PROTECTING YOUR CALL CENTERS AGAINST PHONE FRAUD & SOCIAL ENGINEERING A WHITEPAPER BY PINDROP SECURITY
|
|
|
- Hilary Hampton
- 10 years ago
- Views:
Transcription
1 PROTECTING YOUR CALL CENTERS AGAINST PHONE FRAUD & SOCIAL ENGINEERING A WHITEPAPER BY PINDROP SECURITY
2 TABLE OF CONTENTS Executive Summary... 3 The Evolution of Bank Theft... Phone Channel Vulnerabilities Financial Institution Fraud Attacks Defenses Pindrop Security Technology... The Pindrop Ecosystem Accuracy Pindrop Solutions Fraud Detection System Phone Reputation Service Phone Fraud Assessment Call Forward Protection About Pindrop Security PINDROPSECURITY.COM
3 EXECUTIVE SUMMARY Phone fraud is a growing problem for financial institutions due to its ease, low risk and low cost. It comes in many forms with attacks in the call center, in automated account management systems, and outbound verification systems. It costs financial institutions in terms of losses, call center time and expense and incident response. It also erodes trust with customers. This paper will explore the costs and issues around phone fraud and then explore a solution that can alleviate this issue for institutions. 3 PINDROPSECURITY.COM
4 THE MODERN BANK ROBBER Phone attacks against financial institutions (and anyone else with a call center or toll free number) are increasing rapidly, with the first half of 2013 seeing almost as many attacks as all of the prior year 1. Why? As opposed to physically robbing a bank or hacking into the network, the phone channel is quite vulnerable, with little defense in place. Phone Channel Vulnerabilities The phone system presents a perfect storm of characteristics, both new and old, that invite malicious abuse. Caller ID is broken Caller ID (CID) and Automatic Number Identification (ANI), two systems designed to provide information on callers, actually have no security built-in or available. They originally were designed to be used internally by the phone companies no security needed. The result is that spoofing Caller ID data is very easy for instance, one smartphone app, Caller ID Faker, has over 1,000,000 downloads. The app even includes voice-masking features. One person s practical joke app is another person s fraud tool. It s cheap and easy With the rapid spread in VoIP networks beginning in the 1990 s, the world of telecommunications has changed significantly. The cost of long distance calls has fallen drastically, making it practical to call the US from anywhere in the world cheaply. VoIP allows wide use of PC applications to perform a wide range of activities, many beyond the scope or intent of the phone network. This includes automated dialing and easy-to-use spoofing technology. 1 Pindrop Security, State of Phone Fraud Report 4 PINDROPSECURITY.COM
5 No metadata Every phone call traverses multiple networks, no two of which is exactly alike. In fact, even if you use your cell to call your landline while standing next to your home phone, you re using at least two networks. Since phone networks are also very bad at sharing information with each other about the call, the only data to get through every network the call traverses is the actual call audio. There is no data shared that provides caller verification or origination. And even call audio suffers degradation we ve all experienced poor quality calls. The recipient of a phone call cannot count on any information about the caller coming through intact. Financial Institution Fraud Attacks Total bank fraud losses are around $4 billion per year and it s estimated that from 30% to 50% of fraud incidents is initiated with a phone call 1. Phone fraud is also frequently combined with online and in-person fraud, particularly to gather information or escalate privilege prior to the actual fund transfer attack. The main problem areas for financial institutions are: Call centers Talking to a call center representative presents a fraudster with several advantages. First, fraudsters are typically professional social engineers they are experts at manipulating people. Second, call center representatives rightfully prioritize being helpful they want the customer to get the password right or successfully complete the transaction. Third, despite the overall fraud call volume being high, the average call center representative will only be dealing with a fraudster once in approximately every 2000 calls. Identifying and handling a fraudster is not a core competency for that rep. Once on the phone, the fraudster may attempt a direct attack, stealing funds via a wire transfer. They may request a rush or replacement card and then max out the card with purchases. If they don t have all the credentials or access they need, they may opt to take more innocuous steps in order to set up a future attack. A change to the address, phone number or allows them to transfer the point of contact to an asset they own. They can claim to be a customer who will be traveling oversees (known as travel strategy modification ) resulting in lower fraud alerting levels at the bank. 2 Identity Theft Tops FTC Complaints in PINDROPSECURITY.COM
6 The only defense against these fraudsters is the asking of a few personal questions (known as knowledge-based authentication or KBA). If a fraudster can provide that information, the ability to move funds is practically unrestricted. Automated phone systems Fraudsters can also steal from you and your customers without talking to a representative. Automated systems or IVR s (interactive voice response) systems allow a wide range of account activities that allow a fraudster to make substantial inroads to taking over an account. As with a live rep, getting an account address, or phone number changed can allow a fraudster to order a replacement credit or debit card and then clean funds out of an account. And they only need access to the account for a few hours prior to detection to be successful. In addition, fraudsters will check account balances on accounts to identify high value targets. Even high dollar transactions can be completed using automated systems and the website but with an additional out-of-band step for verification. Typically, this is a phone call to the number registered to the account that asks for a code provided by the website to be entered. The weakness in this system is if the registered phone number has been forwarded or otherwise redirected to a different number. New accounts Many fraud schemes require a legitimate account at the targeted bank. These include both phone-based and online attacks. When accounts are set up, the fraudster will likely use a real phone number as it may be required to verify the account owner. These accounts are lurking in banks now. They took time and money to set up and they are ready to be used to support fraud schemes. After-action incident response and forensics When fraud has occurred or is suspected, fraud teams go into action. Most phone fraud investigations, whether formal or informal, start by looking up the phone number in a search engine, number lookup site or official records database. None of these sources is particularly helpful - the information available is inconsistent and anecdotal. From there, analysts may need to call the number or contact third parties such as telco s. Again, results tend to be unsatisfying and the process is time-consuming, expensive and frustrating. 6 PINDROPSECURITY.COM
7 Telecommunication costs A novel attack that is impacting financial institutions and other industries that combine toll-free numbers with extensive automation of call systems, traffic pumping costs banks money for nonbusiness calls. Specifically, calls are made to a banks automated, toll-free line and then continued through maximization of pauses and automatic transfers, to use as much time as possible before a live agent finally realizes the call is bogus and terminates. The local exchange carrier that originated the call is entitled to intercarrier transfer fees from the bank s telecommunication provider, which, in turn, is charging the bank. Typically, the local exchange carrier has commissioned the attack. There are many points of vulnerability. What can be done to protect them? Defenses We re all familiar with the leading deterrent to phone fraud - companies grill customers with questions. Knowledgebased authentication (KBA), examples include asking for your mother s maiden name, high school mascot, pet s name. It s not very sophisticated, it s very expensive (in excess of $10 billion a year) and it s not very effective. Not only are many of the answers easy to guess or bluff but call center reps who are focused first on customer service actively help callers answer the questions correctly. A variety of technologies have been developed to address this problem. Analyzing the caller s voice, which is known as voice biometrics, focuses on authenticating callers to detect known bad actors and to positively identify bank customers. This is useful for authentication of customers but not for detecting fraud. Call verification tries to confirm if the caller is who they claim to be using call signaling information. This method is highly inconsistent, depending heavily on the originating callers provider network and device type. While each of these methods has value, as stand-alone solutions their value doesn t justify the cost of deployment. Combined, they start to add up to an answer to the problem. 7 PINDROPSECURITY.COM
8 A Viable Solution In order to justify the time and cost of deployment, a solution would need to be able to do the following: Identify new attackers before they can do damage. Identify attackers in all parts of the phone infrastructure: live calls, recorded calls, automated answering systems and outbound calling systems. Use both phone number or call audio to identify and quantify fraud risk. PINDROP SECURITY TECHNOLOGY At Pindrop Security, our mission is to restore trust in the phone channel by providing a set of solutions that deliver the protections we ve outlined above. The Pindrop Fraud Detection System (FDS) is designed to analyze all aspects of the call to detect indicators of fraud. We are able to identify tactics such as Caller ID spoofing, voice distortion and autodialers. We track reputation including high volume callers, association with fraud rings, and past fraud. And we track callers, both good and bad, across the globe. At the core of Pindrop is a unique technology called phoneprinting which analyzes the audio content of the call itself. Phoneprinting isolates and analyzes 147 characteristics of each call and, from this, determine the caller s geography and the calling device type and therefore identify spoofing. At our customer sites, phoneprinting alone reveals over 80% of fraud calls immediately upon receipt of the first call. In addition, Pindrop Security s technology creates a unique fingerprint tied to the call. This fingerprint will identify a fraudster (or legitimate customer) regardless if the voice is manipulated, the number is changed or spoofed, or even if the caller is changed (as in a fraud ring or fraud call center). No other solution can do this. 8 PINDROPSECURITY.COM
9 PHONE FINGERPRINTING CALL AUDIO 147 audio features in each fingerprint LOSS Packet loss Robotization Dropped frames SPECTRUM Quantization Frequency taggers Codec artifacts NOISE Clarity Correlation Signal-to-noise ratio 86 PHONE TYPE GEO-LOCATION RISK SCORE About Phoneprinting The phoneprint is the key to Pindrop Security s solutions. By analyzing less than 20 seconds of audio, we can match the fingerprint and identify fraudsters. Or, if all you have is a phone number, we can identify if that number has ever been attached to a suspicious fingerprint. What Does a Phoneprint Tell You? Spoofed Call The caller is hiding their true number or impersonating another person True Location Where the call is really coming from? True Device Type Whether the caller is using a Cell, Landline or VoIP to place the call? If VoIP, which network? Recognized Caller Has the caller been seen before? 9 PINDROPSECURITY.COM
10 Phoneprinting Accuracy Pindrop s phoneprint technology is highly accurate. It is able to determine the location of the caller and the type of device being used to originate the call (VoIP, Cell, Land) even the network type for VoIP calls (Skype, etc.) with over 90% accuracy. While this information alone is enough to determine fraud, we go further by then matching the fingerprint to our database of fraud rings and repeat fraudsters. Typically, a fraudster will have a large number of phone numbers and will have targeted many institutions. This information is made available as well, to assist fraud and incident response teams. Our fingerprint matching is over 99% accurate. INPUTS AUTOMATED ANALYSIS PRODUCTS ENTERPRISE TRAFFIC PORTAL Reputation lookup Call Centers Recorded Calls Web-based access PindropSecurity.com Anti-Fraud Teams CONSUMERS Complaints Web Phones ATTACK DATA Active Recon Reputation Analysis Acoustical Fingerprinting ENTERPRISE API Reputation lookup Application integration FRAUD DETECTION Live call analysis Recorded call analysis IVR call analysis IDENTITY VERIFICATION Authentication Phoneypots Spam/Phishing Social Networks MOBILE PROTECTION Smartphone apps Caller ID integration About The Pindrop Consortium The Pindrop Consortium feeds our phone number and caller reputation database. The Consortium leverages information from our enterprise customer calls, consumer call data and specialized monitoring systems developed by Pindrop. The result is reputation information based on millions of calls and phone numbers available in real-time to protect your enterprise. 10 PINDROPSECURITY.COM
11 PINDROP SOLUTIONS Pindrop offers several solutions; each designed to address specific fraud risk areas within financial institutions. Together, they provide a complimentary and complete solution for financial institution phone fraud. Fraud Detection System Pindrop Security s Fraud Detection System (FDS) analyzes phone calls to identify fraudulent callers. FDS analyzes live or recorded call audio to identify call spoofing and other indicators of fraud by providing a highly accurate call risk score. It verifies location and call type and matches it against Caller ID or ANI data to identify spoofing. It also creates a unique fingerprint for the caller and compares the fingerprint to our database of known fraud rings and repeat fraudsters regardless of the real or spoofed number they are using (VoIP, Cell, Land) even the network type for VoIP calls (Skype, etc.) with over 90% accuracy. But phoneprints are not the only tool in the Fraud Detection System. In addition, FDS includes the following technologies: Voice biometrics are used to track unique individuals for both blacklisting and whitelisting purposes. Reputation provides real-time updates on the behavior of the phone number and the caller, including call volume, past fraud or suspicious activity, complaints and association with risky networks, devices, callers and locales. This data is gathered from our consortium of customers and partners as well as tracking of robo-dialers and automated calling systems. What Does FDS Provide? Call analysis technology that can determine the actual location and device type used by a caller and compare it to Caller ID or ANI information to determine spoofing and fraud. Unique call fingerprint that allows you to match the caller to other fraud attempts and examine their fraud history. Non-intrusive validation of customers through transparent location and device type verification. 11 PINDROPSECURITY.COM
12 How Do Financial Institutions Use FDS? FDS is deployed widely across financial institutions to address a variety of problems. It is used by call centers, fraud investigators, incident response teams and automated systems, to quickly evaluate callers as part of their anti-fraud and transaction approval processes. FDS finds fraudsters already active in your account-base, as well as both known and unknown fraudsters at first contact blocking them before they ever consume your time or resources, let alone steal from you. FDS also allows financial institutions to reduce the burden of proving identity on their customers while improving their prevention of fraud through identification of deception techniques such as call spoofing. 12 PINDROPSECURITY.COM
13 Phone Reputation Service For situations in which call audio is not available, we offer Pindrop Security s Phone Reputation Service (PRS), the world s largest and most accurate database of fraudulent phone numbers. PRS assigns a unique risk score to every number and provides detailed information, including geography, phone type, and, if a fraud number, specific institutions targeted, attack frequency and other numbers used by the attacking entity. The PRS is either accessed via a web-based interface or directly integrated into your application via an API. PRS displays fraud activities and trends, provides actionable intelligence on suspect numbers, and allows the creation of fraud alerts. What Does PRS Provide? Access to the largest, most comprehensive phone number database with geographic locations, network providers, phone types and any fraud activity history. Aggregated intelligence from our phone honeypots ( phoneypots ), spam traps and complaint collectors as well as intelligence from our customer base. Configurable alerting on numbers that are currently targeting enterprises or their customers. How Do Financial Institutions Use PRS? PRS is used in several ways by financial institutions: Block unwanted calls by detecting spam numbers and blocking. Detect attacks on customers by proactively identifying numbers that are impersonating the enterprise and calling their customers. Investigate incidents by running phone numbers and analyzing calls associated with an incident. Verify new customers by checking risk score on provided numbers. Detect future attacks by checking phone number changes in existing accounts. 13 PINDROPSECURITY.COM
14 FRAUD IVR CSR RECORDED CALL STORE Phone Audio Audio number checked checked FULL PINDROP SECURITY SOLUTION lookup during CSR call after call call stared stored Detect Fraud at IVR Detect Fraud during active call Detect Fraud after call completed Phone Reputation System Fraud Detection System Fraud Detection System Pindrop technology can be deployed to protect the entire phone infrastructure of an enterprise. ABOUT PINDROP SECURITY Pindrop Security, headquartered in Atlanta, Ga., is a privately-held company that provides enterprise solutions that help prevent phone-based fraud. Its breakthrough phoneprinting technology can identify phone devices uniquely just from the call audio thereby detecting fraudulent calls as well as authenticating legitimate callers. We have helped enterprises eliminate financial losses and reduce operational costs on their phone channel. Pindrop s customers include two of the top five banks and one of the leading online brokerages. Named SC Magazine 2013 Rookie Security Company of the Year, a Gartner Cool Vendor in Enterprise Unified Communications and Network Services, Pindrop Security s solutions restore enterprises confidence in the security of phone-based transactions. 14 PINDROPSECURITY.COM
PHONE FRAUD & SOCIAL ENGINEERING: HOW THE MODERN THIEF ROBS A BANK A WHITEPAPER BY PINDROP SECURITY
PHONE FRAUD & SOCIAL ENGINEERING: HOW THE MODERN THIEF ROBS A BANK A WHITEPAPER BY PINDROP SECURITY TABLE OF CONTENTS Executive Summary... 3 The Evolution of Bank Theft... Phone Channel Vulnerabilities
Using Voice Biometrics in the Call Center. Best Practices for Authentication and Anti-Fraud Technology Deployment
Using Voice Biometrics in the Call Center Best Practices for Authentication and Anti-Fraud Technology Deployment This whitepaper is designed for executives and managers considering voice biometrics to
FFIEC CONSUMER GUIDANCE
FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their
VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======
VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== Table of Contents Introduction to VoIP Security... 2 Meet Our Expert - Momentum Telecom... 2 BroadWorks... 2 VoIP Vulnerabilities... 3 Call
Fraud Threat Intelligence
About ERM About The Speaker Safe Browsing, Monitoring Services Product Manager, Easy Solutions Inc. 8+ years anti-fraud, fraud risk, and security intelligence programs Previously licensed Securities Principle
Improve Your Call Center Performance 7 Ways A Dynamic KBA Solution Helps. An IDology, Inc. Whitepaper
Improve Your Call Center Performance 7 Ways A Dynamic KBA Solution Helps An IDology, Inc. Whitepaper Delivering a pleasant consumer experience on the phone is a make or break opportunity for creating positive
WHITE PAPER Fighting Banking Fraud Without Driving Away Customers
WHITE PAPER Fighting Banking Fraud Without Driving Away Customers Effective Methods for Targeting Cybercrime in Financial Services Table of Contents Introduction 1 Stopping Fraud: One Goal Among Many 2
WHITE PAPER Moving Beyond the FFIEC Guidelines
WHITE PAPER Moving Beyond the FFIEC Guidelines How Device Reputation Offers Protection Against Future Security Threats Table of Contents Introduction 1 The FFIEC Guidelines 2 Why Move Beyond Complex Device
White Paper. FFIEC Authentication Compliance Using SecureAuth IdP
White Paper FFIEC Authentication Compliance Using SecureAuth IdP September 2015 Introduction Financial institutions today face an important challenge: They need to comply with guidelines established by
TELECOM FRAUD CALL SCENARIOS
TELECOM FRAUD CALL SCENARIOS Contents Introduction to Telecom Fraud... 2 Three Major Categories of Telecom Fraud... 2 Premium Rate Numbers... 2 Traffic Pumping Schemes... 2 Call Forwarding Fraud... 3 Multiple
Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath
ebook Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath Protecting against downstream fraud attacks in the wake of large-scale security breaches. Digital companies can no longer trust static login
THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.
THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer. Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from
FROM INBOX TO ACTION EMAIL AND THREAT INTELLIGENCE:
WHITE PAPER EMAIL AND THREAT INTELLIGENCE: FROM INBOX TO ACTION There is danger in your email box. You know it, and so does everyone else. The term phishing is now part of our daily lexicon, and even if
Guide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
Supplement to Authentication in an Internet Banking Environment
Federal Financial Institutions Examination Council 3501 Fairfax Drive Room B7081a Arlington, VA 22226-3550 (703) 516-5588 FAX (703) 562-6446 http://www.ffiec.gov Purpose Supplement to Authentication in
Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper
Spotting ID Theft Red Flags A Guide for FACTA Compliance An IDology, Inc. Whitepaper With a November 1 st deadline looming for financial companies and creditors to comply with Sections 114 and 315 of the
AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes
AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,
Evaluating DMARC Effectiveness for the Financial Services Industry
Evaluating DMARC Effectiveness for the Financial Services Industry by Robert Holmes General Manager, Email Fraud Protection Return Path Executive Summary Email spoofing steadily increases annually. DMARC
OIG Fraud Alert Phishing
U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a
WHITE PAPER. Internet Gambling Sites. Expose Fraud Rings and Stop Repeat Offenders with Device Reputation
WHITE PAPER Internet Gambling Sites Expose Fraud Rings and Stop Repeat Offenders with Device Reputation Table of Contents Confident Casinos: How to stop fraud before it starts 1 Organized Fraud: A Growing
PBX Fraud Educational Information for PBX Customers
PBX Fraud Educational Information for PBX Customers Telephone Hackers Hit Where It Hurts: Your Wallet Telephone hacking is unauthorized or fraudulent activities that can affect your telephone system, and
Securing Office 365 with Symantec
January, 2016 Solution Overview: Enterprise Security Adoption of Microsoft Office 365, Google Apps, and other cloud-based productivity solutions is growing. Microsoft in its Ignite 2015 session claimed
Voice Authentication On-Demand: Your Voice as Your Key
Voice Authentication On-Demand: Your Voice as Your Key Paul Watson, Vice President Relationship Technology Management Voice Search Conference March 2-4, 2009 Convergys Corporation A Global Leader in Relationship
Table of Contents. Page 2/13
Page 1/13 Table of Contents Introduction...3 Top Reasons Firewalls Are Not Enough...3 Extreme Vulnerabilities...3 TD Ameritrade Security Breach...3 OWASP s Top 10 Web Application Security Vulnerabilities
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense By: Daniel Harkness, Chris Strasburg, and Scott Pinkerton The Challenge The Internet is an integral part of daily
TESTIMONY OF HENNING SCHULZRINNE Levi Professor of Computer Science and Electrical Engineering Columbia University SENATE AGING COMMITTEE
TESTIMONY OF HENNING SCHULZRINNE Levi Professor of Computer Science and Electrical Engineering Columbia University SENATE AGING COMMITTEE Ringing Off the Hook: Examining the Proliferation of Unwanted Calls
WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users
Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users Table of Contents How TrustDefender Mobile Works 4 Unique Capabilities and Technologies 5 Host Application Integrity
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
WHITE PAPER. Credit Issuers. Stop Application Fraud at the Source With Device Reputation
WHITE PAPER Credit Issuers Stop Application Fraud at the Source With Device Reputation Table of Contents Overview 1 Why you need more than conventional methods of fraud detection 2 It is not just credit
Protecting Online Gaming and e-commerce Companies from Fraud
Protecting Online Gaming and e-commerce Companies from Fraud White Paper July 2007 Protecting Online Gaming and e-commerce Companies from Fraud Overview In theory, conducting business online can be efficient
The Banana Phone Project:
The Banana Phone Project: A Technical Proposal for the Solution of Illegal Robocalls Alexander E. Ruiz ABSTRACT The current problem of illegal robocalls is one of intelligent software attacking archaic
Integrating MSS, SEP and NGFW to catch targeted APTs
#SymVisionEmea #SymVisionEmea Integrating MSS, SEP and NGFW to catch targeted APTs Tom Davison Information Security Practice Manager, UK&I Antonio Forzieri EMEA Solution Lead, Cyber Security 2 Information
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
Fraud Prevention Tips
Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back
A strategic approach to fraud
A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
WHITE PAPER Fighting Mobile Fraud
WHITE PAPER Fighting Mobile Fraud Protecting Businesses and Consumers from Cybercrime Table of Contents Executive Summary 1 Introduction 2 The Challenge 3 Keeping Pace with Mobile Innovation 4 Business
CALL ME: GATHERING THREAT INTELLIGENCE ON TELEPHONY SCAMS TO DETECT FRAUD. Aude Marzuoli, Ph.D. Pindrop
CALL ME: GATHERING THREAT INTELLIGENCE ON TELEPHONY SCAMS TO DETECT FRAUD Aude Marzuoli, Ph.D. Pindrop Pioneer in voice fraud prevenfon and authenfcafon helping companies eliminate phone fraud. Patented
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
WHITEPAPER. Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI
WHITEPAPER Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI About PCI DSS Compliance The widespread use of debit and credit cards in retail transactions demands
PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit
PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account
Modern two-factor authentication: Easy. Affordable. Secure.
Modern two-factor authentication: Easy. Affordable. Secure. www.duosecurity.com Your systems and users are under attack like never before The last few years have seen an unprecedented number of attacks
International Dialing and Roaming: Preventing Fraud and Revenue Leakage
page 1 of 7 International Dialing and Roaming: Preventing Fraud and Revenue Leakage Abstract By enhancing global dialing code information management, mobile and fixed operators can reduce unforeseen fraud-related
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
CA Arcot RiskFort. Overview. Benefits
PRODUCT SHEET: CA Arcot RiskFort CA Arcot RiskFort CA Arcot RiskFort provides real-time protection against identity theft and online fraud via risk based, adaptive authentication. It evaluates the fraud
Beyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
Dissecting Wire Fraud: How it Happens, and How to Prevent It WHITE PAPER
Dissecting Wire Fraud: How it Happens, and How to Prevent It WHITE PAPER 2013 Guardian Analytics. Inc. All rights reserved. Introduction Preventing wire fraud starts with understanding how it is perpetrated
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing
Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)
Security in an Increasingly Threatened World SMS: A better way of doing Two Factor Authentication (2FA) January 2015 The Proliferation of The App World The revolution of the smart phone forever affected
Layered security in authentication. An effective defense against Phishing and Pharming
1 Layered security in authentication. An effective defense against Phishing and Pharming The most widely used authentication method is the username and password. The advantages in usability for users offered
SOLUTION BRIEF PAYMENT SECURITY. How do I Balance Robust Security with a Frictionless Online Shopping Experience for Cardholders?
SOLUTION BRIEF PAYMENT SECURITY How do I Balance Robust Security with a Frictionless Online Shopping Experience for Cardholders? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT Payment Security
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
Separating Signal from Noise: Taking Threat Intelligence to the Next Level
SESSION ID: SPO2-T09 Separating Signal from Noise: Taking Threat Intelligence to the Next Level Doron Shiloach X-Force Product Manager IBM @doronshiloach Agenda Threat Intelligence Overview Current Challenges
Finding Email Security in the Cloud
WHITE PAPER: FINDING EMAIL SECURITY IN THE CLOUD Finding Email Security in the Cloud CONTENTS Introduction 3 I. Why Good Enough Security is Never Good Enough 3 Mind your security gaps 4 II. Symantec Email
Anti-Phishing Best Practices for ISPs and Mailbox Providers
Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing
Tips for Banking Online Safely
If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining
ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS
ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS ImpostorMaps is a methodology developed by Auraya and available from Auraya resellers worldwide to configure,
Your security is our priority
Your security is our priority Welcome to our Cash Management newsletter for businesses. You will find valuable information about how to limit your company s risk for fraud. We offer a wide variety of products
Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats
Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats Jody C. Patilla The Johns Hopkins University Session ID: TECH-107 Session Classification: Intermediate Objectives Get more out
ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE
ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE Purpose This document explains the benefits of using Risk Based Authentication (RBA) a dynamic method of cardholder authentication
X X X X X. Platinum Edition. Unlimited Extensions. Unlimited Auto Attendants. Unlimited Voicemail Boxes. ACD Features
Feature Name Unlimited Extensions Unlimited Auto Attendants Unlimited Voicemail Boxes ACD Features Feature Description With Evo IP-PB you can add an extension at any time, with no limits and no need to
WHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks
WHITE PAPER The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks A Cyveillance Report October 2008 EXECUTIVE SUMMARY How much do phishing attacks really cost organizations?
Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape
WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who
How To Protect Your Online Banking From Fraud
DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction
Access Mediation: Preserving Network Security and Integrity
Access Mediation: Preserving Network Security and Integrity Definition Access mediation is the process of examining and controlling signaling traffic between networks, resources and users by filtering
Information Security Field Guide to Identifying Phishing and Scams
Information Security Field Guide to Identifying Phishing and Scams 010001010100101010001010011010101010101010101 01000101010011010010100101001010 1 Contents Introduction Phishing Spear Phishing Scams Reporting
Fighting Future Fraud A Strategy for Using Big Data, Machine Learning, and Data Lakes to Fight Mobile Communications Fraud
Fighting Future Fraud A Strategy for Using Big Data, Machine Learning, and Data Lakes to Fight Mobile Communications Fraud Authored by: Dr. Ian Howells Dr. Volkmar Scharf-Katz Padraig Stapleton 1 TABLE
Metric Matters. Dain Perkins, CISSP [email protected]
Metric Matters Dain Perkins, CISSP [email protected] My Perspective Information security metrics do not show us how we need to improve our defenses Image: http://abcnews.go.com/sports/2014-fifa-world-cup-us-goalie-tim-howard/story?id=24400295
CompleteCare+ Enterprise Voice
There s more to communications than email: Unified communication and collaboration, information sharing and team productivity services Contents 1. Executive Summary 2. Introduction Enterprise-level communications
PREDICTIVE ANALYTICS IN FRAUD
PREDICTIVE ANALYTICS IN FRAUD Click Scott to White edit Master subtitle style Business Development Manager Why predict? Organizations that use predictive business performance metrics will increase their
NCUA LETTER TO CREDIT UNIONS
NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA DATE: September 2001 LETTER NO.: 01-CU-09 TO: SUBJ: Federally Insured Credit Unions Identity Theft and
Intrusion Along the Kill Chain
Intrusion Along the Kill Chain Part I: On the State of things Intrusion detection systems have been around for almost two decades as a way to attempt to fill in the gap for when preventative security fails.
INTRODUCTION. Identity Theft Crime Victim Assistance Kit
Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change
White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email
WHITE PAPER Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email EXECUTIVE SUMMARY Data Loss Prevention (DLP) monitoring products have greatly
Knowledge Based Authentication [KBA] is not just for onboarding new customers
White Paper The Role of Knowledge Based Authentication (KBA) In Identity Proofing Knowledge Based Authentication [KBA] is not just for onboarding new customers December 2013 Risk Solutions Best Practices
