Wilmington Trust
Cybersecurity Protection
Wilmington Trust has protective security measures in place to help protect you from cybercriminals.
We Protect You & Your Organization from Cybercriminals
Wilmington Trust maintains a comprehensive Enterprise Information Security Program that is shared with our Regulators and aligned with an industry standard incorporating five core functions
- Identify: Identify risks to systems, data and assets to prioritize the institution's information security activities
- Protect: Develop and implement safeguards to protect our clients’ information
- Detect: Implement technology to identify anomalies and events
- Respond: Create and utilize activities to limit the impact of a detected cybersecurity event
- Recover: Execute plans to restore and recover from a natural or man-made event
We Employ Multiple Layers of Security & Defense
- Network and location perimeter protection
- Real time continuous monitoring and detection of security incidents
- Vulnerability and penetration testing
- Intrusion detection and prevention systems
Wilmington Trust also develops and follows information security policies and standards to protect our client and corporate information, including our Information Security Awareness Program that helps safeguard our client's informaiton and data. We also continually train and educate our employees to ensure they understand cybersecurity risks, threats, and the latest scams.
Help Protect Yourself or Your Organization from Cybercriminals
You can take steps to protect you and your organization from Cybercriminals seeking money and personal information.
- Spot imposters. Cybercriminals pretend to be someone you trust, like a government official or a company you do business with like your bank or internet service provider. Don’t send money or give out company or personal information in response to an unexpected request — whether it comes as a text, a phone call or an email. If you believe it may be a legitimate request, contact the requestor directly to confirm the request.
- Do online searches. Type a company or product name into your favorite search engine with words like “review”, “complaint” or “scam.” Or search for a phrase that describes your situation, like “IRS call.” You can even search for phone numbers to see if other people have reported them as scams.
- Don’t believe your caller ID. Technology makes it easy for Cybercriminals to fake caller ID information, so the name and number you see aren’t always real. If someone calls asking for money, company or personal information, do not respond. Instead, if you believe it may be a legitimate request, contact the requestor directly to confirm the request.
- Hang up on robocalls. If you answer the phone and hear a recorded sales pitch, hang up. These calls are illegal, and often the products are bogus. Don’t press 1 to speak to a person or to be taken off the list. That could lead to more calls.
- Don’t deposit a check and wire money back. Wilmington Trust is required to make funds available from check deposits within days; however, the availability of funds does not guarantee a check’s authenticity. Therefore, be cautious of any demands requesting urgent or immediate action and always wait an extended period of time before accessing funds from unfamiliar check deposits.
What Should You Do If You or Your Organization is a Victim of a Cybercrime
The national and economic security of our nation depends on the reliability and resiliency of critical infrastructures such as utility companies, transportation/communication systems and financial institutions – like Wilmington Trust.
We all depend on the services provided from these infrastructures on a daily basis, and they are vital to the work we do and the lives we live. Just as these infrastructures are required to have preventative measures and plans to respond to emergencies or disasters, so should you.
We have provided you with information and tips to help you enhance your cybersecurity awareness; however, we all know that systems, software and people aren’t perfect and mistakes and events happen. If you believe your computer or device has been compromised, below are some actions you can take.
Minimize the damage
- If you have been threatened over the internet via email, or social media sites and feel you are in immediate danger, call 911 or your local police
- Log on to another device to change your device and online passwords to all your accounts
- If you believe you or someone you know has been the victim of an Internet crime, report the incident to the Internet Crime Complaint Center (IC3)
- If you suspect that you may be a victim of identity theft or there appears to be fraudulent activity, call us with one of the numbers noted above
- Find additional information on Identity Theft
Clean your device
- Update your virus definition files, backup your critical files, disconnect your device from the internet or Wi-Fi connections and run a manual scan of your entire system
- In the event your anti-virus software cannot correct the problem or your device is inoperable, take it to a reputable electronic repair service
- For smart phones, contact your service provider for support
Remember that the sooner you take action; the sooner others can assist to help minimize the damage.