Skip to main content

Business Security Center

Get it on the App Store
Download the Bank of America App

Before you leave our site, we want you to know your app store has its own privacy practices and level of security which may be different from ours, so please review their policies.

Or we can text a download link directly to your phone

Please enter a valid 10-digit phone number

By providing your mobile number you are consenting to receive a text message. Text message fees may apply from your carrier. Text messages may be transmitted automatically.

Apple, the Apple logo, iPhone, iPad, Apple Watch and Touch ID are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc.

Get it on the App Store
Download the Bank of America App

Before you leave our site, we want you to know your app store has its own privacy practices and level of security which may be different from ours, so please review their policies.

Or we can send you a link by email

Please enter a valid email address

Apple, the Apple logo, iPhone, iPad, Apple Watch and Touch ID are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc.

Get it on Google Play
Download the Bank of America App

Before you leave our site, we want you to know your app store has its own privacy practices and level of security which may be different from ours, so please review their policies.

Or we can text a download link directly to your phone

Please enter a phone number

By providing your mobile number you are consenting to receive a text message. Text message fees may apply from your carrier. Text messages may be transmitted automatically.

Android is a trademark of Google Inc. Samsung is a registered trademark of Samsung Electronics Co., Ltd.

Our mobile app isn't available for all devices

If you don't see an app for your device, you may still be able to access our mobile website by typing bankofamerica.com in your mobile web browser.

Learn more about mobile banking options and supported devices

Get the mobile banking app

Before you leave our site, we want you to know your app store has its own privacy practices and level of security which may be different from ours, so please review their polices.

Continue

We've sent you a download link

We sent an email with the download link to

We sent a text message with the download link to

We couldn't send the link

We're sorry we weren't able to send you the download link. Please try again, or use your mobile device to get the app from its app store.

What you need to know to
protect your business

What you need to know to
protect your business

Together we can identify and prevent fraud events

Your security is our top priority

A routine activity like opening an email or visiting a website can leave your small business vulnerable. Recognizing fraud and scams isn’t always easy, but knowing what to look for can help you or your employees avoid becoming a victim.

Here are some things you can do today to increase your security – and help protect yourself and your business against fraud and scams.

1. Keep your contact information up to date
Why it matters:
We can contact you quickly and limit your account exposure in the event we see suspicious activity.
How to do this:
Sign in to Online Banking to review and update your contact information.
2. Enable extra security features
Why it matters:
Using features such as multifactor authentication and making sure you have the strongest possible password provides you with an extra layer of defense against fraud.
How to do this:
Sign in to Online Banking to review your sign-in settings and update your Passcode.
3. Allow alerts on the Mobile Banking app
Why it matters:
We can contact you quickly in the event we see suspicious activity on your account.
How to do this:
Sign in to the Mobile Banking app, select Alerts from the Menu and follow the instructions. Get the Mobile Banking app layer
4. Control who has access to your accounts
Why it matters:
Account Management gives you the power to grant customized access to your accounts and manage multiple accounts with one Online ID.
5. Establish a cyber awareness program
Why it matters:
Employees are the first line of defense against criminals. Adopting a cyber security training program will help raise awareness and prepare employees to detect potential threats to your organization.
How to do this:
Review How to Build a Cyber Awareness Program (PDF) for things you can do to help protect your company.
6. Create a cyber security program and have an incident response plan
Why it matters:
Businesses continue to be the primary focus for criminals. Businesses that don’t have a proper cyber security strategy in place to help protect from both internal and external fraud are most at risk.
How to do this:
Always monitor your account and transactions. Review Creating a Cyber Response Plan (PDF) for things you can do to help protect your company.

Know the red flags that signal a scam

Scammers target small businesses through a variety of tactics. It’s critical for you and your employees to remain wary of any business communication that strikes you as suspicious or unexpected in any way. Select the scam type from the following list to see a typical message from a scammer and the red flags that should cause you concern.

EMAIL COMPROMISE SCAM

(typical message): “There's been a change in the transfer details for completing your purchase. Please send the funds to the following account.”
Red flags include: You receive an unexpected request to redirect funds.

FAKE INVOICE SCAM

(typical message): “Pay the amount on the enclosed invoice to keep your website up and running.”
Red flags include: The invoice is from an unknown company and appears to be for something critical (the scammer is hoping you’ll be too worried and busy and you’ll pay the invoice immediately).

OVERPAYMENT SCAM

(typical message): “Go ahead and deposit the check and wire the difference to the account number attached.”
Red flags include: You receive an overpayment for an item you’re selling, immediately followed by a request to deposit the check (which turns out to be a bad check) and then send the difference via a wire or gift card.

PHISHING SCAM

(typical message): “Dear employee: Click this link and provide your password. You’ll be prompted to change your password in our system.”
Red flags include: The email is not addressed directly to you, doesn’t carry the company’s usual logo and you’re not mentioned by name.

TECH SUPPORT SCAM

(typical message): “We've detected malware on your computer, let's go ahead and get this fixed for you.”
Red flags include: You receive a request from tech support claiming your computer has malware and requesting payment to fix the defects or access your computer.

TELEMARKETING SCAM

(typical message): “We’d like to offer you and your employees a business coaching opportunity. Wire us a onetime fee and we can set up a date and time.”
Red flags include: You receive a request to send money to a company you’ve never heard of.

UTILITY COMPANY SCAM

(typical message): “Your service is about to be interrupted. Please send gift cards or wire money to this account to keep your service running.”
Red flags include: You’re asked to urgently wire funds or pay a utility bill with gift cards.

Articles & resources

We’ve assembled a series of downloadable and printable PDFs for you and your employees – a library designed to empower you to fight fraud and scams.

Find out why business email compromise can be a vehicle for financial fraud

Protect yourself and your business against malware

What cloud computing is and how it can help protect you

Download our article for ways to protect yourself and what to do if your business is targeted.

Download our tip sheet for ways to protect your devices.

Download our article on cloud computing and learn how to protect yourself from cyber-criminals.

Find out why business email compromise can be a vehicle for financial fraud

Download our article for ways to protect yourself and what to do if your business is targeted.

Protect yourself and your business against malware

Download our tip sheet for ways to protect your devices.

What cloud computing is and how it can help protect you

Download our article on cloud computing and learn how to protect yourself from cyber-criminals.