Protecting Yourself from Text and Email Phishing

blog-tags
Author Image
by: Beka W., Graphic Designer II
According to a 2015 Verizon Data Breach Investigations Report, more than 23% of people open phishing messages, and 11% open attachments in these messages. Now you may be asking, what is phishing? Phishing is the act of using fraudulent, but official looking, emails, text messages and websites to trick a…

Money Managing Tips for College Freshmen

blog-tags
Author Image
by: Holly W., Digital Marketing Specialist
August has arrived and many high school seniors are eager to head off to college to start the next phase of their life. Although college is an exciting time for students, it requires young people to assume a greater responsibility for managing their own money. While college students might detest…

Saving Money on Back to School Shopping

blog-tags
Author Image
by: Holly W., Digital Marketing Specialist
August is here and that means it’s the start of a brand new school year. Between school supplies, books and clothing your wallet could become your best friend or your worst nightmare. With sales signs constantly taunting us and our children begging us for the must-have school items of the…

Why You Should be Using Remote Deposit Capture

blog-tags
Author Image
by: Benjamin H., Sales Associate, Treasury Management
When I talk to small businesses owners about how they make deposits today, the normal response is “I stand in line at the banking center like everyone else.” Then I ask, “What’s your time worth to you?” As the old saying goes, time is money. And if most of your…

Cybercrime: Protect Yourself and Your Business

blog-tags
Author Image
by: Kara S.
There are two points a manager or owner of a small- or medium-sized business (SMB) should understand: SMB’s are as vulnerable to cyber attacks as large enterprises, if not more. Cybersecurity for SMB’s is not rocket science. Let’s break these down. Explanation of the first item is rather simple: lack…