Custom Image

At Community Bank of the Bay, your security is our top priority. That's why we're committed to providing you resources to help keep your information safe online.

Cybersecurity threats have been on the rise since the advent of the Internet. Staying safe is as simple as educating yourself on different types of threatening malware and using precaution when performing activities on your computer.

Definitions to Know


Cookies are usually small text files, given ID tags, which are stored on your computer's browser directory or program data subfolders. Cookies are created when you use your browser to visit a website that uses cookies to keep track of your movements within the site. They help you resume where you left off, remember your registered login, theme selection, preferences, and other customization functions. The website stores a corresponding file (with same ID tag) to the one they set in your browser and in this file they can track and keep information on your movements within the site and any information you may have voluntarily given while visiting the website, such as an email address.


In very basic terms, encryption is a way to send a message in code. The only person who can decode the message is the person with the correct key; to anyone else, the message looks like a random series of letters, numbers, and characters.Encryption is especially important if you are trying to send sensitive information that other people should not be able to access. Because email messages are sent over the Internet and might be intercepted by an attacker, it is important to add an additional layer of security to sensitive information.

Key Logging

The use of a computer program to record every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.

Non-public Information

Includes account number, tax ID number, driver's license number, date of birth, mother's maiden name, financials, tax returns, and your signature.


Pop-ups are regularly used by criminals to spread malicious software. To avoid accidental clicks on or within pop-ups, it's best to prevent them from appearing in the first place by enabling a pop-up blocker.

Tips to Protect Yourself

  • Always use antivirus software and a firewall.
  • Enable pop-up blockers.
  • Clear cookies from your browser.
  • Always back up the content on your computer. If you back up, verify, and maintain offline copies of your personal and application data, ransomware scams will have limited impact on you. If you are targeted, instead of worrying about paying a ransom to get your data back, you can simply have your system wiped clean and then reload your files.
  • Be skeptical. Don't click on any emails or attachments you don't recognize, and avoid suspicious websites altogether.
  • Refrain from setting up shares with access set to "everyone" – this is one of the ways ransomware spreads beyond the initial infection.
  • Change passwords often, especially for online banking.
  • Always distrust an email that includes a password. Always call the sender to verify. Never respond to the email until the verification is done.
  • Do not include non-public information in emails.
  • Be aware of small changes in e-mail addresses that mimic legitimate e-mail addresses.

For Business:

  • Question any changes to wire transfer instructions by contacting the associated parties through a known avenue.
  • Have a dual step process in place for wire transfers. This can include verbal communication using a telephone number known by both parties.
  • Know your customer. Be aware of your client's typical wire transfer activity and question any variations.

What Happens if Your Personal Information is Stolen?

If you suspect your identity has been stolen:

  • Call your bank and credit card issuers immediately so they can start working on closing your accounts and clearing your name.
  • File a police report and call the fraud unit of three credit-reporting companies. The fraud unit numbers are:
  • TransUnion (800) 680-7289
  • Experian (888) 397-3742
  • Equifax (800) 525-6285
  • Consider placing a victim statement in your credit report.
  • Make sure to maintain a log of all the contacts you make with authorities regarding the matter. Write down names, titles, and phone numbers in case you need to re-contact them or refer to them in future correspondence.
  • For more advice, contact the FTC's ID Theft Consumer Response Center at 1-877-ID THEFT (1-877-438-4338) or

Report online:

Most Common Threats

Ransomeware (also known as CTB Locker or CryptoWall)

DYRE Banking Malware


DoS Attack (Denial-of-service)

Business Email Compromise (BEC)

Email Account Compromise (EAC)

Helpful Resources

Handling Destructive Malware

Best Practices for Victim Reponse and Reporting of Cyber Incidents

For Business:

Stop. Think. Connect. Resource Guide

United States Computer Emergency Readiness Team (US-CERT)

Security Tips