Report True Fraud Protection: Securing People, Process and Personal Data

Size: px
Start display at page:

Download "Report True Fraud Protection: Securing People, Process and Personal Data"

Transcription

1 True Fraud Protection: Securing People, Process and Personal Data This report is available for download on Teleperformance s website. For more information about articles, cases, white papers go to:

2 Few words strike fear into the hearts of financial institutions, corporations and consumers alike, like the words security breach. Financial institutions and corporations alarmed by the potential loss of assets, information and clients, not to mention the bad publicity, must regularly revisit their security efforts and client confidentiality measures. Customers expect appropriate protection of their personal data, financial details and digital footprint, as well as the integrity of the institutions in which they have entrusted their information. They have cause for concern. Fraud is a multimillion dollar institution, often orchestrated by professional, organized attackers. In fact, these sophisticated rings are responsible for some 74 percent of fraud incidents. And the figure for annual loss caused by this type of theft worldwide is estimated at $3.5 trillion. What s more troubling is that these aren t necessarily thieves in the night. The overwhelming majority of fraud cases 90 percent have a point man on the inside. The largest cases involve internal staff. How is this possible in this age of heightened security and constant theft awareness? Although companies continue to increase their security attempts, many still are faced with these risks: employee access to sensitive client information (including credit card, bank account and social security numbers), large number of employees, and frequent turnover, or high percentage of new employees. Customers have little tolerance or patience for companies who put their data at risk. Approximately 80 percent of customers will reduce or churn their investment in a company after they have experienced fraud. When companies lose a handful of customers due to fraud it s problematic. When major corporations are the victims of elaborate, large-scale fraud attacks, there is a potential for massive loss of clients, assets and brand image. By arming themselves with strategic, rigorous and effective security measures, companies can protect themselves and their customers from this imminent threat. To do just that, Teleperformance has developed a suite of tools specifically designed to better monitor the access of our clients systems and data by our operations, shield against fraud and elevate the level of our clients overall security systems. 2

3 Teleperformance Security Tools Teleperformance has developed a suite of tools designed to closely monitor contact center employees and minimize access to sensitive information. They also enhance insight as well as provide a macro view of operations. 1. Secure Access Teleperformance Secure Access is a strategic solution that monitors and analyzes contact center agents activity in the critical systems that have sensitive information, and tracks any unusual behavior that could red flag for a fraud attempt. Assessment and Analysis The first phase in the Secure Access process is undergoing a Fraud Risk Assessment, which is a security evaluation designed to map the work process and identify weak areas or security gaps that could potentially leave the company vulnerable to fraud from within. This type of process analysis, or mapping, allows a company to take a closer look at the paths data travel within a company. It examines where information is stored, what type of information is stored where, who has access, how it is accessed and more. Leaks and vulnerabilities can occur at any point 1 and this type of analysis will reveal breaks in the armor that indicate where additional controls are needed 2. Teleperformance then analyzes the resulting data and determines what agent activity should be tracked, how it should be monitored, and what new alerts and security levels should be in place. This analysis is used to inform and help create a tailored fraud prevention program. Vigilance and Controls Many companies have already adopted some form of contact center controls including banning cell phones, pens, paper, and others. However, even after such rules are implemented, fraud still occurs. Instead, companies must rely on a comprehensive approach that includes contact center staff education, as well as monitoring and prevention. 4 In the second phase of Secure Access, Teleperformance develops a training program customized to reflect the needs revealed by the Fraud Risk Assessment. The training can include instruction on fraud prevention, proper procedure and data handling. Education and security awareness training is critical to increasing employee self-monitoring. 1 Informed employees can help companies be more vigilant about properly handling customer information. Secure Access also monitors agent workflow to ensure proper procedures are followed with each transaction. If an agent deviates from the standard procedure (such as unauthorized accessing of sensitive customer information), which can indicate potential fraudulent activity is taking place, the system will alert the security and/or management team. Indeed some major companies already utilize some form of security alerts, but mismanagement and lack of procedural follow through once an alert has been raised diminishes the efficacy of the entire security process. In a report by CEFAS, the U.K. s fraud prevention service, many fraudulent activities were noted by companies internal controls, however 40 percent went undiscovered until they were reported by the customer. 3 For an alert system to be valuable, it must be paired with additional security measures. In Secure Access process, when the security team receives any alert, security specialists review the agent s profile and can utilize in-office cameras to review the situation and assess whether the agent is indeed using their own account. If fraudulent activity is confirmed, the agent s account is blocked, relevant data is collected and human resources contacts authorities. What s more, security risks generate different alerts based on the severity of the threat. The most severe threats are analyzed immediately by Teleperformance s professionals via their 24-hour online security team. The entire process is swift and efficient. 1. Sans Institute. Data Leakage Landscape: Where Data Leaks and How Next Generation Tools Apply OSF Global Services, Mitigate BPO Security Issues New Voice Media Blog. Facing Up to the Nightmare of Staff Fraud in a Call Centre. Richard Pickering NICE Actimize Blog. Employee Fraud: Who s your bank s strategy owner? Mary Ann Miller

4 2. Secure Contact Another Teleperformance fraud security solution is Secure Contact, which provides a protected channel between the customer and the contact center agent for the secure exchange of personal identifiable information without verbally exposing the data to the contact center agent. This tool acts like a vault securing all the information and keeping it inaccessible to employees. Locked Away: Keeping Data Confidential It works by capturing payment and identity information, such as social security or credit card numbers, as needed by the specific transaction, but without exposing it to the contact center agent. Instead customers interact via an IVR (Interactive Voice Response) automated attendant. Secure Contact captures data, such as payment information, to complete the customer s transaction, without the contact center agents ever having seen the information. So while security and customer confidentiality is profoundly increased, there is no slowdown in work procedure. What s more, Secure Contact can be integrated into a company s existing systems such as CRM or billing via API. This type of need-to-know information accessibility is among recommended best security practices for companies dealing with outsourced contact centers, according to OSF Global Services 2. When certain outsourcing providers sidestep thorough employee vetting like background checks and resume verification, according to OSF, strategic solutions like Secure Contact eliminate the possibility that data could be compromised or stolen by the agent. A Protected Process Secure Contact can be utilized at key moments in the customer-agent transaction to fulfill the inquiry: At the Beginning: Before the contact center agent is put in touch with the customer, the IVR (automated attendant) confirms the customer s identity using secured information. Once identity is confirmed, the call can be transferred to a live agent. When the transaction requires the sensitive information to be used, the captured data is transferred to the CRM system automatically. The contact center agent s screen does not show the info, and each number is partially concealed. The agent can then confirm the information using the last digits of the relevant numbers (credit card, social security, account, etc). During the Transaction: IVR can be utilized in mid-transaction when a contact center agent requires the customer s personal data to complete their request. If a call with a live agent is already in progress, the agent can set up a conference call with the IVR which then collects the relevant data and pushes it to the CRM via Secure Contact. It is important to highlight that the agent cannot listen to the IVR during the conference, only to the customer in case support is needed. Once the data is in place, the agent can complete the customer call. At the End: Transactions can also be completed via an IVR. When a call with a live agent is in progress and only a simple transaction is needed to fulfill the customer s request, the agent can begin the transaction in the CRM system, leaving blank only those areas to be automatically filled by the IVR. Once the agent has completed his portion, he transfers the call to IVR and the customer is prompted to provide the needed information, complete the transaction and conclude their call. In fact, Secure Contact can be utilized at any time during the customer interaction and still be fully compliant with the strictest security standards across industries, including those set by HIPAA, PCI-DSS and Safe Harbor, among others. We are recognized in the market by leading analyst firms. Teleperformance has added innovation to contact center security that often surpasses the client s internal security controls for fraud prevention and early detection. In short, for companies that absolutely require the highest degree of data and customer information security, Teleperformance is indisputably the industry leader. Michael DeSalles, Industry Analyst, Frost & Sullivan 4

5 Teleperformance Security: Peace of Mind for Companies and Customers Personal and financial information is more widely used, and more frequently compromised than ever before. In the current business climate, both companies and consumers rely on digital transactions to shop, bank, pay bills and more. But every transaction leaves customers and businesses open to the potential for fraud. Statistics show that when customers are defrauded, they take their business elsewhere. Companies are intent on protecting their customers, assets and brand integrity, but face mounting challenges to their security systems daily. As fraudsters, thieves and hackers become more sophisticated and eager to involve company staff, companies must become wiser. By mobilizing Teleperformance Security, companies are setting in motion a strategic, multi-dimensional security system that prevents fraud from the inside out. Secure Access and Secure Contact safeguard their people, process and customers personal data via highly trained employees, cutting edge technology, streamlined and effective security processes, security management methodologies and stringent policies. When a businesses most valuable assets are protected, its leaders are free to pursue innovation, client acquisition (as opposed to loss prevention) and new strategies. Simply put, companies that invested in their continued success, invest in their security. 5

6 About Teleperformance Worldwide Leader in Multichannel Customer Experience We are a People company with a people-centric strategy, interacting with people all over the world. It s all about People. They are part of who we are and what we do. We analyze their behaviors. We understand their wants and needs. That s why we deliver outstanding customer experiences through integrated multichannel solutions to enhance customer experience results for our clients. 6

7 For more information: Follow us:

Top 5 Reasons to Outsource MORE!

Top 5 Reasons to Outsource MORE! Top 5 Reasons to Outsource MORE! This report is available for download on Teleperformance s website. For more information about articles and white papers, go to: www.teleperformance.com Why Companies Are

More information

Raising the Bar on Fraud Prevention

Raising the Bar on Fraud Prevention Raising the Bar on Fraud Prevention This article is available for download on Teleperformance s website. For more information about articles, cases, white papers go to: www.teleperformance.com The Ongoing

More information

Reducing Fraud whilst Keeping Transactions in Motion

Reducing Fraud whilst Keeping Transactions in Motion Reducing Fraud whilst Keeping Transactions in Motion Fraud Today Following a decrease in 2012, fraud is on the rise again, and so are the costs involved in managing it. These factors are in turn driving

More information

EVERY TWO SECONDS. The Financial Institution s Guide to Protecting Customers from Identity Crimes

EVERY TWO SECONDS. The Financial Institution s Guide to Protecting Customers from Identity Crimes EVERY TWO SECONDS The Financial Institution s Guide to Protecting Customers from Identity Crimes Don t lose your customers to identity crimes. Every 2 seconds, an identity fraud occurs in the United States.*

More information

How-To Guide: Cyber Security. Content Provided by

How-To Guide: Cyber Security. Content Provided by How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses

More information

PCI Compliance for Healthcare

PCI Compliance for Healthcare PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?

More information

LISTENING, UNDERSTANDING AND ENGAGING CUSTOMERS ON SOCIAL MEDIA

LISTENING, UNDERSTANDING AND ENGAGING CUSTOMERS ON SOCIAL MEDIA LISTENING, UNDERSTANDING AND ENGAGING CUSTOMERS ON SOCIAL MEDIA GLOBAL SCENARIO FOR MOST ORGANIZATIONS, SOCIAL MEDIA STILL REPRESENTS A CHALLENGE TO BE ADDRESSED. Customer requests and personal data directed

More information

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION

More information

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary

More information

Five Keys to Ironclad Security in Your M&A Transactions

Five Keys to Ironclad Security in Your M&A Transactions White Paper Five Keys to Ironclad Security in Your M&A Transactions Keeping security front and center when using a virtual data room M E R R I L L D A T A S I T E TM Contents The importance of data security

More information

A strategic approach to fraud

A strategic approach to fraud A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for

More information

BEFORE THE BREACH: Why Penetration Testing is Critical to Healthcare IT Security

BEFORE THE BREACH: Why Penetration Testing is Critical to Healthcare IT Security BEFORE THE BREACH: Why Penetration Testing is Critical to Healthcare IT Security August 2014 w w w.r e d s p in.c o m Introduction This paper discusses the relevance and usefulness of security penetration

More information

Finding a Cure for Medical Identity Theft

Finding a Cure for Medical Identity Theft Finding a Cure for Medical Identity Theft A look at the rise of medical identity theft and what small healthcare organizations are doing to address threats October 2014 www.csid.com TABLE OF CONTENTS SUMMARY

More information

Transforming the Customer Experience When Fraud Attacks

Transforming the Customer Experience When Fraud Attacks Transforming the Customer Experience When Fraud Attacks About the Presenters Mike Young, VP, Product Team, Everbank Manages consumers and business banking products, as well as online and mobile banking

More information

THE ROLE OF THE CONTACT CENTER IN PCI COMPLIANCE

THE ROLE OF THE CONTACT CENTER IN PCI COMPLIANCE THE ROLE OF THE CONTACT CENTER IN PCI COMPLIANCE ENSURING SAFE COMMERCE www.nice.com TABLE OF CONTENTS THE IMPORTANCE OF PCI COMPLIANCE... UNDERSTANDING THE KEY REQUIREMENT... PRIVACY CONTROL: DESIGNS

More information

PCI Solution for Retail: Addressing Compliance and Security Best Practices

PCI Solution for Retail: Addressing Compliance and Security Best Practices PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment

More information

Facts About FACTA Red Flag Identity Theft Prevention Program

Facts About FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious

More information

Reducing Cyber Risk in Your Organization

Reducing Cyber Risk in Your Organization Reducing Cyber Risk in Your Organization White Paper 2016 The First Step to Reducing Cyber Risk Understanding Your Cyber Assets With nearly 80,000 cyber security incidents worldwide in 2014 and more than

More information

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan WHITE PAPER Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan Introduction to Data Privacy Today, organizations face a heightened threat landscape with data

More information

PAI Secure Program Guide

PAI Secure Program Guide PAI Secure Program Guide A complete guide to understanding the Payment Card Industry Data Security Requirements and utilizing the PAI Secure Program. Letter From the CEO Welcome to PAI Secure. As you

More information

The New Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age

The New Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age How to Battle the Leading Identity Fraud Tactic in The Digital Age In the 15 years since synthetic identity fraud emerged as a significant threat, it has become the predominant tactic for fraudsters. The

More information

LEVERAGING BIG DATA & ANALYTICS TO IMPROVE EFFICIENCY. Bill Franks Chief Analytics Officer Teradata July 2013

LEVERAGING BIG DATA & ANALYTICS TO IMPROVE EFFICIENCY. Bill Franks Chief Analytics Officer Teradata July 2013 LEVERAGING BIG DATA & ANALYTICS TO IMPROVE EFFICIENCY Bill Franks Chief Analytics Officer Teradata July 2013 Agenda Defining The Problem Defining The Opportunity Analytics For Compliance Analytics For

More information

Data security: A growing liability threat

Data security: A growing liability threat Data security: A growing liability threat Data security breaches occur with alarming frequency in today s technology-laden world. Even a comparatively moderate breach can cost a company millions of dollars

More information

CYBERSECURITY IN HEALTHCARE: A TIME TO ACT

CYBERSECURITY IN HEALTHCARE: A TIME TO ACT share: TM CYBERSECURITY IN HEALTHCARE: A TIME TO ACT Why healthcare is especially vulnerable to cyberattacks, and how it can protect data and mitigate risk At a time of well-publicized incidents of cybersecurity

More information

FFIEC CONSUMER GUIDANCE

FFIEC CONSUMER GUIDANCE FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their

More information

Identity Thieves are Always at Work They Can Strike Anyone, Anytime, Anywhere

Identity Thieves are Always at Work They Can Strike Anyone, Anytime, Anywhere Identity Thieves are Always at Work They Can Strike Anyone, Anytime, Anywhere 2014 LifeLock, Inc. All Rights Reserved. LifeLock, the LockMan Icon, LifeLock Ultimate and Relentlessly Protecting Your Identity

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

CPR: Circumstances, Prevention and Response in Safeguarding Personal Healthcare Information

CPR: Circumstances, Prevention and Response in Safeguarding Personal Healthcare Information September 14, 2010 CPR: Circumstances, Prevention and Response in Safeguarding Personal Healthcare Information 2010 Kroll Ontrack Inc. www.ontrackdatarecovery.com Agenda Introduction 1 Agenda Introduction

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

Compliance Services CONSULTING. Gap Analysis. Internal Audit

Compliance Services CONSULTING. Gap Analysis. Internal Audit Compliance Services Gap Analysis The gap analysis is a fast track assessment to establish understanding on an organization s current capabilities. The purpose of this step is to evaluate the current capabilities

More information

Statement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the

Statement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the Statement of Carlos Minetti Discover Financial Services Before the Subcommittee on Oversight and Investigations of the Committee on Financial Services United States House of Representatives July 21, 2005

More information

Strategic Plan On-Demand Services April 2, 2015

Strategic Plan On-Demand Services April 2, 2015 Strategic Plan On-Demand Services April 2, 2015 1 GDCS eliminates the fears and delays that accompany trying to run an organization in an unsecured environment, and ensures that our customers focus on

More information

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number

More information

Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009

Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009 Florida International University Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Florida International University developed this Identity Theft Prevention Program

More information

Successful Application Design: Auditing the Process Development Life Cycle

Successful Application Design: Auditing the Process Development Life Cycle Successful Application Design: Auditing the Process Development Life Cycle CPE Credits: 7 CODE C2 Managing software projects is difficult under the best circumstances. You can reduce the difficulty and

More information

How To Protect Your Credit Card Information From Being Stolen

How To Protect Your Credit Card Information From Being Stolen Visa Account Information Security Tool Kit Welcome to the Visa Account Information Security Program 2 Contents 1. Securing cardholder data is everyone s concern 4 2. Visa Account Information Security (AIS)

More information

Why is online backup replacing tape? WHITEPAPER

Why is online backup replacing tape? WHITEPAPER Why is online backup replacing tape? WHITEPAPER By 2008, the majority of data restores will occur from disk, not from tape. Gartner Group www.jcom.co.uk/cloudsecure 1 As there are many shortcomings of

More information

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions CORE Security +1 617.399-6980 info@coresecurity.com www.coresecurity.com blog.coresecurity.com Preempting

More information

Why Data Security is Critical to Your Brand

Why Data Security is Critical to Your Brand Why Data Security is Critical to Your Brand Why security is critical to your brand Cybercriminals do not discriminate based on industry or business size. Security is expensive. At least, it is if you wait

More information

DELIVERING SERVICE DIFFERENTIATION THROUGH CUSTOMER EXPERIENCE. Delivering service differentiation through customer experience

DELIVERING SERVICE DIFFERENTIATION THROUGH CUSTOMER EXPERIENCE. Delivering service differentiation through customer experience Delivering service differentiation through customer experience CHASE RESPONSE MAY 2010 The marketplace Companies are facing an increasingly competitive landscape where the battle for market share and changing

More information

FFIEC BUSINESS ACCOUNT GUIDANCE

FFIEC BUSINESS ACCOUNT GUIDANCE FFIEC BUSINESS ACCOUNT GUIDANCE New financial standards will assist credit unions and business account holders to make online banking safer and more secure from account hijacking and unauthorized funds

More information

Here are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online.

Here are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online. Here are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online. FFIEC BUSINESS ACCOUNT GUIDANCE New financial standards will assist credit

More information

Think Data Breaches Can t Happen To You? Think Again. A Look Into Recent Breaches and How to Defend Against Them

Think Data Breaches Can t Happen To You? Think Again. A Look Into Recent Breaches and How to Defend Against Them www.netforensics.com NETFORENSICS WHITE PAPER Think Data Breaches Can t Happen To You? Think Again. A Look Into Recent Breaches and How to Defend Against Them The Current State of Affairs Corporations

More information

Managing data security and privacy risk of third-party vendors

Managing data security and privacy risk of third-party vendors Managing data security and privacy risk of third-party vendors The use of third-party vendors for key business functions is here to stay. Routine sharing of critical information assets, including protected

More information

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches

More information

Automotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy

Automotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy CONSUMER INFORMATION SOLUTIONS Automotive Services Tools for dealers, lenders and industry service providers that drive profitable results in today s economy Reach the right prospects Automotive solutions

More information

Card Not Present Fraud Webinar Transcript

Card Not Present Fraud Webinar Transcript Card Not Present Fraud Webinar Transcript All right let s go ahead and get things started, and to do that, I d like to turn it over to Fae Ghormley. Fae? Thank you for giving us this opportunity to share

More information

Deception scams drive increase in financial fraud

Deception scams drive increase in financial fraud ADDRESS 2 Thomas More Square London E1W 1YN WEBSITE www.financialfraudaction.org.uk DIRECT LINE 020 3217 8436 NEWS RELEASE EMAIL press@ukcards-ffauk.org.uk Deception scams drive increase in financial fraud

More information

CORPORATE IDENTITY FRAUD: A PRIMER

CORPORATE IDENTITY FRAUD: A PRIMER CORPORATE IDENTITY FRAUD: A PRIMER Hanim Norza Baba, Head of Graduate Studies Center, Universiti Teknologi MARA, Melaka, Malaysia. drhanimnorzababa@gmail.com ABSTRACT Corporate identity fraud occurs when

More information

Green University. Identity Theft Prevention Program. Effective beginning October 31, 2008

Green University. Identity Theft Prevention Program. Effective beginning October 31, 2008 Green University Identity Theft Prevention Program Effective beginning October 31, 2008 1 I. PROGRAM ADOPTION Green University ( University ) developed this Identity Theft Prevention Program ("Program")

More information

CREDIT CARD FRAUD PREVENTION IN NONPROFITS

CREDIT CARD FRAUD PREVENTION IN NONPROFITS CREDIT CARD FRAUD PREVENTION IN NONPROFITS TABLE OF CONTENTS 01 01 01 02 02 03 03 04 05 05 FRAUDULENT CREDIT CARD TRANSACTIONS AND IN WHAT WAYS CHARITIES ARE AT RISK CARD TUMBLING ONLINE AUCTION FRAUD

More information

ERM Symposium April 2009. Moderator Nancy Bennett

ERM Symposium April 2009. Moderator Nancy Bennett ERM Symposium April 2009 RI4-Implementing a Comprehensive Privacy Program John Kelly Joseph Nocera Moderator Nancy Bennett Data & Identity Theft: Keeping sensitive data out of the wrong hands Presented

More information

Combating a new generation of cybercriminal with in-depth security monitoring

Combating a new generation of cybercriminal with in-depth security monitoring Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.

More information

Data Breaches, Identity Theft, and Employees

Data Breaches, Identity Theft, and Employees Data Breaches, Identity Theft, and Employees Joining the Dots and Dispelling the Myths What you ll learn Data Breaches + identity theft + employees Data Breaches or Data Donations? Data Breaches + Identity

More information

CYBER SECURITY, A GROWING CIO PRIORITY

CYBER SECURITY, A GROWING CIO PRIORITY www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------

More information

How To Create An Insight Analysis For Cyber Security

How To Create An Insight Analysis For Cyber Security IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics

More information

Sage ERP MAS I White Paper. Payment Processing Trends, Tips, and Tricks: What You Need to Know

Sage ERP MAS I White Paper. Payment Processing Trends, Tips, and Tricks: What You Need to Know I White Paper What You Need to Know Over the past few years, credit and debit card acceptance has come on the scene as a required payment option. Similarly, the number of customers using credit and debit

More information

7 Steps to Protect Your Company from a Data Breach

7 Steps to Protect Your Company from a Data Breach 7 Steps to Protect Your Company from a Data Breach August 11, 2015 Michael Pinna and Stuart Nussbaum Millions of government personnel files were recently compromised as part of a malicious hacking of the

More information

Plan of Attack 5 Step Plan

Plan of Attack 5 Step Plan Plan of Attack 5 Step Plan Naming those Digital Assets Practicing Digital Doomsday Training + Policies and Procedures Technology Tuning Security in the Supply Chain Next Steps Sample Plan 0 to 30 Days

More information

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123 Cybersecurity: A Growing Concern for Small Businesses Copyright Materials This presentation is protected by US and International Copyright

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

Now is the time for a fresh approach to detecting fraud

Now is the time for a fresh approach to detecting fraud Now is the time for a fresh approach to detecting fraud Learn where today s fraud detection falls short and what you can do about it. Read on. Table of Contents Now is the time for a fresh approach to

More information

IBM Software Four steps to a proactive big data security and privacy strategy

IBM Software Four steps to a proactive big data security and privacy strategy Four steps to a proactive big data security and privacy strategy Elevate data security to the boardroom agenda Contents 2 Introduction You ve probably heard the saying Data is the new oil. Just as raw

More information

Sage 100 ERP I White Paper. Payment Processing Trends, Tips, and Tricks: What You Need to Know

Sage 100 ERP I White Paper. Payment Processing Trends, Tips, and Tricks: What You Need to Know Sage 100 ERP I White Paper What You Need to Know Over the past few years, credit and debit card acceptance has come on the scene as a required payment option. Similarly, the number of customers using credit

More information

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3 GLOBAL ADVANCED THREAT LANDSCAPE SURVEY 2014 TABLE OF CONTENTS Executive Summary 3 Snowden and Retail Breaches Influencing Security Strategies 3 Attackers are on the Inside Protect Your Privileges 3 Third-Party

More information

The EBF would like to take the opportunity to note few general remarks on key issues as follows:

The EBF would like to take the opportunity to note few general remarks on key issues as follows: Ref.:EBF_001314 Brussels, 17 June 2013 Launched in 1960, the European Banking Federation is the voice of the European banking sector from the European Union and European Free Trade Association countries.

More information

Drive your fraud rates down

Drive your fraud rates down Drive your fraud rates down Drive your fraud rates down To a greater or lesser extent, fraud concerns almost everyone involved in e-business. With margins tight and competition fierce, the prospect of

More information

CyberSource Payment Security. with PCI DSS Tokenization Guidelines

CyberSource Payment Security. with PCI DSS Tokenization Guidelines CyberSource Payment Security Compliance The PCI Security Standards Council has published guidelines on tokenization, providing all merchants who store, process, or transmit cardholder data with guidance

More information

3 Top Big Data Use Cases in Financial Services

3 Top Big Data Use Cases in Financial Services FINANCIAL SERVICES USE CASE EBOOK 3 Top Big Data Use Cases in Financial Services How Financial Services Companies are Gaining Momentum in Big Data Analytics and Getting Results INTRODUCTION Helping Financial

More information

WHITE PAPER Moving Beyond the FFIEC Guidelines

WHITE PAPER Moving Beyond the FFIEC Guidelines WHITE PAPER Moving Beyond the FFIEC Guidelines How Device Reputation Offers Protection Against Future Security Threats Table of Contents Introduction 1 The FFIEC Guidelines 2 Why Move Beyond Complex Device

More information

IN CASE OF EMERGENCY. A guide for managing a data breach quickly and confidently

IN CASE OF EMERGENCY. A guide for managing a data breach quickly and confidently IN CASE OF EMERGENCY A guide for managing a data breach quickly and confidently The number of breaches increased 47% in 2008. Source: Identity Theft Resource Center. ITRC Breach Report 2008 Final. January

More information

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015 Cybersecurity: A Growing Concern for All Businesses RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015 RLI Design Professionals is a Registered Provider with The American

More information

BT Assure Threat Intelligence

BT Assure Threat Intelligence BT Assure Threat Intelligence Providing you with the intelligence to help keep your organisation safe BT Assure. Security that matters At all times, organisations are vulnerable to all kinds of cyber attacks

More information

Find the digital fingerprints of fraud in the financial services industry

Find the digital fingerprints of fraud in the financial services industry Find the digital fingerprints of fraud in the financial services industry Velocity and pattern detection tool adds powerful capabilities for next-generation fraud management Gasan Awad Vice President,

More information

Standard: Information Security Incident Management

Standard: Information Security Incident Management Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of

More information

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting

More information

Fraudulent accounts in collections: improve detection and reduce collector workload. An Experian briefing paper

Fraudulent accounts in collections: improve detection and reduce collector workload. An Experian briefing paper Fraudulent accounts in collections: improve detection and reduce collector workload An Experian briefing paper September 2010 1. The inter-relationship of fraud and collections The fraud and collections

More information

Identity Theft Prevention Program

Identity Theft Prevention Program Identity Theft Prevention Program DATE: 10/22/2015 VERSION 2015-1.0 Abstract Purpose of this document is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity

More information

PHYSICAL SECURITY. A Primer and a Story of Why it s Necessary

PHYSICAL SECURITY. A Primer and a Story of Why it s Necessary PHYSICAL SECURITY A Primer and a Story of Why it s Necessary 1 What Is PhySec? Physical Security consists of physical, logical and design measures which protect people, physical property and other assets

More information

NINE WAYS TO GET YOUR SALESPEOPLE TO FOLLOW UP ON MORE LEADS by Mari Anne Vanella The Vanella Group, Inc

NINE WAYS TO GET YOUR SALESPEOPLE TO FOLLOW UP ON MORE LEADS by Mari Anne Vanella The Vanella Group, Inc NINE WAYS TO GET YOUR SALESPEOPLE TO FOLLOW UP ON MORE LEADS by Mari Anne Vanella The Vanella Group, Inc Despite advances in CRM, Marketing Automation, and Lead Management, there are still too many leads

More information

SMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015

SMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015 SMB Data Breach Risk Management Best Practices By Mark Pribish February 19, 2015 Presentation Agenda About Mark Pribish Information Governance The Threat Landscape Data Breach Trends Legislative and Regulatory

More information

OVERVIEW. With just 10,000 customers in your database, the cost of a data breach averages more than $2 million.

OVERVIEW. With just 10,000 customers in your database, the cost of a data breach averages more than $2 million. Security PLAYBOOK OVERVIEW Today, security threats to retail organizations leave little margin for error. Retailers face increasingly complex security challenges persistent threats that can undermine the

More information

S22 - Employee and Customer Awareness Turning Vulnerabilities Into Sentries John Sapp

S22 - Employee and Customer Awareness Turning Vulnerabilities Into Sentries John Sapp S22 - Employee and Customer Awareness Turning Vulnerabilities Into Sentries John Sapp Employee and Customer Awareness Turning Vulnerabilities Into Sentries What You Will Learn Data Breaches + employees

More information

FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES

FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5,500 companies in 26 countries around the world

More information

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the

More information

COUNCIL POLICY NO. C-13

COUNCIL POLICY NO. C-13 COUNCIL POLICY NO. C-13 TITLE: POLICY: Identity Theft Prevention Program See attachment. REFERENCE: Salem City Council Finance Committee Report dated November 7, 2011, Agenda Item No. 3 (a) Supplants Administrative

More information

WHITE PAPER Fighting Banking Fraud Without Driving Away Customers

WHITE PAPER Fighting Banking Fraud Without Driving Away Customers WHITE PAPER Fighting Banking Fraud Without Driving Away Customers Effective Methods for Targeting Cybercrime in Financial Services Table of Contents Introduction 1 Stopping Fraud: One Goal Among Many 2

More information

Online security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat.

Online security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat. Defeating cybercriminals Protecting online banking clients in a rapidly evolving online environment The threat As the pace of technological change accelerates, so does the resourcefulness and ingenuity

More information

Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14

Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14 Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14 I. PROGRAM ADOPTION The Village of Brockport ( Village ) developed this Identity Theft Prevention Program

More information

www.trustvesta.com VESTA CORPORATION WHITEPAPER Payment Card Industry Data Security Standards (PCI DSS) and Mobile Operators: Trends and Implications

www.trustvesta.com VESTA CORPORATION WHITEPAPER Payment Card Industry Data Security Standards (PCI DSS) and Mobile Operators: Trends and Implications www.trustvesta.com VESTA CORPORATION WHITEPAPER Payment Card Industry Data Security Standards (PCI DSS) and Mobile Operators: Trends and Implications About this paper There have been numerous data breaches

More information

RANDOLPH COUNTY PUBLIC WORKS. Identity Theft Prevention Program. Adopted September 1, 2009 Effective beginning September 1, 2009

RANDOLPH COUNTY PUBLIC WORKS. Identity Theft Prevention Program. Adopted September 1, 2009 Effective beginning September 1, 2009 RANDOLPH COUNTY PUBLIC WORKS Identity Theft Prevention Program Adopted September 1, 2009 Effective beginning September 1, 2009 I. PROGRAM ADOPTION The Randolph County Public Works Department ( the Department

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

Cloud Contact Center. Security White Paper

Cloud Contact Center. Security White Paper Cloud Contact Center Security White Paper Introduction Customers communicate with organizations in a variety of forms from phone conversations to email, web chat and social media. As each interaction may

More information

Surviving the Era of Hack Attacks Cyber Security on a Global Scale

Surviving the Era of Hack Attacks Cyber Security on a Global Scale Surviving the Era of Hack Attacks Cyber Security on a Global Scale Dr. Adriana Sanford ASU Lincoln Professor of Global Corporate Compliance and Ethics Clinical Associate Professor of Law and Ethics This

More information

GETTING PHYSICAL WITH NETWORK SECURITY WHITE PAPER

GETTING PHYSICAL WITH NETWORK SECURITY WHITE PAPER GETTING PHYSICAL WITH NETWORK SECURITY WHITE PAPER Molex Premise Networks EXECUTIVE SUMMARY This article discusses IT security, which is a well documented and widely discussed issue. However, despite the

More information

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg. ACCG Identity Theft Prevention Program ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.org July 2009 Contents Summary of ACCG Identity Theft Prevention Program...

More information

Holiday Fraud Myths. How They Leave Retailers Vulnerable

Holiday Fraud Myths. How They Leave Retailers Vulnerable Holiday Fraud Myths How They Leave Retailers Vulnerable Table of Contents 03 04 06 08 10 12 14 Introduction Myth #1 Digital Gift Cards Myth #2 Distance, Dollar and Expedite Myth #3 Machine vs. Manual Review

More information

Security Breach: 10 Industries Impacted

Security Breach: 10 Industries Impacted WWW.IBISWORLD.COM April 2013 1 April 2013 Security Breach: 10 Industries Impacted By David Yang Digital information and web-based business are driving demand for increased cyber security. IBISWorld identifies

More information

PCI Compliance: Protection Against Data Breaches

PCI Compliance: Protection Against Data Breaches Protection Against Data Breaches Get Started Now: 877.611.6342 to learn more. www.megapath.com The Growing Impact of Data Breaches Since 2005, there have been 4,579 data breaches (disclosed through 2013)

More information

A Whitepaper by Vesta Corporation. Payment Card Industry Data Security Standards (PCI DSS) and Mobile Operators: Trends and Implications

A Whitepaper by Vesta Corporation. Payment Card Industry Data Security Standards (PCI DSS) and Mobile Operators: Trends and Implications A Whitepaper by Vesta Corporation Payment Card Industry Data Security Standards (PCI DSS) and Mobile Operators: Trends and Implications About This Paper There have been numerous data breaches both announced

More information