Enable Accessibility
×
Close
Personal Online Banking
If you need assistance, please contact Personal Client Services at 855.762.7500 or view the FAQs
e‑Treasury Business Banking
Log in
Safeguarding your online banking sessions is our top priority. For information about how you can help protect your online banking sessions, or if you need additional assistance with your e-Treasury log-in, please contact Client Support at [email protected] or 855.274.2800.

Download our e-Treasury Secure Browser

Business Online Banking
If you need assistance, please contact Client Services at [email protected] or 855.274.2800.
e‑Treasury
Log in
Safeguarding your online banking sessions is our top priority. For information about how you can help protect your online banking sessions, or if you need additional assistance with your e-Treasury log-in, please contact TM Service at [email protected] or 212.575.8020.


Download our e-Treasury Secure Browser

Download the Sterling e-Treasury Token Client


Business Online Banking
If you need assistance, please contact Client Services at [email protected] or 855.274.2800

For optimal viewing experience, please use a supported browser such as Chrome or Edge

Download Edge Download Chrome

Data Protection on the Go

If you or your employees are touching base on projects after hours or traveling regularly, it’s likely that you’re conducting work activities on personal cellphones and placing valuable data at risk. Consider these strategic steps you can take to protect your business’s data.

DECIDE DEVICE VS. DATA: Ultimately, you can protect information by protecting the device it’s stored on, or the data itself, or some combination of the two. You’ll want to choose if your employees have the option to use personal devices for work or if their activities are to be limited to devices owned by the company.

DEFINE POLICIES AND PROTECTIONS: Based on your decision above, provide a clear outline of your expectations and determine the appropriate protective measures that need to be taken. These might include two-step password authentication for important accounts, tracking procedures for stolen devices, and required antivirus and anti-spyware programs.

Related Resources

Commercial BankingProducts
Payroll Services
Commercial BankingWhite Papers
The New Normal: Law Firms And Credit in a Period of Financial Uncertainty
The New Normal: Law Firms And Credit in a Period of Financial Uncertainty Fill out the form to get this free, 7 page white paper. Even under the best of economic conditions, well-managed law firms need a smart credit strategy—optimally, one that deploys a tactical mix of short- and long-term borrowing to help them maintain […]
Commercial BankingWhite Papers
Virtual Account Management: A Smart Solution for the Next Generation of Escrow Processing
Virtual Account Management: A Smart Solution for the Next Generation of Escrow Processing Fill out the form to get this free white paper. Any business that uses escrow accounts knows the challenges that come along with managing a large number of them. While they can sometimes be onerous to set up and administer, being able […]
Connect With Us
Learn more about Webster products, services and the communities we serve.
We’d love your feedback