Online Banking Risks efraud: Hands off my Account!

Size: px
Start display at page:

Download "Online Banking Risks efraud: Hands off my Account!"

Transcription

1 Online Banking Risks efraud: Hands off my Account! 1 Assault on Authentication Online Banking Fraud Significant increase in account compromises via online banking systems Business accounts are primary targets More money to steal Often associated with the money mule scam Consumer accounts Credit union accounts at corporate credit unions Cyber thieves use ACH or wire feature to transfer funds to accounts at other institutions Source: Financial Services Information Sharing and Analysis Center (FS-ISAC) at 2 Assault on Authentication Phishing Starts with a phishing attack Spear phishing Targets select group of employees at the same company Phishing s sent to select employees at a company Whale phishing Targets a company s top executives Malicious software (malware) User s computer infected with Banking Trojan Open infected attachment Visit infected web site Referred to as drive-by-download Captures online banking login credentials 3 1

2 Assault on Authentication Man-in-the-Browser Attacks - Zeus User s web browser infected with Trojan (e.g., Zeus) Toolkit feature allows cyber thieves to target specific online banking web sites Trojan awakens when user visits a targeted online banking site Cyber thief piggybacks on the user s online banking session Modifies actions of user in real-time Transaction entered by user is modified by Trojan Dollar amount of transaction and destination account are changed without user s knowledge Can work independently of user Can login to online banking system using user s Internet connection Easily defeats the most common two-factor t authentication method offered by credit unions computer recognition via cookie and answers to challenge questions 4 Money Mule Scam Man-in-the-Browser Attacks - Zeus User logs into online banking system. Trojan wakes up when targeted online banking website(s) visited. Cybercook Password stealing Trojan sent as attachment or link to infected website Mules withdraw money and wire to cybercrooks User enters transfers ACH or wires. MITB overwrites user s transaction changing dollar amounts and destination accounts. Funds are sent to the money mules 5 Man-in-the-Browser Attack Overwrites User s Transaction 6 2

3 Assault on Authentication In the News Articles from Article Date PC Invader Costs KY County $415,000 July 2009 Cyber Thieves Steal $447,000 from Wrecking Firm September 2009 Cyber Crooks Target Public & Private Schools September 2009 FBI Investigating Theft of $500,000 from NY School District January 2010 Cyber Crooks Cooked the Books at Florida Library January 2010 Hackers Steal $150,000 from Michigan Insurance Firm February 2010 IT Firm Loses $100,000 to Online Bank Fraud February 2010 NY Firm Faces Bankruptcy from $164,000 E-Banking Loss February 2010 Online Thieves take $205,000 Bite out of Missouri Dental Practice March 2010 Computer Crooks Steal $100,000 from Illinois Town April 2010 E-Banking Bandits Stole $465,000 from California Escrow Firm June 2010 Crooks Steal $600,000 from Catholic Diocese August 2010 Hackers Steal $600,000 from Brigantine, NJ October 2010 Sold a Lemon in Internet Banking (car dealer loses $63K) February 2011 FBI Investigating Cyber Theft of $139,000 from Pittsford, NY June 2011 ebanking Theft Costs Town of Eliot, ME $28K July 2011 ethieves Steal $217K from Arena Firm August Online Banking for Business Members More credit unions are offering online banking for businesses Fee based service Business online banking Bill pay ACH High Risk Wire transfers Transactions Increases risk to credit unions Businesses carry higher deposit account balances which means more money to steal Business line-of-credit loans 8 Loss Scenario Phishing Credit union members phished Provided account numbers and online banking passwords Multiple ACH transactions using account-toaccount transfer service (A2A) sending funds to other financial institutions Initially, all accounts set-up on online banking can use A2A feature Hackers activated A2A by clicking on the I agree button to the A2A agreement Large dollar transactions allowed Credit union now restricts A2A feature to members who enroll Members must qualify for A2A Implemented monetary and frequency limits 9 3

4 Loss Scenario Bill Payer Business member s account set-up for online banking by fraudster through credit union web site Similar losses involved setting up member s account on online banking based on phone call from fraudster Weak attempt to authenticate the member Fraudster activated bill payer Access granted simply py by clicking the I agree button to bill pay agreement/disclosure Weak or no attempt to authenticate the member No controls in place to validate new payees Inadequate monetary limitations Large dollar bill pay transfers to accounts at other financial institutions Loss exceeded $600, Loss Scenario Banking Trojan Member s computer infected with banking Trojan Fraudster obtains account number, username, and online banking password Challenge/security questions when member s account is accessed from a different computer Fraudster had the answers to challenge/security questions using the banking Trojan Fraudster used bill payer to move funds out of the account Member never used bill pay Fraudster activated bill pay simply by clicking the I agree button to bill pay agreement/disclosure No controls to validate new payees 11 Loss Scenario 3 rd Party EFT System Attack Banking Trojan captured credit union employee s username and password for corporate credit union EFT system Corporate account accessed from different IP address Fraudster successfully answered challenge questions Over 100 ACH credits entered into system over 2 day period Loss exceeded $1 million 12 4

5 Authentication Options Something you know Password Challenge questions Something you have IP Address (pc recognition) USB token Smart card Password-generating token Something you are Biometrics MITB Attacks have rendered what was once considered strong multifactor authentication ineffective 13 Online Banking Credit Union Loss Controls New members should not automatically be set up on online banking and audio response systems May violate Reg E Online banking passwords/audio response PINs are considered an access device under Reg E Cannot issue access device without a request from the member Adopt strong authentication measure to verify identity of members who enroll for online banking via credit union s web site Implement strong online banking password controls Grant transaction capabilities only upon request Implement reasonable dollar and frequency limits Lets not make it easy for fraudsters 14 Online Banking Controls Password Security Reduce the risk of guessing passwords Don t issue in recognizable pattern Last 4 digits of SSN Birth date System generated random passwords 7 to 9 characters long Case sensitive Alphanumeric Use special characters # $ &) Mail to member in PIN mailer using address of record Make sure address has not been changed in last 30 days (encrypted) to member using address provided at account opening Make sure address has not been changed in last 30 days 15 5

6 Online Banking Controls Password Resets Don t reset password based on phone request under any circumstances Fraudsters have too much information Data mining techniques One of the easiest ways to take over member accounts Generate another random password Mail to member in confidential mailer using address of record (encrypted) to member using address provided at account opening Make sure mailing address/ address have not been changed in last 30 days 16 Online Banking Payment Services Don t allow immediate access to payment services requested Authenticate members requesting access to online banking payment service bill pay, ACH and wires Implement an enrollment process Send member using address provided at account opening for confirmation Challenge questions Implement monetary and frequency limitations for all payment services offered on online banking Failure to do so increases risk of large losses Bill pay Confirm new payees with member Send to member using address provided at account opening Fraud monitoring system Access behavior Transaction monitoring Implement out-of-band transaction ti verification for large dollar transfers 17 Loss Controls 3 rd Party EFT Systems Use strongest form of authentication offered by vendor Usernames, passwords, challenge-response questions are being compromised Token device IP address restriction Restricting credit union s IP address is not foolproof as IP addresses can be spoofed If offered, restrict days and hours to access ACH and wire systems Dual control requirements Data entry vs. verification/authorization Establish monetary limits Validation & confirmation process for transfers exceeding a specific dollar amount Restrict credit union computer used to access third party EFT system Dedicate for this purpose No personal access Prohibit web surfing Use bootable operating system Stored on external media like a flash drive Software program Do not allow telecommuters to access EFT system using home computer 18 6

7 FFIEC s Updated Authentication Guidance The Federal Financial Institutions Examination Council (FFIEC) issued updated authentication guidance on June 28, 2011 Reinforces and stresses the importance of performing periodic risk assessments Adjust authentication controls as appropriate Financial institutions must review and update risk assessments To reflect changes in the threat environment; Prior to implementing a new electronic service; or At least every 12 months Multifactor authentication for high risk transactions Implement layered security controls Multiple controls implemented at various points in the transaction process If one control is compromised, there are others in place to detect and prevent fraudulent transactions Examiners will start reviewing online banking controls under the updated guidance starting in January FFIEC Updated Authentication Guidance Types of Layered Security Controls Fraud monitoring system to detect and effectively respond to suspicious transactions Out-of-band authentication Out-of-band transaction verification Monetary and frequency limits Techniques to limit the use of the account such as ACH debit blocks Restrictions on the days and hours of access Internet Protocol (IP) reputation-based tools to block connection to online banking servers from IP addresses known or suspected to be associated with fraudulent activities Enhanced controls over account maintenance changes initiated by customers through the online banking channel or through the call center Enhanced customer education 20 FFIEC Updated Authentication Guidance FFIEC s Minimum Expectations for Layered Security Controls Fraud monitoring system Enhanced administrative functions for business accounts The ability to set-up multiple users and assign specific levels of authority to each user; The ability to set-up monetary limitations for each user who is authorized to initiate payments and transfers initiated through bill pay, ACH, and wires; The ability to establish dual control requirements for initiating payments and transfers initiated through bill pay, ACH and wires; The ability for the administrator to receive activity reports from transaction logs for reporting purposes; and The ability for the administrator to receive account maintenance reports to assess the validity of any maintenance changes. 21 7

8 Online Banking for Business Members Offer strong multifactor authentication method due to the increased risk Not just passwords and challenge questions Out-of-band authentication Allow businesses to set-up multiple users Ability to assign specific levels of authority to each user Allows businesses to set-up internal controls Offer dual control capability for transfers Prevents one employee from entering and approving transfers Fraud monitoring solution User access behavior Individual transactions Out-of-band transaction verification Large dollar transfers 22 Mobile Banking (Who s in Your Mobile Wallet?) 23 Mobile Banking - Risks Same risks as online banking with a personal computer Phishing, smishing and vishing Viruses Malware such as Trojan keyloggers Lost handsets SMS text messages not encrypted Applications infected with viruses/malware 24 8

9 Mobile Banking Three Platforms SMS (Short Message Service) text messages WAP (Wireless Access Protocol) / Browser based web enabled mobile phone Downloading a dedicated application to cell phone 25 Mobile Banking SMS Short Message Service Uses popular text-messaging standard Used mainly for checking account balances No guarantee that the message sent will be received Least secure method of mobile banking Messages sent in clear text format No end-to-end protection (messages not encrypted) Should not be used for transfers to 3 rd parties Text messages should not contain account numbers or other sensitive information 26 Mobile Banking WAP Wireless Access Protocol Uses similar concept as online banking via personal computers Login credentials stored on device is a concern 27 9

10 Mobile Banking Downloadable Applications Requires user to download application (app) May cause the greatest risk Google s Android Market plagued by fraudulent apps Discovered in December 2009 Members may download free apps containing malware Risk mitigation Require members to only download signed applications, or Require members to download application from a trusted source, such as credit union s website 28 Mobile Banking Best Practices Credit Unions Due diligence in selecting mobile banking platform and vendor Require secure socket layer 128 bit encryption Download online banking applications from trusted sources Out-of-band authentication Out-of-band transaction verification Implement fraud monitoring Monitor user access behavior Monitor individual transactions Don t allow new payees to be added through mobile banking channel Require strong passwords Don t allow members to change password via mobile device 29 Mobile Banking Best Practices - Members Password protect the mobile device Report lost/stolen mobile devices immediately to the carrier Carrier will deactivate phone Frequently delete messages received from financial institutions Do not modify device Important security features may be disabled Device may become susceptible to a virus or Trojan Install mobile security software All the big vendors offer antivirus solutions for mobile devices Download apps only from reputable sites Require members to download required applications from the credit union s website Monitor accounts on regular basis 30 10

11 Questions & Answers Ken Otsuka, CPA Senior Consultant - Risk Management CUNA Mutual Group kenneth.otsuka@cunamutual.com RM-EFRAUD-1010-(0411) 31 Disclaimer This presentation was created by the CUNA Mutual Group based on our experience in the credit union and insurance market. It is intended to be used only as a guide, not as legal advice. Any examples provided have been simplified to give you an overview of the importance of selecting appropriate coverage limits, insuring-to-value and implementing loss prevention techniques. No coverage is provided by this publication, nor does it replace any provisions of any insurance policy or bond. Please read the actual policy for specific coverage, terms, conditions, and exclusions. For general information, please contact our company Sales Executive. The Credit Union Bond is underwritten by CUMIS Insurance Society, Inc., a member of the CUNA Mutual Group. Credit Union Loss Scenarios - Case Studies These claim examples do not make any representations that coverage does or does not exist for any particular claim or loss, or type of claim or loss, under any policy. Whether or not coverage exists for any particular claim or loss under any policy depends on the facts and circumstances involved in the claim or loss and all applicable policy language

Online Account Takeover. Roger Nettie

Online Account Takeover. Roger Nettie Online Account Takeover Roger Nettie CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited CUNA Mutual Group 2013 Session Outline Types of attacks Movement of funds Consumer

More information

Account-to-Account Transfer Services Risk

Account-to-Account Transfer Services Risk Account-to-Account Transfer Services Risk This white paper is part of the Risk Management White Paper Series, which CUNA Mutual Group provides exclusively to its Bond policyholders. TABLE OF CONTENTS Table

More information

Electronic Fraud Awareness Advisory

Electronic Fraud Awareness Advisory Electronic Fraud Awareness Advisory Indiana Bankers Association Fraud Awareness Task Force February, 2012 Electronic Fraud Awareness Advisory Purpose/Summary The Indiana Bankers Association (IBA) was involved

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

Internet Banking Authentication Guidance is Out

Internet Banking Authentication Guidance is Out Brace Yourself: Updated d FFIEC Internet Banking Authentication Guidance is Out October 13, 2011 Paul Rainbow, Manager David Dyk, Manager 1 The material appearing in this presentation is for informational

More information

E-Banking Regulatory Update

E-Banking Regulatory Update E-Banking Regulatory Update Hal R. Paretchan, CISA, CISSP, CFE Information Technology Specialist Federal Reserve Bank of Boston Supervision, Regulation & Credit (617) 973-5971 hal.paretchan@bos.frb.org

More information

Supplement to Authentication in an Internet Banking Environment

Supplement to Authentication in an Internet Banking Environment Federal Financial Institutions Examination Council 3501 Fairfax Drive Room B7081a Arlington, VA 22226-3550 (703) 516-5588 FAX (703) 562-6446 http://www.ffiec.gov Purpose Supplement to Authentication in

More information

FFIEC CONSUMER GUIDANCE

FFIEC CONSUMER GUIDANCE FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their

More information

Here are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online.

Here are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online. Here are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online. FFIEC BUSINESS ACCOUNT GUIDANCE New financial standards will assist credit

More information

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover Sound Business Practices for Businesses to Mitigate Corporate Account Takeover This white paper provides sound business practices for companies to implement to safeguard against Corporate Account Takeover.

More information

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS $ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security

More information

Data Breaches and Cyber Risks

Data Breaches and Cyber Risks Data Breaches and Cyber Risks Carolinas Credit Union League Leadership Conference Presented by: Ken Otsuka Business Protection Risk Management CUNA Mutual Group CUNA Mutual Group Proprietary Reproduction,

More information

Presented by: Mike Morris and Jim Rumph

Presented by: Mike Morris and Jim Rumph Presented by: Mike Morris and Jim Rumph Introduction MICHAEL MORRIS, CISA Systems Partner JIM RUMPH, CISA Systems Manager Objectives To understand how layered security assists in securing your network

More information

FFIEC BUSINESS ACCOUNT GUIDANCE

FFIEC BUSINESS ACCOUNT GUIDANCE FFIEC BUSINESS ACCOUNT GUIDANCE New financial standards will assist credit unions and business account holders to make online banking safer and more secure from account hijacking and unauthorized funds

More information

Preventing Corporate Account Takeover Fraud

Preventing Corporate Account Takeover Fraud Preventing Corporate Account Takeover Fraud Joe Potuzak Senior Vice President Payment Solutions Risk Manager Member FDIC 1 About Our Speaker Joe Potuzak is the Risk Manager for BB&T s Payment Solutions

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

Security Bank of California Internet Banking Security Awareness

Security Bank of California Internet Banking Security Awareness Security Bank of California Internet Banking Security Awareness INTRODUCTION Fraudsters are using increasingly sophisticated and malicious techniques to thwart existing authentication controls and gain

More information

FFIEC Supplemental Guidance to Authentication in an Internet Banking Environment. Robert Farmer Senior Technology Compliance Manager

FFIEC Supplemental Guidance to Authentication in an Internet Banking Environment. Robert Farmer Senior Technology Compliance Manager FFIEC Supplemental Guidance to Authentication in an Robert Farmer Senior Technology Compliance Manager 1 888 250 4400 Effective Date The FFIEC Supplement to Authentication in an was issued on June 28,

More information

Business ebanking Fraud Prevention Best Practices

Business ebanking Fraud Prevention Best Practices Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special

More information

ON-LINE BANKING, BILL PAYER and MOBILE BANKING Terms and Conditions Effective 5/14/12

ON-LINE BANKING, BILL PAYER and MOBILE BANKING Terms and Conditions Effective 5/14/12 ON-LINE BANKING, BILL PAYER and MOBILE BANKING Terms and Conditions Effective 5/14/12 By proceeding, you acknowledge that you have already read and agreed to the Online Banking agreement and disclosures.

More information

Corporate Account Take Over (CATO) Guide

Corporate Account Take Over (CATO) Guide Corporate Account Take Over (CATO) Guide This guide was created to increase our customers awareness of the potential risks and threats that are associated with Internet and electronic- based services,

More information

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Business Internet Banking / Cash Management Fraud Prevention Best Practices Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization

More information

How To Protect Your Online Banking From Fraud

How To Protect Your Online Banking From Fraud DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction

More information

Reliance Bank Fraud Prevention Best Practices

Reliance Bank Fraud Prevention Best Practices Reliance Bank Fraud Prevention Best Practices May 2013 User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters and numbers.

More information

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank Fraud Detection and Prevention Timothy P. Minahan Vice President Government Banking TD Bank Prevention vs. Detection Prevention controls are designed to keep fraud from occurring Detection controls are

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot

More information

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP White Paper FFIEC Authentication Compliance Using SecureAuth IdP September 2015 Introduction Financial institutions today face an important challenge: They need to comply with guidelines established by

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Payment Fraud and Risk Management

Payment Fraud and Risk Management Payment Fraud and Risk Management Act Today! 1. Help protect your computer against viruses and spyware by using anti-virus and anti-spyware software and automatic updates. Scan your computer regularly

More information

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only. The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only. Before acting on any ideas presented in this session;

More information

THE HOME LOAN SAVINGS BANK. Corporate Account Takeover & Information Security Awareness

THE HOME LOAN SAVINGS BANK. Corporate Account Takeover & Information Security Awareness THE HOME LOAN SAVINGS BANK Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is

More information

Remote Deposit Quick Start Guide

Remote Deposit Quick Start Guide Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you

More information

ACH AND WIRE FRAUD LOSSES

ACH AND WIRE FRAUD LOSSES ACH AND WIRE FRAUD LOSSES Financial Institution Technology Funnel Matthew G. Brenner Date: September 26, 2013 Orlando, Florida www.lowndes-law.com What We Will Cover Why is this important? Who does this

More information

Corporate Account Takeover & Information Security Awareness

Corporate Account Takeover & Information Security Awareness Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is for information purposes

More information

The Key to Secure Online Financial Transactions

The Key to Secure Online Financial Transactions Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on

More information

Corporate Account Takeover & Information Security Awareness. Customer Training

Corporate Account Takeover & Information Security Awareness. Customer Training Corporate Account Takeover & Information Security Awareness Customer Training No computer system can provide absolute security under all conditions. NO SECURITY MEASURE OR LIST OF SECURITY MEASURES CAN

More information

Fraud Prevention Tips

Fraud Prevention Tips Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back

More information

Online Cash Management Security: Beyond the User Login

Online Cash Management Security: Beyond the User Login Online Cash Management Security: Beyond the User Login Sonya Crites, CTP, SunTrust Anita Stevenson-Patterson, CTP, Manheim February 28, 2008 Agenda Industry Trends Government Regulations Payment Fraud

More information

Transforming the Customer Experience When Fraud Attacks

Transforming the Customer Experience When Fraud Attacks Transforming the Customer Experience When Fraud Attacks About the Presenters Mike Young, VP, Product Team, Everbank Manages consumers and business banking products, as well as online and mobile banking

More information

ecommercial SAT ecommercial Security Awareness Training Version 3.0

ecommercial SAT ecommercial Security Awareness Training Version 3.0 ecommercial SAT ecommercial Security Awareness Training Version 3.0 Welcome The goal of this training course is to provide you with the information needed to assist in keeping your online banking account

More information

Data Breaches and Cyber Risks

Data Breaches and Cyber Risks Data Breaches and Cyber Risks MD/DC Credit Union Association 2015 Volunteer Leadership Conference Presented by: Ken Otsuka Business Protection Risk Management CUNA Mutual Group CUNA Mutual Group Proprietary

More information

How Do I Log Into Mobile Banking?

How Do I Log Into Mobile Banking? 1 How Do I Log Into Mobile Banking? In order to use any of Connex Mobile Banking service, you must register for Online Banking via a computer and browser. This is necessary to set-up all security settings

More information

ACI Response to FFIEC Guidance

ACI Response to FFIEC Guidance ACI Response to FFIEC Guidance Version 1 July 2011 Table of contents Introduction 3 FFIEC Supervisory Expectations 4 ACI Online Banking Fraud Management 8 Online Banking Fraud Detection and Prevention

More information

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

Securing Online Payments in ACH Client and Remote Deposit Express

Securing Online Payments in ACH Client and Remote Deposit Express Securing Online Payments in ACH Client and Remote Deposit Express sales@profitstars.com 877.827.7101 Contents Overview 3 Purpose 3 Customer/Member Education 4 Threats 4 The Transaction Process 5 Layered

More information

Online security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat.

Online security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat. Defeating cybercriminals Protecting online banking clients in a rapidly evolving online environment The threat As the pace of technological change accelerates, so does the resourcefulness and ingenuity

More information

Entrust IdentityGuard

Entrust IdentityGuard +1-888-437-9783 sales@identisys.com IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

Online Banking Fraud Prevention Recommendations and Best Practices

Online Banking Fraud Prevention Recommendations and Best Practices Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know

More information

Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT

Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection Foreword The consumerization

More information

MOBILE BANKING USER GUIDE

MOBILE BANKING USER GUIDE MOBILE BANKING USER GUIDE CentricBank.com DrCentricBank.com 717.657.7727 Centric Bank does not currently charge a fee for Mobile Banking. However, your mobile phone provider may charge data usage fees

More information

Two Factor Authentication. Software Version (SV) 1.0

Two Factor Authentication. Software Version (SV) 1.0 Two Factor Authentication Software Version (SV) 1.0 Property of: Worldwide Interactive Services, Inc. 5025 South Orange Avenue Orlando, FL 32809 The data contained in this documentation is PROPRIETARY

More information

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers. Employee Security Awareness Survey Trenton Bond trent.bond@gmail.com Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is

More information

CYBERCRIME: What your Bank should be doing to Protect your Business. David Pollino Senior Vice President Fraud Prevention Officer

CYBERCRIME: What your Bank should be doing to Protect your Business. David Pollino Senior Vice President Fraud Prevention Officer CYBERCRIME: What your Bank should be doing to Protect your Business David Pollino Senior Vice President Fraud Prevention Officer Agenda Changing Landscape Case of Efficient Services Escrow Group Six key

More information

Are All High-Risk Transactions Created Equal?

Are All High-Risk Transactions Created Equal? Are All High-Risk Transactions Created Equal? How to Minimize FFIEC Exam Pain 1 Lee Wetherington, AAP Director of Strategic Insight ProfitStars @leewetherington Agenda New Supplement to FFIEC Guidance

More information

Business Online Banking & Bill Pay Guide to Getting Started

Business Online Banking & Bill Pay Guide to Getting Started Business Online Banking & Bill Pay Guide to Getting Started What s Inside Contents Security at Vectra Bank... 4 Getting Started Online... 5 Welcome to Vectra Bank Business Online Banking. Whether you re

More information

Business Banking Customer Login Experience for Enhanced Login Security

Business Banking Customer Login Experience for Enhanced Login Security Business Banking Customer Login Experience for Enhanced Login Security User credentials uniquely identify each person who uses the banking platform. The intent of authentication is unequivocal verification

More information

EMERGING TRENDS IN FRAUD: CRIMINALS HAVE FOUND THE WEAKEST LINK

EMERGING TRENDS IN FRAUD: CRIMINALS HAVE FOUND THE WEAKEST LINK EMERGING TRENDS IN FRAUD: CRIMINALS HAVE FOUND THE WEAKEST LINK Fraud Investigations Division: Global Security & Investigations Ed Cook Executive Director Regional Investigations Objectives: Provide a

More information

How do I contact someone if my question is not answered in this FAQ?

How do I contact someone if my question is not answered in this FAQ? Help Where may I find the answers to my Internet Banking questions? How do I contact someone if my question is not answered in this FAQ? Enrolling How do I enroll in Internet Banking? Logging In How do

More information

Protecting your business from fraud

Protecting your business from fraud Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.

More information

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This

More information

Don t Fall Victim to Cybercrime:

Don t Fall Victim to Cybercrime: Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security

More information

Personal Online Banking & Bill Pay. Guide to Getting Started

Personal Online Banking & Bill Pay. Guide to Getting Started Personal Online Banking & Bill Pay Guide to Getting Started What s Inside Contents Security at Vectra Bank... 4 Getting Started Online... 5 Welcome to Vectra Bank Online Banking. Whether you re at home,

More information

Transaction Anomaly Protection Stopping Malware At The Door. White Paper

Transaction Anomaly Protection Stopping Malware At The Door. White Paper Transaction Anomaly Protection Stopping Malware At The Door White Paper Table of Contents Overview 3 Programmable Crime Logic Alter Web Application Flow & Content 3 Programmable Crime Logic Defeats Server-Side

More information

Security Tips You are here: Home» Security Tips

Security Tips You are here: Home» Security Tips Security Tips You are here: Home» Security Tips Click on a the Security Icon to view detailed information on: Responsibility of the Bank Password Policy Guide Online Security Internet Security Tips Scam

More information

Top Authentication & Identification Methods to Protect Your Credit Union

Top Authentication & Identification Methods to Protect Your Credit Union Top Authentication & Identification Methods to Protect Your Credit Union Presented on: Thursday, May 7, 2 3 ET Co presented by: Ann Davidson VP of Risk Consulting at Allied Solutions Tammy Behnke Credit

More information

Enhanced Security for Online Banking

Enhanced Security for Online Banking Enhanced Security for Online Banking MidSouth Bank is focused on protecting your personal and account information at all times. As instances of internet fraud increase, it is no longer sufficient to use

More information

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com

More information

a. StarToken controls the loss due to you losing your Internet banking username and password.

a. StarToken controls the loss due to you losing your Internet banking username and password. 1. What is StarToken? StarToken is the next generation Internet banking security solution that is being offered by Bank of India to all its Internet Banking customers (Retail as well as Corporate). StarToken

More information

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office Identity Theft CHRISTOS TOPAKAS Head of Group IT Security and Control Office Agenda Identity Theft Threats and Techniques Identity Theft Definition and Facts Identity Theft & Financial Institutions Prevention

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms

More information

Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0

Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0 Flexible Identity Multi-Factor Authentication Tokenless authenticators guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services

More information

Securing Online Payments in ACH Client and Remote Deposit Express

Securing Online Payments in ACH Client and Remote Deposit Express IMAGING & PAYMENTS PROCESSING Securing Online Payments in ACH Client and Remote Deposit Express sales@profitstars.com 877.827.7101 Contents Overview 3 Purpose 3 Customer/Member Education 4 Threats 4 Layered

More information

Practical guide for secure Christmas shopping. Navid

Practical guide for secure Christmas shopping. Navid Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security

More information

How CA Arcot Solutions Protect Against Internet Threats

How CA Arcot Solutions Protect Against Internet Threats TECHNOLOGY BRIEF How CA Arcot Solutions Protect Against Internet Threats How CA Arcot Solutions Protect Against Internet Threats we can table of contents executive summary 3 SECTION 1: CA ArcotID Security

More information

Mifflinburg Bank & Trust. Corporate Account Takeover & Information Security Awareness

Mifflinburg Bank & Trust. Corporate Account Takeover & Information Security Awareness Mifflinburg Bank & Trust Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is

More information

Basic ebusiness Banking User Guide

Basic ebusiness Banking User Guide Basic ebusiness Banking User Guide 1 Welcome: Welcome to Chemical Bank s ebusiness Banking system. With ebusiness Banking, you can access your accounts 24-hours a day, seven days a week; anywhere an Internet

More information

Business Identity Fraud Prevention Checklist

Business Identity Fraud Prevention Checklist Business Identity Fraud Prevention Checklist 9 Critical Things Every Business Owner Should Do Business identity thieves and fraudsters are clever and determined, and can quickly take advantage of business

More information

Tips for Banking Online Safely

Tips for Banking Online Safely If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining

More information

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect

More information

Information Security Awareness

Information Security Awareness Corporate Account Takeover & Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation

More information

Multi-Factor Authentication FAQs

Multi-Factor Authentication FAQs General FAQs What is Multi-factor Authentication (MFA)? Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data. Specifically, it enhances the security of your

More information

MOBILE BANKING. Why should I use Mobile Banking?

MOBILE BANKING. Why should I use Mobile Banking? MOBILE BANKING What is Mobile Banking? With Mobile Banking, you can access your account, conduct transfers, and pay and manage bills from any mobile device that has web browsing capabilities and a data

More information

BUSINESS ONLINE BANKING AGREEMENT

BUSINESS ONLINE BANKING AGREEMENT BUSINESS ONLINE BANKING AGREEMENT This Business Online Banking Agreement ("Agreement") establishes the terms and conditions for Business Online Banking Services ( Service(s) ) provided by Mechanics Bank

More information

WHITE PAPER Usher Mobile Identity Platform

WHITE PAPER Usher Mobile Identity Platform WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com info@usher.com Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction

More information

Member FAQ. General Information: Security:

Member FAQ. General Information: Security: General Information: Security: Why did you change Robins Federal Online Banking? Great question! We listened to an overwhelming response from you, our members that we needed to make these changes. We are

More information

Best Practices: Reducing the Risks of Corporate Account Takeovers

Best Practices: Reducing the Risks of Corporate Account Takeovers Best Practices: Reducing the Risks of Corporate Account Takeovers California Department of Financial Institutions September 2012 INTRODUCTION A state led cooperative effort, including the United States

More information

Your Digital Dollars Online & Mobile Banking

Your Digital Dollars Online & Mobile Banking Your Digital Dollars Online & Mobile Banking There are a lot of benefits to being able to bank or make payments from just about anywhere, but it s important to know how to do these things safely. Understanding

More information

Business Online User Guide

Business Online User Guide Business Online User Guide www.randolphsavings.com Business Online User Guide Welcome to Business Online at Randolph Savings Bank. We ve created this guide to help answer your questions about how you can

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

How To Help Protect Yourself From Identity Theft

How To Help Protect Yourself From Identity Theft How To Help Protect Yourself From Identity Theft January 20, 2015 Bryan Strong Senior Vice President and Director Information Security This complimentary interactive webinar is sponsored by Zions Bank

More information

Adding Stronger Authentication to your Portal and Cloud Apps

Adding Stronger Authentication to your Portal and Cloud Apps SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well

More information

Your security is our priority

Your security is our priority Your security is our priority Welcome to our Cash Management newsletter for businesses. You will find valuable information about how to limit your company s risk for fraud. We offer a wide variety of products

More information

ROOBA SM. Frequently Asked Questions. Regions Out-of-Band Authentication. It s time to expect more. Regions Bank Member FDIC Revised 041415

ROOBA SM. Frequently Asked Questions. Regions Out-of-Band Authentication. It s time to expect more. Regions Bank Member FDIC Revised 041415 ROOBA SM Frequently Asked Questions Regions Out-of-Band Authentication It s time to expect more. Regions Bank Member FDIC Revised 041415 Frequently Asked Questions: ROOBA (Regions Out of Band Authentication)

More information

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication Ken Scudder Senior Director Business Development & Strategic Alliances XYPRO Technology Talbot A. Harty CEO DeviceAuthority XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

More information

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015 Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity

More information

Common Cyber Threats. Common cyber threats include:

Common Cyber Threats. Common cyber threats include: Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...

More information

Customer Awareness for Security and Fraud Prevention

Customer Awareness for Security and Fraud Prevention Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to

More information