Auditing Wire Transfers and ACH Transactions

Size: px
Start display at page:

Download "Auditing Wire Transfers and ACH Transactions"

Transcription

1 Auditing Wire Transfers and ACH Transactions Tuesday, June 18, :15 AM 11:15 AM Presented by: John David McLeod, CPA, CISA, CITP Manager McNair, McLemore, Middlebrooks & Co., LLC 389 Mulberry St., Macon, GA Phone: (478)

2 Today s Agenda FFIEC guidance Recent statistics on account takeover How account takeover works & examples Recent court cases Internal controls slide 2

3 FFIEC Guidance Stated institutions should rely on layered security approaches. Stated not all transactions have the same risk. Specifically required institutions to implement solutions to (at a minimum): Detect and respond to suspicious activity Have better control of administrative functions slide 3

4 Recent Password Hacks Living Social - April 26, million customers including addresses, passwords and DOB Yahoo - July ,000 accounts LinkedIn - June million accounts Zappos (online shoe store) January million accounts exposed, including passwords Dropbox - July used stolen usernames & passwords from other hacks to sign into accounts slide 4

5 Recent Password Hacks When you consider approximately 55% of Americans use the same login and password across multiple platforms Password slide 5

6 Examples of Layered Security Anomaly Software Out-of-Band Verification Out-of-Wallet Questions Login / Password slide 6

7 Corporate Account Takeover Corporate account takeover is a type of business identity theft in which a criminal entity steals a business s valid online banking credentials. 1 Usually results in a fraudulent wire/ach. 1 slide 7

8 What About Statistics? slide 8

9 Monetary Losses to Fraud 7% 8% 8% 22% 55% < $100K $100K - $500K $500K - $2 million > $2 Million Not Sure Source: 2012 Faces of Fraud Survey, ISMG slide 9

10 Non-Monetary Losses Due to Fraud Loss of Productivity 59% Reputation 37% No Loss 29% Customer Accounts 26% Regulatory Scrutiny 14% 0% 10% 20% 30% 40% 50% 60% 70% Source: 2012 Faces of Fraud Survey, ISMG slide 10

11 Origin of Breach Threats Percent Most threats from China are not monetarily driven. 7% 5% 12% 30% 18% 28% China Romania United States Bulgaria Russia Other slide 11

12 Attack Techniques Hacking 72% Malware 54% Social 32% Misuse 18% Physical Error 9% 1% 0% 10% 20% 30% 40% 50% 60% 70% 80% slide 12

13 % of ATO Where Funds Left the Institution 80% 70% 70% 60% 50% 40% 30% 32% 20% 10% 12% 9% 0% Source: 2012 FS-ISAC Survey (1/2 of 2012) slide 13

14 More Statistics 100% 90% 4% 14% 9% 9% 80% 70% 26% 65% 60% 50% 40% 82% 91% 30% 20% 10% No Monetary Transaction Transaction Stopped Funds Left Institution 0% Wires ACH Other Source: 2012 FS-ISAC Survey (1/2 of 2012) slide 14

15 Reasons for Decrease? Customer Education Temporarily shutting down affected online customer access Manual review of ACH/Wire transactions over a specific dollar amount Analysis of customer login patterns Interrogation of customer sessions to detect anomalous traffic slide 15

16 How Does ATO Work? Thieves mimic an institution s website Malware or viruses are installed on customers computers Social engineering attacks to gain login credentials slide 16

17 How Does ATO Work? Malicious document attached to an Links within an to an infected website Employees visiting legitimate websites and downloading infected/malicious files Introduction of other devices (flash drives) slide 17

18 Who Are The Players? Organized Criminals often overseas Commercial Customers usually a small business Financial Institutions Money Mules slide 18

19 The Criminals where they shop slide 19

20 What is a Money Mule? Someone who moves stolen funds from one account to another. Recruited via /phone/online Often out-of-work Scammer will say we found you on careerbuilder.com or some other job search site Offer work from home jobs with no prior experience slide 20

21 What is a Money Mule? Money mules receive the funds in their bank account. The money mule then forwards the funds to another account, usually overseas. They keep a small portion of the funds as payment. Most money mules only receive about $5K-$10K to transfer, so their fee is rather small. slide 21

22 How Does It Work Thief recruits money mule Money mule redirects funds Thief hacks customer account Customer realizes theft Institution processes wire/ach Thief submits wire/ach slide 22

23 Example #1 - Details When - January 2013 Institution - $1 billion community bank Customer - small business How - thief hacked customer slide 23

24 Example #1 - Details 1. Thief hacks company 2. s bank requesting acct. information 3. Bank s thief 5 acct # s w/ balances 4. Thief requests $7K wire transfer 5. Bank processes & sends wire slide 24

25 Example #1 - Result Bank contacted customer after-the-fact and learned request was fraudulent Contacted receiving institution and got a hold placed on funds Bank ultimately recovered the $7K.after 3 months slide 25

26 Example #1 Lessons Learned Bank didn t follow its own procedure Wire requests via were not allowed by institution policy Board more concerned with getting $7K back than with the breach. slide 26

27 Example # 2 Details When December 2012 Institution - $375 million community bank Customer municipality (pop. 15,000) How type of man-in-the-middle attack slide 27

28 Example # 2 Details City controller logged into online banking website and received a denial page. Thief on the other end now has login credentials. Submits two ACH transactions ($250K). Other city employee logs into online banking and approves both ACHs. After approving, went to talk with City controller. slide 28

29 Example # 2 Details City contacted the bank who did not process the ACH - no loss. ISO for the bank visits city offices to determine what happened. No firewall or anti-virus in use slide 29

30 Example # 2 Lessons Learned Bank needed to improve customer education initiatives Implemented call-back procedures on all transactions for this customer account. 3 months later, still no firewall / anti-virus City was in negotiations with a vendor slide 30

31 Example # 3 Details When - January 2012 Institution - $135 million community bank Customer - small business How - fraudulent fax request slide 31

32 Example # 3 Details Customer receives fax request from Equifax It really wasn t Equifax Request was for updated credit reference information, including bank references Customer supplied all data, including account numbers & faxed it back with a signature slide 32

33 Example # 3 Details Bank receives wire request from customer for a wire to Russia for $27,000. Bank checked signature on fax to signature card and processed the wire. No call-back procedures were performed. Customer had never wired to Russia before. slide 33

34 Example # 3 Lessons Learned Good customer - bank took the $27,000 loss Small town - bank worried about reputation Going forward bank began performing and documenting call-backs on any wire originated other than in-person slide 34

35 Example # 4 Details (Same bank as in Example #3) When - June 2012 (6 months later) Institution - $135 million community bank Customer - small business How - fraudulent ACH submission slide 35

36 Example # 4 Details Customer controller gets from U.S. Postal Service telling of an undelivered package. Clicks on a link and gets a variant of the Zeus Trojan virus installed on PC. Thieves successfully submit ACH payroll batch for $317K. slide 36

37 Example # 4 Results Bank customer was contacted by an IT security blogger and informed that their account was being taken over. Customer then contacted the bank which was able to retrieve almost $260K. slide 37

38 Example # 4 Lessons Learned Red Flags (per bank personnel) Normal ACH for this customer was $200K. Fraudulent ACH was submitted in the afternoon - normal for this customer was in the morning. Customer was normally an ACH debit customer, but this was an ACH credit batch slide 38

39 Example # 4 Lessons Learned After two attacks in six months, the bank: Hired a law firm to re-write all online banking agreements. Began performing and documenting call-backs on all wires other than in-person wires. Engaged a third-party software company to monitor the ACH batches for unusual attributes. Hosted a lunch-and-learn for their business customers concerning online security. slide 39

40 Who is The Weak Link? CUSTOMER slide 40

41 Why The Weak Link? Expertise Lack trained IT professionals Money Usually do not have the budget for the needed technology Education Users are not educated about the risks Audit Small businesses don t have IT audits/regulations slide 41

42 Recent Court Cases PATCO Construction Hacked into company network/stole online banking ID Series of wires and ACH 3 year legal battle Out of court settlement (Dec. 2012) Bank had to reimburse customer for loss of $345,000 slide 42 Choice Escrow, LLC Hacked into company network/stole online banking ID Single wire transfer 3 year legal battle Judge s decision (March 2013) Customer had to bear loss of $440,000.

43 Choice Escrow, LLC because the company is small, with only a handful of staff, we didn t choose to use the bank s dual control settings for ACH and wire transactions. (Choice Escrow s manager of business development) slide 43

44 Internal Controls Risk Mitigation Strategies for the FI Customer Education slide 44

45 Internal Controls Common Wire Transfer Internal Controls: Wire Transfer Policy Dual Control Rekey of Wire Dollar Amount Transaction Limits Customer Agreements Security Procedures Independent Reconciliation (Segregation of Duties) Internal Audit Coverage slide 45

46 Internal Controls Wire Transfer Policy Approved by the board annually, or when there are significant changes in the wire process, systems, etc. Should address the following: Wire software used; Types of wires (domestic vs. international, customer vs. non-customer); Use of security procedures & customer agreements; Approval of an administrator; and Wire limits. slide 46

47 Internal Controls Dual Control Usually controlled by the wire software. Be aware: on some systems you can disable dual control. Audit dual control by reviewing system parameters and history logs of previously initiated wires. Not an area of frequent examiner comments. slide 47

48 Internal Controls Transaction Limits The board of directors and/or senior management regularly reviews and approves funds transfer limits. (source: FFIEC Wholesale Payment Systems booklet p. A-6, Examination Procedures) Usually reviewed annually when approving the wire policy. Review your insurance policy to ensure the limits you set don t violate the policy. slide 48

49 Internal Controls Customer Agreements You need written agreements with your repeat wire customers. Usually only see these when wires are initiated by phone, fax or (not in person requests). Authoritative Sources FFIEC Wholesale Payment Systems Booklet (p.a-4) Insurance Requirements Uniform Commercial Code Article 4A (UCC 4A) slide 49

50 Internal Controls Customer Agreements Should: Describe the security procedures to be followed when verifying the authenticity of a wire request. Include waivers from the customer if they opt-out of the security procedures. Get customer signature. Establish cut-off times for receiving, transmitting, amending and cancelling wire transfer requests. Identify individuals authorized to request wire transfers. Define the methods by which a wire transfer request can be initiated (phone/fax/ ). slide 50

51 Internal Controls Security Procedures (as defined in UCC 4A-201) A procedure agreed to by the institution and the customer for the purpose of verifying a wire request is authentic. A security procedure may require the use of algorithms or other codes, identifying words or numbers, encryption, call-back procedures, or similar security devices. Comparison of a signature on a payment order or communication with an authorized specimen signature of the customer is not by itself a security procedure. slide 51

52 Internal Controls Common Security Procedures PINs or Passwords (phone requests) Call-back procedures (fax and requests) Documentation You should document performance of the security procedure (include date, time, customer name, what was confirmed, etc.) slide 52

53 Actual Bank Insurance Policy slide 53

54 Internal Controls Independent Reconciliation (Segregation of Duties) Wire administrator should not have wire create or verify capability (limits should be set to $0). Due from account used for wire settlement should be reconciled by someone independent of wire operations. May be difficult in some institutions due to limited staff. Supervisors should review reconcilements of funds transfer activity on a regular basis. slide 54

55 Internal Controls How to Combat the Internal Fraud Threat Perform background checks on employees in wire/ach departments Review access levels regularly (job transfers, terminations) No temporary employees in wire/ach operations Employees subject to unannounced rotation of responsibilities Review of employee accounts (deposit and loans) Consider the role of relatives within the institution slide 55

56 Internal Controls Internal Audit Coverage Who Performs It? Be sure you know what each group is reviewing. Be alert for overlap or redundant procedures. Consider expertise of the auditor. Internal Auditors IT Auditors State ACH Organizations Audit report should include the procedures performed. slide 56

57 Internal Controls Internal Audit Coverage What to Include? Funds transfer requests Customer agreements A thorough audit should include testing samples of transfer requests & customer agreements. Payment processing & accounting (reconciliations) Logical & physical security Contingency plans Segregation of duties slide 57

58 Internal Controls Pre-Audit Checklist Review status of findings from prior audits Review user access privileges & limits Be alert for terminated or transferred employees Ensure limits in the system agree to those approved If on FedLine, review audit logs on software Account for all customer agreements Review wire and ACH system parameters slide 58

59 Actual ACH Settings slide 59

60 Actual Online Banking Settings slide 60

61 Customer Education Customer Security Awareness What is your institution s biggest challenge to fraud prevention? 68% - Lack of Customer Awareness 1 The customer is an extension of the institution s security. Customer education is critical with today s threats. Customers aren t bankers or IT security professionals Faces of Fraud Survey, ISMG slide 61

62 Customer Education Customer Education Program Should Include: Explanation of protections provided and not provided. Discussion of when the institution may contact a customer and request electronic banking credentials. A suggestion that online banking customers perform a risk assessment and controls evaluation. List of alternative risk control mechanisms. List of institution contacts for customers with concerns about suspicious account activity or other events. slide 62

63 Customer Education Customer Education Opportunities: Lunch and Learn session with business customers and IT professionals. Some larger institutions are offering free anti-virus software for one year. Notes in statements or on online banking website regarding security. Newsletters / whitepapers in a fraud resource center See slide 63

64 Future Outlook / Threats More Sophisticated Attacks Attacks on Institutions Directly Mobile Devices slide 64

65 Questions? John David McLeod, CPA, CISA, CITP Manager Phone: (478) slide 65 Your company logo here

Best Practices: Reducing the Risks of Corporate Account Takeovers

Best Practices: Reducing the Risks of Corporate Account Takeovers Best Practices: Reducing the Risks of Corporate Account Takeovers California Department of Financial Institutions September 2012 INTRODUCTION A state led cooperative effort, including the United States

More information

Alternatives for Managing Commercial Payments Risk

Alternatives for Managing Commercial Payments Risk Alternatives for Managing Commercial Payments Risk FDIC Symposium Arlington, VA May 11, 2010 Deborah Shaw Managing Director, Network Enforcement & Risk Management NACHA The Electronic Payments Association

More information

Electronic Fraud Awareness Advisory

Electronic Fraud Awareness Advisory Electronic Fraud Awareness Advisory Indiana Bankers Association Fraud Awareness Task Force February, 2012 Electronic Fraud Awareness Advisory Purpose/Summary The Indiana Bankers Association (IBA) was involved

More information

FFIEC CONSUMER GUIDANCE

FFIEC CONSUMER GUIDANCE FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their

More information

ACH AND WIRE FRAUD LOSSES

ACH AND WIRE FRAUD LOSSES ACH AND WIRE FRAUD LOSSES Financial Institution Technology Funnel Matthew G. Brenner Date: September 26, 2013 Orlando, Florida www.lowndes-law.com What We Will Cover Why is this important? Who does this

More information

How To Protect Your Online Banking From Fraud

How To Protect Your Online Banking From Fraud DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction

More information

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover Sound Business Practices for Businesses to Mitigate Corporate Account Takeover This white paper provides sound business practices for companies to implement to safeguard against Corporate Account Takeover.

More information

Online Banking Risks efraud: Hands off my Account!

Online Banking Risks efraud: Hands off my Account! Online Banking Risks efraud: Hands off my Account! 1 Assault on Authentication Online Banking Fraud Significant increase in account compromises via online banking systems Business accounts are primary

More information

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS $ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

Here are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online.

Here are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online. Here are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online. FFIEC BUSINESS ACCOUNT GUIDANCE New financial standards will assist credit

More information

Information Technology. A Current Perspective on Risk Management

Information Technology. A Current Perspective on Risk Management Information Technology A Current Perspective on Risk Management Topics Covered Information Security Program Common Examination Findings Existing and Emerging Risks ACH/Wire Fraud and Corporate Account

More information

ACI Response to FFIEC Guidance

ACI Response to FFIEC Guidance ACI Response to FFIEC Guidance Version 1 July 2011 Table of contents Introduction 3 FFIEC Supervisory Expectations 4 ACI Online Banking Fraud Management 8 Online Banking Fraud Detection and Prevention

More information

Presented by: Mike Morris and Jim Rumph

Presented by: Mike Morris and Jim Rumph Presented by: Mike Morris and Jim Rumph Introduction MICHAEL MORRIS, CISA Systems Partner JIM RUMPH, CISA Systems Manager Objectives To understand how layered security assists in securing your network

More information

Reliance Bank Fraud Prevention Best Practices

Reliance Bank Fraud Prevention Best Practices Reliance Bank Fraud Prevention Best Practices May 2013 User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters and numbers.

More information

THE CHANGING FACE OF CYBERCRIME AND WHAT IT MEANS FOR BANKS

THE CHANGING FACE OF CYBERCRIME AND WHAT IT MEANS FOR BANKS THE CHANGING FACE OF CYBERCRIME AND WHAT IT MEANS FOR BANKS David Glockner, Managing Director strozfriedberg.com Overview The big picture: what does cybercrime look like today and how is it evolving? What

More information

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only. The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only. Before acting on any ideas presented in this session;

More information

Business ebanking Fraud Prevention Best Practices

Business ebanking Fraud Prevention Best Practices Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special

More information

Corporate Account Takeover & Information Security Awareness. Customer Training

Corporate Account Takeover & Information Security Awareness. Customer Training Corporate Account Takeover & Information Security Awareness Customer Training No computer system can provide absolute security under all conditions. NO SECURITY MEASURE OR LIST OF SECURITY MEASURES CAN

More information

Online Cash Manager Security Guide

Online Cash Manager Security Guide Online Cash Manager Security Guide You re the One who can protect your business from the threat of a Corporate Account Takeover. 102 South Clinton Street Iowa City, IA 52240 1-800-247-4418 Version 1.0

More information

FFIEC BUSINESS ACCOUNT GUIDANCE

FFIEC BUSINESS ACCOUNT GUIDANCE FFIEC BUSINESS ACCOUNT GUIDANCE New financial standards will assist credit unions and business account holders to make online banking safer and more secure from account hijacking and unauthorized funds

More information

Supplement to Authentication in an Internet Banking Environment

Supplement to Authentication in an Internet Banking Environment Federal Financial Institutions Examination Council 3501 Fairfax Drive Room B7081a Arlington, VA 22226-3550 (703) 516-5588 FAX (703) 562-6446 http://www.ffiec.gov Purpose Supplement to Authentication in

More information

Payment Fraud and Risk Management

Payment Fraud and Risk Management Payment Fraud and Risk Management Act Today! 1. Help protect your computer against viruses and spyware by using anti-virus and anti-spyware software and automatic updates. Scan your computer regularly

More information

Questions You Should be Asking NOW to Protect Your Business!

Questions You Should be Asking NOW to Protect Your Business! Questions You Should be Asking NOW to Protect Your Business! Angi Farren, AAP Senior Director Jen Wasmund, AAP Compliance Services Specialist 31 st Annual Conference SHAPE YOUR FUTURE April 23, 2013 Regional

More information

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Business Internet Banking / Cash Management Fraud Prevention Best Practices Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization

More information

Corporate Account Takeover & Information Security Awareness

Corporate Account Takeover & Information Security Awareness Corporate Account Takeover & Information Security Awareness 1 The information contained in this presentation may contain privileged and confidential information. This presentation is for information purposes

More information

Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication.

Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication. Polling Question Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication. Please type in your response. This poll will close promptly at 1:00 pm CDT Getting the

More information

Top Authentication & Identification Methods to Protect Your Credit Union

Top Authentication & Identification Methods to Protect Your Credit Union Top Authentication & Identification Methods to Protect Your Credit Union Presented on: Thursday, May 7, 2 3 ET Co presented by: Ann Davidson VP of Risk Consulting at Allied Solutions Tammy Behnke Credit

More information

IT Security Risks & Trends

IT Security Risks & Trends IT Security Risks & Trends Key Threats to All Businesses 1 1 What do the following have in common? Catholic church parish Hospice Collection agency Main Street newspaper stand Electrical contractor Health

More information

Securing Online Payments in ACH Client and Remote Deposit Express

Securing Online Payments in ACH Client and Remote Deposit Express Securing Online Payments in ACH Client and Remote Deposit Express sales@profitstars.com 877.827.7101 Contents Overview 3 Purpose 3 Customer/Member Education 4 Threats 4 The Transaction Process 5 Layered

More information

Online Account Takeover. Roger Nettie

Online Account Takeover. Roger Nettie Online Account Takeover Roger Nettie CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited CUNA Mutual Group 2013 Session Outline Types of attacks Movement of funds Consumer

More information

CAPITAL PERSPECTIVES DECEMBER 2012

CAPITAL PERSPECTIVES DECEMBER 2012 CAPITAL PERSPECTIVES DECEMBER 2012 MITIGATING PAYMENT FRAUD RISK: IT S A WAR ON TWO FRONTS Payment fraud continues to be one of the biggest risk management challenges facing corporate treasury managers

More information

Online Cash Management Security: Beyond the User Login

Online Cash Management Security: Beyond the User Login Online Cash Management Security: Beyond the User Login Sonya Crites, CTP, SunTrust Anita Stevenson-Patterson, CTP, Manheim February 28, 2008 Agenda Industry Trends Government Regulations Payment Fraud

More information

Remote Deposit Quick Start Guide

Remote Deposit Quick Start Guide Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you

More information

{Governmental Client Training} June 20, 2016

{Governmental Client Training} June 20, 2016 {Governmental Client Training} June 20, 2016 2 Online Banking Controls & Fraud Considerations Dan Block, CPA Rumzei Abdallah, CPA Agenda 3 Online Banking Considerations What happened? 7 Controls Commonly

More information

Corporate Account Takeover & Information Security Awareness

Corporate Account Takeover & Information Security Awareness Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is for information purposes

More information

E Commerce and Internet Security

E Commerce and Internet Security E Commerce and Internet Security Zachary Rosen, CFE, CIA President, ACFE Czech Republic Chapter Introduction The Internet has become a global phenomenon reshaping the way we communicate and conduct business.

More information

THE HOME LOAN SAVINGS BANK. Corporate Account Takeover & Information Security Awareness

THE HOME LOAN SAVINGS BANK. Corporate Account Takeover & Information Security Awareness THE HOME LOAN SAVINGS BANK Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is

More information

Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT

Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection Foreword The consumerization

More information

Preventing Corporate Account Takeover Fraud

Preventing Corporate Account Takeover Fraud Preventing Corporate Account Takeover Fraud Joe Potuzak Senior Vice President Payment Solutions Risk Manager Member FDIC 1 About Our Speaker Joe Potuzak is the Risk Manager for BB&T s Payment Solutions

More information

FFIEC Supplemental Guidance to Authentication in an Internet Banking Environment. Robert Farmer Senior Technology Compliance Manager

FFIEC Supplemental Guidance to Authentication in an Internet Banking Environment. Robert Farmer Senior Technology Compliance Manager FFIEC Supplemental Guidance to Authentication in an Robert Farmer Senior Technology Compliance Manager 1 888 250 4400 Effective Date The FFIEC Supplement to Authentication in an was issued on June 28,

More information

CYBERCRIME: What your Bank should be doing to Protect your Business. David Pollino Senior Vice President Fraud Prevention Officer

CYBERCRIME: What your Bank should be doing to Protect your Business. David Pollino Senior Vice President Fraud Prevention Officer CYBERCRIME: What your Bank should be doing to Protect your Business David Pollino Senior Vice President Fraud Prevention Officer Agenda Changing Landscape Case of Efficient Services Escrow Group Six key

More information

Online Banking Fraud Prevention Recommendations and Best Practices

Online Banking Fraud Prevention Recommendations and Best Practices Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know

More information

Mifflinburg Bank & Trust. Corporate Account Takeover & Information Security Awareness

Mifflinburg Bank & Trust. Corporate Account Takeover & Information Security Awareness Mifflinburg Bank & Trust Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is

More information

Information Security Awareness

Information Security Awareness Corporate Account Takeover & Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation

More information

Cybersecurity A Clear and Present Danger

Cybersecurity A Clear and Present Danger Cybersecurity A Clear and Present Danger Thomas J. DeMayo, CISSP, CISA, CIPP, CEH, CHFI, MCSE Director IT Audit and Consulting Services TDeMayo@odpkf.com Objectives Gain an understanding of current cyber

More information

EFT Industry and BSA/AML Dan Altman

EFT Industry and BSA/AML Dan Altman EFT Industry and BSA/AML Dan Altman Sr. IT and Risk Consultant Background Dan Altman, Sr. IT and Risk Consultant SHAZAM Internal Audit SHAZAM Secure o IT Exam, ACH Exam, BSA Exam, IT Consulting, Security

More information

Corporate Account Take Over (CATO) Guide

Corporate Account Take Over (CATO) Guide Corporate Account Take Over (CATO) Guide This guide was created to increase our customers awareness of the potential risks and threats that are associated with Internet and electronic- based services,

More information

Securing Online Payments in ACH Client and Remote Deposit Express

Securing Online Payments in ACH Client and Remote Deposit Express IMAGING & PAYMENTS PROCESSING Securing Online Payments in ACH Client and Remote Deposit Express sales@profitstars.com 877.827.7101 Contents Overview 3 Purpose 3 Customer/Member Education 4 Threats 4 Layered

More information

Don t Fall Victim to Cybercrime:

Don t Fall Victim to Cybercrime: Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security

More information

Business Online Banking & Bill Pay Guide to Getting Started

Business Online Banking & Bill Pay Guide to Getting Started Business Online Banking & Bill Pay Guide to Getting Started What s Inside Contents Security at Vectra Bank... 4 Getting Started Online... 5 Welcome to Vectra Bank Business Online Banking. Whether you re

More information

Safeguarding Your information and accounts

Safeguarding Your information and accounts Safeguarding Your information and accounts D Bank with confidence The security of your funds and information is a top priority at Liberty Bank. We do our utmost every day to prevent fraud and identity

More information

Top Fraud Trends Facing Financial Institutions

Top Fraud Trends Facing Financial Institutions Top Fraud Trends Facing Financial Institutions Presented on: October 7, 2015, 2-3 ET Presented by: Ann Davidson - VP of Risk Consulting at Allied Solutions Webinar Agenda 1. Fraud trends in 2015 and beyond

More information

FFIEC CONSUMER GUIDANCE

FFIEC CONSUMER GUIDANCE FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their

More information

Keep Your Business Banking

Keep Your Business Banking Keep Your Business Banking Safe in the Digital Age By Erin Fonté As a business executive, you have many choices in conducting banking activities, including online and mobile banking options. But with increasing

More information

Your security is our priority

Your security is our priority Your security is our priority Welcome to our Cash Management newsletter for businesses. You will find valuable information about how to limit your company s risk for fraud. We offer a wide variety of products

More information

2010 AICPA Top Technology Initiatives. About the Presenter. Agenda. Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP

2010 AICPA Top Technology Initiatives. About the Presenter. Agenda. Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP 2010 AICPA Top Technology Initiatives Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP Georgia Society of CPAs Annual Convention June 16, 2010 About the Presenter Partner-in-Charge, Habif,

More information

ecommercial SAT ecommercial Security Awareness Training Version 3.0

ecommercial SAT ecommercial Security Awareness Training Version 3.0 ecommercial SAT ecommercial Security Awareness Training Version 3.0 Welcome The goal of this training course is to provide you with the information needed to assist in keeping your online banking account

More information

Internet Banking Authentication Guidance is Out

Internet Banking Authentication Guidance is Out Brace Yourself: Updated d FFIEC Internet Banking Authentication Guidance is Out October 13, 2011 Paul Rainbow, Manager David Dyk, Manager 1 The material appearing in this presentation is for informational

More information

Are All High-Risk Transactions Created Equal?

Are All High-Risk Transactions Created Equal? Are All High-Risk Transactions Created Equal? How to Minimize FFIEC Exam Pain 1 Lee Wetherington, AAP Director of Strategic Insight ProfitStars @leewetherington Agenda New Supplement to FFIEC Guidance

More information

How To Help Protect Yourself From Identity Theft

How To Help Protect Yourself From Identity Theft How To Help Protect Yourself From Identity Theft January 20, 2015 Bryan Strong Senior Vice President and Director Information Security This complimentary interactive webinar is sponsored by Zions Bank

More information

Cybersecurity Workshop

Cybersecurity Workshop Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153

More information

Cyber Liability Insurance: It May Surprise You

Cyber Liability Insurance: It May Surprise You Cyber Liability Insurance: It May Surprise You Moderator Eugene Montgomery, President & CEO Community Financial Insurance Center Panelists Antonio Trotta, Senior Claim Counsel, CNA Specialty William Heinbokel,

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank Fraud Detection and Prevention Timothy P. Minahan Vice President Government Banking TD Bank Prevention vs. Detection Prevention controls are designed to keep fraud from occurring Detection controls are

More information

Common Data Breach Threats Facing Financial Institutions

Common Data Breach Threats Facing Financial Institutions Last Updated: February 25, 2015 Common Data Breach Threats Facing Financial s Although exact figures are elusive, there is no question that the number of data security breaches both reported and unreported

More information

BUSINESS ONLINE BANKING AGREEMENT

BUSINESS ONLINE BANKING AGREEMENT BUSINESS ONLINE BANKING AGREEMENT This Business Online Banking Agreement ("Agreement") establishes the terms and conditions for Business Online Banking Services ( Service(s) ) provided by Mechanics Bank

More information

ACH GUIDE ACH PARTICIPATION

ACH GUIDE ACH PARTICIPATION Materials needed: ACH policies (Audit and general), the last two ACH audits, security settings (Operator Reports) for the processing method the FI has chosen, Originator contracts and any reviews of Originator

More information

Cybersecurity and Privacy 2015: Presentation to Institute of International Bankers

Cybersecurity and Privacy 2015: Presentation to Institute of International Bankers Cybersecurity and Privacy 2015: Presentation to Institute of International Bankers Sue Ross Senior Counsel Norton Rose Fulbright US LLP October 27, 2015 Speaker Sue Ross Senior Counsel Norton Rose Fulbright

More information

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security.

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security. Applying the 80/20 approach for Operational Excellence How to combat new age threats, optimize investments and increase security Vinod Vasudevan Agenda Current Threat Landscape The 80/20 Approach Achieving

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

ID Theft P E R S O N A L A N D O R G A N I Z AT I O N A L P R E V E N T I O N A N D D E T E C T I O N

ID Theft P E R S O N A L A N D O R G A N I Z AT I O N A L P R E V E N T I O N A N D D E T E C T I O N ID Theft P E R S O N A L A N D O R G A N I Z AT I O N A L P R E V E N T I O N A N D D E T E C T I O N M i c h e l l e C u m m i n g s, C I A, C F E, C D F M According to the National Crime Victimization

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms

More information

Identity Theft: How the IRS Protects Taxpayers and Helps Victims. Combating Identity Theft and Online Fraud

Identity Theft: How the IRS Protects Taxpayers and Helps Victims. Combating Identity Theft and Online Fraud Identity Theft: How the IRS Protects Taxpayers and Helps Victims Combating Identity Theft and Online Fraud What is identity theft? Identity theft occurs when someone uses your personal information such

More information

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This

More information

Top Ten Fraud Risks That Impact Your Financial Institution. Presented by Ann Davidson - VP Risk Consulting Allied Solutions LLC.

Top Ten Fraud Risks That Impact Your Financial Institution. Presented by Ann Davidson - VP Risk Consulting Allied Solutions LLC. Top Ten Fraud Risks That Impact Your Financial Institution Presented by Ann Davidson - VP Risk Consulting Allied Solutions LLC Agenda Education on understanding the fraud risk Take away.. Education to

More information

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath ebook Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath Protecting against downstream fraud attacks in the wake of large-scale security breaches. Digital companies can no longer trust static login

More information

Five Trends to Track in E-Commerce Fraud

Five Trends to Track in E-Commerce Fraud Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you re in the e-commerce business you probably have a baseline level of fraud losses due to stolen credit cards, return fraud and other

More information

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more

More information

Understanding It s Me 247 Security. A Guide for our Credit Union Clients and Owners

Understanding It s Me 247 Security. A Guide for our Credit Union Clients and Owners Understanding It s Me 247 Security A Guide for our Credit Union Clients and Owners October 2, 2014 It s Me 247 Security Review CU*Answers is committed to the protection of you and your members. CU*Answers

More information

Fighting ACH fraud: An industry perspective

Fighting ACH fraud: An industry perspective THOUGHT LEADERSHIP Fighting ACH fraud: An industry perspective Volume 2 1 Contents 03 Introduction 04 The ACH fraud process 07 Finding the needle in the haystack 07-08 Legal landscape 09 The customer s

More information

7. You agree to grant MCB a security interest in all your property in our possession to secure payment of your obligations under this Addendum.

7. You agree to grant MCB a security interest in all your property in our possession to secure payment of your obligations under this Addendum. ACH ADDENDUM This Service Agreement addendum is incorporated into the Master Commercial Cash Management Internet Agreement. The Master supersedes, to the extent that specific Service Agreements are silent

More information

How the IRS Helps Taxpayers and Assists Victims

How the IRS Helps Taxpayers and Assists Victims How the IRS Helps Taxpayers and Assists Victims Combating Identity Theft and Online Fraud Justin McCarty January, 2014 What is identity theft? Identity theft occurs when someone uses your personal information

More information

Cybersecurity: Protecting Your Business. March 11, 2015

Cybersecurity: Protecting Your Business. March 11, 2015 Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks

More information

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If

More information

Cybersecurity Governance Update on New FFIEC Requirements

Cybersecurity Governance Update on New FFIEC Requirements Cybersecurity Governance Update on New FFIEC Requirements cliftonlarsonallen.com Our perspective CliftonLarsonAllen Started in 1953 with a goal of total client service Today, Professional Services Firm

More information

How the IRS Helps Taxpayers and Assist Victims

How the IRS Helps Taxpayers and Assist Victims How the IRS Helps Taxpayers and Assist Victims Combating Identity Theft and Online Fraud Phil Oliver and Mark Harrington Privacy, Governmental Liaison and Disclosure May 31, 2013 What is identity theft?

More information

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Glenn Gizzi Senior Stakeholder Liaison Marc Standig Enrolled Agent What is tax-related identity theft? Tax-related identity

More information

FSOEP Web Banking & Fraud: Corporate Treasury Attacks

FSOEP Web Banking & Fraud: Corporate Treasury Attacks FSOEP Web Banking & Fraud: Corporate Treasury Attacks Your Presenters Who Are We? Tim Wainwright Managing Director Chris Salerno Senior Consultant Led 200+ penetration tests Mobile security specialist

More information

Protecting your business from fraud

Protecting your business from fraud Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.

More information

Emerging ACH Issues. Florida Bankers Association 30 th Annual Consumer Compliance Seminar Orlando, Florida April 29- May 1, 2015

Emerging ACH Issues. Florida Bankers Association 30 th Annual Consumer Compliance Seminar Orlando, Florida April 29- May 1, 2015 1 Emerging ACH Issues Florida Bankers Association 30 th Annual Consumer Compliance Seminar Orlando, Florida April 29- May 1, 2015 Kristen J. Stogniew, Esquire, AAP, CFE, Shareholder kristen.stogniew@saltmarshcpa.com

More information

Get on First Base with your Regulators and Cyber Security

Get on First Base with your Regulators and Cyber Security Get on First Base with your Regulators and Cyber Security Secure Banking Solutions Chad Knutson 2 Presenter Chad Knutson VP SBS Institute Senior Information Security Consultant Masters in Information Assurance

More information

Phishing for Fraud: Don't Let your Company Get Hooked!

Phishing for Fraud: Don't Let your Company Get Hooked! Phishing for Fraud: Don't Let your Company Get Hooked! March 2009 Approved for 1 CTP/CCM recertification credit by the Association for Financial Professionals 1 Today s Speakers: Joe Potuzak is Senior

More information

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015 Risky Business Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015 What We ll Cover About Me Background The threat Risks to your organization What your organization can/should

More information

Identifying Key Risk Indicator

Identifying Key Risk Indicator PUERTO RICO PAYMENTS SYMPOSIUM Identifying Key Risk Indicator EPOCPR Services Agenda for Today Background History Regulators & Risk Management Let s have fun Regulators & Risk Assessment ACH Risks Categories

More information

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud. IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits

More information

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC Cyber Security CHAD KNUTSON SECURE BANKING SOLUTIONS 2014 SECURE BANKING SOLUTIONS, LLC Presenter Chad Knutson Senior Information Security Consultant Masters in Information Assurance CISSP (Certified Information

More information

INTERNET BANKING SYSTEM AGREEMENT

INTERNET BANKING SYSTEM AGREEMENT INTERNET BANKING SYSTEM AGREEMENT Agreement - This Agreement, which includes the Fee Schedule and Enrollment Form, is a contract which establishes the rules which cover your electronic access to your accounts

More information