• View Our Locations.
  • How to Contact Us.

Forward Bank

the Hangout

Keep up with Forward Bank and other community news in the Hangout!

5 Ways to Battle Business Email Compromise

January 3, 2023

Business email compromise, or BEC, is an advanced phishing scam that impersonates people, organizations, or entities that the victim knows. Learn how to recognize and protect yourself from potential threats.

Continue Reading 5 Ways to Battle Business Email Compromise

mature businessman sitting at desk looking at computer

Two-Factor Authentication: Why Is It Important?

August 18, 2020

One of the most crucial and commonplace ways to protect your business's secrets and preserve your IT infrastructure is incorporating two-factor authentication into how you and your employees access email, data, company websites, and other Internet or cloud-based resources.

Continue Reading Two-Factor Authentication: Why Is It Important?

digital cyber security background concept

Technology Insurance vs. Cyber Security Coverage

October 14, 2019

Cyber crimes, computer crashes, and software malfunctions are just a few of the technological risks that modern companies now face. Since technological incidents can cost a business anything from a few minutes of inconvenience to millions of dollars, it’s essential for companies to have appropriate insurance coverage.

Continue Reading Technology Insurance vs. Cyber Security Coverage

family loading up moving truck with boxes

Hey, That's My Stuff! How to Avoid Mover Scams

July 3, 2019

4,100 consumers filed moving fraud complaints in 2017, according to the Federal Motor Carrier Safety Administration. How can you avoid negative experiences? Be aware of common scams, and take steps to protect yourself from these fraudulent activities.

Continue Reading Hey, That's My Stuff! How to Avoid Mover Scams

old computer and keyboard sitting in blue recycling bin

Correct Way to Dispose of Old Computers

October 24, 2018

Getting rid of your old computer? You can ensure its hard drive doesn't become a treasure chest for identity thieves. Use a program that overwrites or wipes the hard drive many times. Or remove the hard drive, and physically destroy it.

Continue Reading Correct Way to Dispose of Old Computers