Person researching financial education documents.

Client Education


Stay Informed and Secure

At Signature Bank, we understand the importance of safeguarding your sensitive information. That’s why we’re dedicated to sharing helpful insights on common cyber threats and effective strategies to protect yourself. Stay connected with us for the tools and knowledge you need to navigate the digital landscape securely. Together, we can help protect what matters most.
Holiday Scams

Holiday Scams – Fake Online Stores

As the holidays approach, it’s crucial to remain vigilant, as scams often increase during this time. One prevalent threat is fake online stores – also known as lookalike or fraudulent product sites.

Phone Scams

Phone Scams

Discover techniques for spotting red flags and safeguarding against phone scams. Be on the lookout for these red flags: unusual caller ID, scare tactics or threats, asking for personal information, and calling you unexpectedly.

Email Scams

Email Scams

Discover techniques for spotting red flags and safeguarding against email scams. Be on the lookout for these red flags: unusual email address, misspelled words, scare tactics, suspicious URLs, and unexpected attachments.

Text Message Scam

Text Message Scams

Be on the lookout for text message scams and remember these effective ways to identify and avoid them: slow down — think before you act, don’t click links, never send personal information, and delete the message.

Elder Fraud & Tech Support Scams

Elder Fraud & Tech Support Scams

Scammers use a sense of urgency to get you to divulge your personal identifiable information, often even getting you to send money in advance. Be on the lookout for these SCAM warning signs when someone you do not know wants you to act now.

Business Email Compromise

Business Email Compromise (BEC)/Email Account Compromise (EAC)

BEC/EAC is a sophisticated email scam that targets both businesses and individuals who perform legitimate transfer-of-funds requests. A fraudster compromises or impersonates an executive, vendor, or trusted contact’s email account with the aim of obtaining access to sensitive business information or other assets.