management
Information Reporting
Funds Management
Security and Accountability
Commercial Banking
Business Banking
Small Business
Contact Us  
Protect Yourself Online security

Whether you are banking online or simply surfing the Web, learn how you can protect yourself, your computer, your identity and your company's information against these common online security threats:

Report suspicious email, phishing or identity theft

0 As perpetrators of fraud become more sophisticated, CitiBusiness. Online is committed to being more diligent than ever in helping to prevent fraud before it can occur. Thats why we're introducing two-factor authentication, giving our customers even more protection. Learn more about this new level of security today!

Security updates, patches or service packs. Most software providers release fixes on a regular or as needed basis.

Protect Yourself: Sign up for alerts on key provider Web sites, and install patches as soon as they are available.

Anti-virus software. These programs detect viruses that can be delivered by e-mails and other incoming attachments and that spread from computer to computer. Anti-virus software can scan incoming files to look for known viruses, or can flag suspicious behavior from a computer program that might indicate it's been infected.

Protect Yourself: Install anti-virus software on your computer and update it regularly.

Anti-spyware software. This type of software protects your computer from programs that track your Web browsing habits or that can make changes to your computer settings without your knowledge. Most programs detect and remove spyware, as well as scan incoming files to prevent spyware from being installed.

Protect Yourself: Install anti-spyware software on your computer and update it regularly.

Personal firewalls. A software program that monitors communications to and from your computer, a personal firewall allows you to designate what application can connect to the internet. It can alert you when a connection is attempted or can be set to automatically block connectivity.

Protect Yourself: Install a personal firewall on your computer and then use an online testing service to ensure it is working correctly.

Layers of Security. Internet security experts agree that layers of security are the best defense against online threats. As such, it is important to use all the tools available to you. Anti-virus software, anti-spyware software and personal firewalls should all be used in conjunction with one another to provide an enhanced level of protection. In addition, you should regularly check provider Web sites for updates, patches, or service packs to combat against new viruses, spy-ware programs and fraud techniques.

A computer virus is a self-replicating program that spreads by attaching itself to documents or other executable files. Viruses typically spread from computer to computer by e-mail. Once it finds a host, a virus will execute malicious code designed to disrupt or stop a computer from functioning.

A worm, like a virus, self-replicates in order to spread malicious code from computer to computer. While a virus typically depends on someone to send it in an email, once established, worms can create their own emails and send themselves.

A trojan, also known as a Trojan horse, is a program that appears to be legitimate or desirable software but is in fact, a vehicle for malicious code. Trojans are spread as the software they reside in is shared and installed. Once triggered, a Trojan horse can cause loss or theft of data.

Protect Yourself Against Viruses, Worms and Trojans
  • Install anti-virus software and check for updates regularly
  • Download security updates, patches, or service packs from your software provider
  • Configure e-mail accounts and virus protection software to block junk e-mail
  • Do not open e-mails from unknown senders
  • Do not open attachments you are not expecting even if they appear to come from someone you know, and especially if attachments have file extensions such as .exe, .pif or .vbs

Social engineering refers to the act of tricking people into providing confidential information. While many social engineers do use the Internet to obtain information, the practice focuses primarily on taking advantage of human trust as opposed to any vulnerability in a computer's security.

Phishing is a form of social engineering that targets individuals by e-mail, posing as a legitimate business, and asking them to provide information such as User IDs, passwords or credit card information.

Keylogging is a common method for stealing passwords for any number of programs or Web sites. A software program is installed on your computer, without your knowledge, that logs your keystrokes as you type and sends data back to a fraudster - making it easy for them to access personal and financial data.

Spoofing is the practice of setting up a Web site that parodies a legitimate site for the specific purpose of deceiving people into providing confidential information. These sites are typically accessed by an embedded link in an e-mail, and often request User IDs, passwords, or credit card information.

Protect Yourself Against Identity Theft
  • Install anti-spyware software and check for updates regularly
  • Use personal firewalls
  • Keep your User ID and passwords safe - don't share them with anyone and don't write them down
  • Change your password regularly
  • When setting a password, don't use easily guessed phrases like children's or pet's names and try mixing numbers, letters and symbols
  • Don't follow embedded links in e-mails since they can take you to a spoofed site - instead type the trusted web address or use a Web address saved in your Favorites or History to access a site, especially a banking site
  • Leave suspicious Web sites immediately, and never enter sensitive information without first confirming the validity of the site and request
  • Never send sensitive information by e-mail
  • Password protect your computer, and shut down your computer when not in use
For more information please read "Beware of Fraudulent E-mail," which can be accessed from

          DATA THEFT
Similar to identity theft, data theft more specifically targets sensitive financial and personnel information within a corporation. Many of the same techniques for gaining access to information apply here as well, including phishing and keylogging.
Online Banking Security practices and our new two-factor authentication sign-on