Time to Simplify, Simplify, Simplify

Chances are you’ve just finished up your tax return for 2014. If you are like every other American taxpayer, you wonder how it could be any more confusing. There are all kind of exceptions...

Sort & Organize Your Personal Files

Spring is a great time of year to not only clean and organize your closets, but also to organize your personal files. You will need a personal inventory to ensure all your financial records are safe..

Keeping ACH Data Secure

Data security is an important topic for any business, but it is of particular importance to those businesses who utilize electronic transactions through ACH (Automated Clearing House). Recently...

Investment Overview: 1st Quarter 2015

The most recent read on broad US economic growth showed a deceleration in the final quarter of 2014. Real gross domestic product (GDP) -- which measures the value of all goods and services...

Private Banking Team: Meet Katie Thompson

Katie is the most recent addition to Union Bank's Private Banking team, and we're excited to have her on board!

Last Chance to Fund Your 2014 HSA & IRA

If you haven’t maxed out your contributions to your HSAs and/or IRAs for 2014, there is still time to top them off! We’ll help you make sure you’re taking full advantage of these accounts.

March 2015 Investment Update

The most recent read on broad U.S. economic growth showed a deceleration in the final quarter of 2014. Real gross domestic product increased at an annualized rate of 2.2 percent in the fourth...

Ask the Expert: Retirement Rollovers

Do I have to roll my retirement fund into an IRA when I retire? If I do move my retirement dollars to an IRA should I have someone manage my account?

Protect Your Child from Identity Theft

Are you taking advantage of your free credit report each year? Reviewing your credit report can help prevent or quickly mitigate identity theft threats.

Smarter in :90 - Why UBT Wants to Know You

A common misconception about cyber-attackers is that they only use advanced hacking tools to steal information. This is simply not true. The attackers have learned that a successful way to steal...

Pages