Cybercrime Security

We all hear about major security breaches with large corporations on the news but many people don’t know that small and medium sized businesses are most often targeted by cyber criminals. Many business owners have a limited understanding of web-based threats and fail to implement necessary protections, while at the same time having far more money in their bank accounts than consumers do, making them an ideal target for cyber criminals. Cyber criminals are coming up with different methods of hacking into online systems every day and it’s incredibly important to stay up to date. Watch “Cybercrime Risk” to learn about phishing, smishing, and malware, and how criminals use these methods.
- ,

How to Mitigate the Risks of Cybercrime

Luckily there are measures you can put into place to reduce the risk of criminals gaining access to your system. This should be viewed as an ongoing task and should include employee education, use of strong passwords, and using reputable security software, among other things. You’ll learn more about it in our video, “How to Mitigate the Risks of Cybercrime.”
- ,

How Bridge Bank Protects Your eBanking Account

Bridge Bank also has behind the scenes measures in place to protect our clients’ accounts. In addition to multi-factor authentication for login, we have implemented “entitlements” which control what features a user can access, what accounts they can access, and the payment limits which may be used. Additionally, there are some optional security measures available. Find out more by watching “How Bridge Bank Protects Your eBanking Account.”
- ,

What to Expect if Your Account is Compromised

If you become aware that your account has been compromised, we will be ready for it. As soon as you notify us we have procedures put in place to lock down your account, investigate your PC or software, and get your accounts up and running securely again. Watch “What to Expect if Your Account is Compromised” to learn more about the process.
- ,

Identity Theft

Warning: Pirates are trying to steal your personal financial information.

Here's the Good News: YOU have the Power to Stop Them

There's a new type of internet piracy called "phishing." It's pronounced "fishing," and that's exactly what these thieves are doing: "fishing" for your personal financial information. What they want are account numbers, passwords, Social Security numbers, and other confidential information that they can use to loot your checking account or run up bills on your credit cards.

In the worst case, you could find yourself a victim of identity theft. With the sensitive information obtained from a successful phishing scam, these thieves can take out loans or obtain credit cards and even driver's licenses in your name. They can do damage to your financial history and personal reputation that can take years to unravel. But if you understand how phishing works and how to protect yourself, you can help stop this crime.

How Phishing Works:

In a typical case, you'll receive an email that appears to come from a reputable company that you recognize and do business with, such as your financial institution. In some cases, the email may appear to come from a government agency, including one of the federal financial institution regulatory agencies.

The email will probably warn you of a serious problem that requires your immediate attention. It may use phrases, such as "Immediate attention required," or "Please contact us immediately about your account." The email will then encourage you to click on a button to go to the institution's website.

In a phishing scam, you could be redirected to a phony website that may look exactly like the real thing. Sometimes, in fact, it may be the company's actual website. In those cases, a pop-up window will quickly appear for the purpose of harvesting your financial information.

In either case, you may be asked to update your account information or to provide information for verification purposes: your Social Security number, your account number, your password, or the information you use to verify your identity when speaking to a real financial institution, such as your mother's maiden name or your place of birth.

If you provide the requested information, you may find yourself the victim of identity theft.

How to Protect Yourself

Never provide your personal information in response to an unsolicited request, whether it is over the phone or over the internet. Emails and internet pages created by phishers may look exactly like the real thing. They may even have a fake padlock icon that ordinarily is used to denote a secure site. If you did not initiate the communication, you should not provide any information.

If you believe the contact may be legitimate, contact the financial institution yourself. You can find phone numbers and websites on the monthly statements you receive from your financial institution, or you can look the company up in a phone book or on the internet. The key is that you should be the one to initiate the contact, using contact information that you have verified yourself.

Never provide your password over the phone or in response to an unsolicited internet request. A financial institution would never ask you to verify your account information online. Thieves armed with this information and your account number can help themselves to your savings.

Review account statements regularly to ensure all charges are correct. If your account statement is late in arriving, call your financial institution to find out why. If your financial institution offers electronic account access, periodically review activity online to catch suspicious activity.

What to Do if You Fall Victim:

Contact your financial institution immediately and alert it to the situation.

Bridge Bank
866.BRDGBNK (or 408.423.8500)
55 Almaden Boulevard
San Jose, CA 95113
security@bridgebank.com

If you have disclosed sensitive information in a phishing attack, you should also contact one of the three major credit bureaus and discuss whether you need to place a fraud alert on your file, which will help prevent thieves from opening a new account in your name. Here is the contact information for each bureau's fraud division:

Equifax
(800) 525-6285
P.O. Box 740250
Atlanta, GA 30374 
 Experian
(888) 397-3742
P.O. Box 1017
Allen, TX 75013
TransUnion
(800) 680-7289
P.O. Box 6790
Fullerton, CA 92634 

Report all suspicious contacts to the Federal Trade Commission through the internet at www.consumer.gov, or by calling 1-877-IDTHEFT.


You Can Fight Identity Theft... Here's How:

  • Never provide personal financial information, including your Social Security number, account numbers or passwords, over the phone or the internet if you did not initiate the contact.
  • Never click on the link provided in an email you believe is fraudulent. It may contain a virus that can contaminate your computer.
  • Do not be intimidated by an email or caller who suggests dire consequences if you do not immediately provide or verify financial information.
  • If you believe the contact is legitimate, go to the company's website by typing in the site address directly or using a page you have previously book marked, instead of a link provided in the email.
  • If you fall victim to an attack, act immediately to protect yourself. Alert your financial institution. Place fraud alerts on your credit files. Monitor your credit files and account statements closely.
  • Report suspicious emails or calls to the Federal Trade Commission through the internet at www.consumer.gov, or by calling 1-877-IDTHEFT.
  • Recent News
    Bridge Bank Accelerates into 2017 with $4 Million Financing to BuyerQuest
    Bridge Bank Reaffirms Commitment to Banking Technology and Innovation Companies
    Bridge Bank Welcomes Accomplished Financial Professional Michael Bachrodt as Renewable Resource Group’s Business Line Manager
  • Recent Insights
    Mature female doing yoga in grass
    How startups can help senior citizens
    Aerial view of people working at table
    Things to know about 'decacorns'
    Two people shaking hands in front of sunset at airport
    Can startups succeed away from Silicon Valley?
  • Get Started