Telephone Banking Authentication Practical Approaches to Securing a Popular yet Vulnerable Channel
|
|
|
- Erik Rodgers
- 10 years ago
- Views:
Transcription
1 Telephone Banking Authentication yet Vulnerable Channel March 2007
2 Overview Financial institutions (FIs) must implement effective authentication solutions that address specific, often mutually exclusive threats from different channels, while remaining in compliance with FFIEC guidelines which pertain to both telephone and online channels. With phone usage increasing over historical levels, this report provides comprehensive coverage and analysis of consumer preferences toward telephone banking, and evaluates the authentication methods currently being used by FIs for the phone channel. Building upon robust consumer data generated from a survey of 3,215 respondents, Javelin also interviewed several top FIs and authentication solutions providers to obtain qualitative input on current phone security efforts and market trends. Finally, Javelin investigates several well-known phone authentication products. Primary Questions How can FIs secure the phone channel, while maximizing efficiency and reducing costs? Which phone authentication solutions provide the best security? What phone authentication solutions are FIs using? How many consumers conduct phone banking transactions (compared to other channels)? How secure do consumers feel using the phone channel? Audience: Author: Contributors: Editor: Financial institutions and authentication solutions providers Rachel Kim, Research Associate Bruce Cundiff, Senior Analyst Mary T. Monahan, Editor Publication date: March 2007 Length: 23 pages 11 charts/graphs Price: $950
3 Table of Contents Overview. 3 Primary Questions... 3 Findings and Analysis. 3 Over One-Third Of Consumers Bank By Phone: Channel Security Is Critical... 4 Confidence High In Telephone Banking Safety Despite Fraud Potential... 6 Expect Growth In Telephone Fraud With Advent Of VOIP 7 Weak, In-Wallet Authentication Prevails On The Phone Channel 9 Fortify Phone Authentication With Risk Scoring, Voice Biometrics And KBA Vendor Solutions By Need: Comprehensive Or Component. 14 What s The Bottom Line.. 16 Related Research Appendix A: 15% Of Fraud From In-Store, Mail Or Telephone Purchases. 18 Appendix B: Online Bill Payers Have Higher Rates Of Phone Contact Then Non-Bill Payers 19 Appendix C: Telephone Channel Usage Increasing Over Historical Levels Appendix D: Two-Thirds Of Consumers Use Telephone Channel Appendix E: Passwords And Voice Recognition Are The Top Phone-Based Solutions... 22
4 Table of Figures Figure 1: Used a Phone Operated System to Perform a Banking Function 4 Figure 2: Spoke By Phone with a Bank or Credit Union Representative. 5 Figure 3: How Consumers Rate the Safety of Using a Phone Automated System... 6 Figure 4: How Consumers Rate the Safety of Speaking with a CSR... 7 Figure 5: Telephone Authentication Factors Used By Top 23 US FIs. 9 Figure 6: Phone Authentication Model.. 12 Figure 7: Sources of Identity Fraud Figure 8: Financial Activities in Past 12 Months by Bill Payer at Bank Web Site Figure 9: Consumer Financial Activities by Type and Time Period.. 20 Figure 10: Percentages of Online Consumers Who Have Ever Used these Channels 21 Figure 11: Consumers Preferred Methods of Authentication for Online Accounts 22 Companies/Organizations Mentioned in Report Verid Experian Digital Resolve TradeHarbor RSA VoiceVerified Additional Report Topics Phone authentication Call center adoption Vishing Pretexting Voice Biometrics Biometric Authentication FFIEC Compliance CSR Security VOIP Security Knowledge Based Authentication (KBA) Interactive Voice Recognition (IVR) Risk Scoring Adaptive Authentication Voice Signature Service
5 Sample Pages
6 Health Savings Accounts: Focus on Transactions and Product Development Will Lead to Asset Growth Target Place Your Order as Follows: 1) Call us at , x26 2) us at 3) Fax or Mail using the form below: Please send me the following report(s): Report Title Publication Date Price Name Title Organization Division or group Phone Fax Address Signature to confirm your order: Payment Method: [ ] Payment card [ ] Check Enclosed [ ] Invoice me Visa, MC, AE or Disc. card #: Exp date: / Name on Card: Signature For invoicing, provide PO number: (Invoicing is available to financial institutions or publicly owned firms) Note: Reports are provided in electronic PDF form only. Javelin reports are subject to standard terms and conditions, as described on our web site. Javelin will contact you in the future to provide our free research newsletter or other mailings. If you do not wish to receive our newsletter or other mailings, you may advise us of this. Your contact information will not be sold to other organizations.
PCI Compliance: Finding Value beyond Fine Avoidance
November 2007 Overview Safeguarding customer data is a necessary component of good business practice, yet the numbers of data breached accounts are at an all time high. Data security has not been given
Online Storage Vaults The Electronic Safe Deposit Box Brings Opportunities for Loyalty and Fees, but Can It Overcome Daunting Challenges?
October 2008 Audience: Financial institutions: Online banking and e-commerce and billers such as utilities. Vendors of online storage vault vendors, online-banking platforms, bill-pay services and data-storage
E Commerce Platform Review:
November 2010 Audience: Treasury personnel and payment specialists for online retailers or multichannel retail organizations with an online presence; merchant acquirers, e commerce platform providers,
2011 Online Account Opening:
2011 Online Account Opening: Faulty Process Hobbles FIs in the Battle for Customer Acquisition, Profitability and Retention October 2011 Audience: Financial institutions: E commerce, mobile banking, credit
Multi-Factor Authentication of Online Transactions
Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best
Voice biometrics. Advait Deshpande. 2002-2013 Nuance Communications, Inc. All rights reserved. Page 1
Voice biometrics Advait Deshpande 2002-2013 Nuance Communications, Inc. All rights reserved. Page 1 Imagine a world without PINS/Passwords 2002-2013 Nuance Communications, Inc. All rights reserved. Page
Voice Authentication On-Demand: Your Voice as Your Key
Voice Authentication On-Demand: Your Voice as Your Key Paul Watson, Vice President Relationship Technology Management Voice Search Conference March 2-4, 2009 Convergys Corporation A Global Leader in Relationship
FFIEC CONSUMER GUIDANCE
FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their
FFIEC CONSUMER GUIDANCE
FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
Using Voice Biometrics in the Call Center. Best Practices for Authentication and Anti-Fraud Technology Deployment
Using Voice Biometrics in the Call Center Best Practices for Authentication and Anti-Fraud Technology Deployment This whitepaper is designed for executives and managers considering voice biometrics to
FIS Dispute Resolution Center Dispute/Fraud Cover Sheet. FRAUD INVESTIGATION FORM PO Box 30495 Tampa, FL 33630 3495 Or by fax to 1.800.253.
FIS FRAUD INVESTIGATION FORM PO Box 30495 Tampa, FL 33630 3495 Or by fax to 1.800.253.1220 1. My mailing address is My telephone number at home is ( ) and at work is ( ) 2. My credit/debit card was issued
Voiceprint. México. May 2014
Voiceprint México 1 May 2014 1 2 3 4 General information The road to Voiceprint Project execution Numbers & Conclusions 2 México q Est. 120 Million people q Median age 28 years old Some demographics q
Online Banking Risks efraud: Hands off my Account!
Online Banking Risks efraud: Hands off my Account! 1 Assault on Authentication Online Banking Fraud Significant increase in account compromises via online banking systems Business accounts are primary
Developing A True Multi-Channel Contact Center
Developing A True Multi-Channel Contact Center Case Study Based Evidence Report Sponsored by: GoToAssist Report Prepared by: callcentres.net Pty Ltd (part of ACA Research Group) Published: November 2010
Knowledge Based Authentication [KBA] is not just for onboarding new customers
White Paper The Role of Knowledge Based Authentication (KBA) In Identity Proofing Knowledge Based Authentication [KBA] is not just for onboarding new customers December 2013 Risk Solutions Best Practices
Shared VRU. A Key Link in Your Customer Service Chain Kyle Shadday, Director, Voice Response Strategy
Shared VRU A Key Link in Your Customer Service Chain Kyle Shadday, Director, Voice Response Strategy Agenda Voice response within FIS Telephone banking today FIS shared VRU roadmap Speech recognition Unleash
CSR REPORT 2016 Corporate Social Responsibility Report
CSR REPORT 2016 Corporate Social Responsibility Report 01 02 03 07 13 14 15 17 Business 19 20 21 22 Support and Contribution 23 Management System 27 31 with Employee 02 Business 03 1 2 04 18 1 3 4 2 6
2011 B2B Marketing BenchMark Report
EXCERPT Special Rate Sponsor: 2011 B2B Marketing BenchMark Report Practical instructions to generate, Research and Insights on Elevating qualify and nurture new business Marketing Effectiveness from Lead
ExtendTime Time & Labor Management
ExtendTime Time & Labor Management p r e s e n t e d b y: Trident Internet Systems, Inc. www.extendtime.com Corporate Overview ExtendTime TM is a Time and Attendance Solution offered in licensed and hosted
State Network Consumer Assistance Small Group Consultation Call Center
State Network Consumer Assistance Small Group Consultation Call Center Support for this presentation was provided through a grant from the Robert Wood Johnson Foundation s State Health Reform Assistance
Guidelines for Accepting Credit Cards as a Form of Payment for Education, Registration and Other Fees
Guidelines for Accepting Credit Cards as a Form of Payment for Education, Registration and Other Fees Background Over the past few years, the use of credit cards as a payment option for purchasing goods
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Ahmed Arara 1, El-Bahlul Emhemed Fgee 2, and Hamdi Ahmed Jaber 3 Abstract This paper suggests an advanced two-factor authentication
ONLINE CREDIT REPORTING S SUITE SOLUTIONS MEMBERSHIP GUIDELINES
ONLINE CREDIT REPORTING S SUITE SOLUTIONS MEMBERSHIP GUIDELINES The following procedures are needed to establish your account in order to download three bureau credit reports into your bankruptcy software.
Dissecting Wire Fraud: How it Happens, and How to Prevent It WHITE PAPER
Dissecting Wire Fraud: How it Happens, and How to Prevent It WHITE PAPER 2013 Guardian Analytics. Inc. All rights reserved. Introduction Preventing wire fraud starts with understanding how it is perpetrated
SECURITY FREEZE INFORMATION
SECURITY FREEZE INFORMATION Any consumer in Texas may request a security freeze in writing by certified mail to the consumer reporting agencies. The consumer reporting agencies shall not charge a fee to
Volume Challenges? Technology Can Help A look at the many ways in which technology is a resource for managing peaks and unpredictable volume.
tech line / may 2013 Volume Challenges? Technology Can Help A look at the many ways in which technology is a resource for managing peaks and unpredictable volume. By Brian Hinton, Strategic Contact Pipeline
PHONE FRAUD & SOCIAL ENGINEERING: HOW THE MODERN THIEF ROBS A BANK A WHITEPAPER BY PINDROP SECURITY
PHONE FRAUD & SOCIAL ENGINEERING: HOW THE MODERN THIEF ROBS A BANK A WHITEPAPER BY PINDROP SECURITY TABLE OF CONTENTS Executive Summary... 3 The Evolution of Bank Theft... Phone Channel Vulnerabilities
Vendor Solutions Gateway
Vendor Solutions Gateway Vendor Registration User Guide Because of increasing regulatory requirements within the business environment, a new business requirement is being implemented for all supply partners
Customer experience roulette: are banks making the right investments?
Customer experience roulette: are banks making the right investments? A survey of banking consumers and executives. 1 Executive summary Nuance commissioned a survey of 1,000 American consumers to learn
Checking Switch Kit. 1. Get Organized. 2. Switching Your Direct Deposit. 3. Switching Your Automatic Payments. 4. Request to Close Account
Checking Switch Kit Moving your checking account has never been easier! Thank you for choosing to bank with EvergreenDIRECT Credit Union. We are dedicated to ensuring your transition is a smooth one. The
PROTECTING YOUR CALL CENTERS AGAINST PHONE FRAUD & SOCIAL ENGINEERING A WHITEPAPER BY PINDROP SECURITY
PROTECTING YOUR CALL CENTERS AGAINST PHONE FRAUD & SOCIAL ENGINEERING A WHITEPAPER BY PINDROP SECURITY TABLE OF CONTENTS Executive Summary... 3 The Evolution of Bank Theft... Phone Channel Vulnerabilities
AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes
AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,
How To Control Credit Card And Debit Card Payments In Wisconsin
BACKGROUND State of Wisconsin agencies accepted more than 6 million credit/debit card payments annually through the following payment channels: Point of Sale (State agency location) Point of Sale (Retail-agent
FIS Dispute Resolution Center Dispute/Fraud Cover Sheet
Attention: Chargeback Services (Chargeback Customer Service Inquiries) : 1.800.600.5249 Fax: 1.800.253.1220 Mail: PO BOX 30495 Tampa, FL 33630 3495 Revised: 10/18/2013 From: (Institution Name): Phone:
REPORT. Next steps in cyber security
REPORT March 2015 Contents Executive summary...3 The Deloitte and Efma questionnaire...5 Level of awareness...5 Level of significance...8 Level of implementation...11 Gap identification and concerns...15
Visa Debit processing. For ecommerce and telephone order merchants
Visa Debit processing For ecommerce and telephone order merchants Table of contents About this guide 3 General procedures 3 Authorization best practices 3 Status check transactions 4 Authorization reversals
Improving Small Business Payments Processing
Improving Small Business Payments Processing ASBDC State Directors Conference March 19, 2012 Claudia Swendseid Senior Vice President Federal Reserve Bank of Minneapolis 2012 Federal Reserve Bank of Minneapolis.
Welcome to Golden Belt Bank We Appreciate Your Business
Switch Your Checking Account to Golden Belt Bank the Easy Way Welcome to Golden Belt Bank We Appreciate Your Business It has never been easier to begin enjoying the exceptional personal service you can
Hitachi ID Password Manager Telephony Integration
Hitachi ID Password Manager Telephony Integration 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Functional integration 2 2.1 Self-service password reset....................................
SECURITY FREEZE INFORMATION Any consumer in Wisconsin may place a security freeze on his or her credit report by requesting it in writing.
SECURITY FREEZE INFORMATION Any consumer in Wisconsin may place a security freeze on his or her credit report by requesting it in writing. The consumer reporting agency is not allowed to charge a fee to
Account-to-Account Transfer Services Risk
Account-to-Account Transfer Services Risk This white paper is part of the Risk Management White Paper Series, which CUNA Mutual Group provides exclusively to its Bond policyholders. TABLE OF CONTENTS Table
Enterprise Readiness Series: The Case for Passive, Voice-Based Authentication
Enterprise Readiness Series: The Case for Passive, Voice-Based Authentication Today s customer authentication methods are from another age. Opus Research interviewed security and customer care professionals
Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015
For the Financial Industry in Singapore 31 July 2015 TABLE OF CONTENT 1. EXECUTIVE SUMMARY 3 2. INTRODUCTION 4 2.1 Audience 4 2.2 Purpose and Scope 4 2.3 Definitions 4 3. REQUIREMENTS 6 3.1 Overview 6
Inside Electronic Signature APIs
Inside Electronic Signature APIs 7/20/2011 Adam DuVander Executive Editor Wendell Santos Web Services Analyst Sponsored by DocuSign Table of Contents Contents Executive Summary... 3 Methodology... 3 Provider
Contact Centers: The Fraud Enablement Channel
Contact Centers: The Fraud Enablement Channel APRIL 2016 Shirley Inscoe Photocopying or electronic distribution of this document or any of its contents without prior written consent of the publisher violates
Understanding and Combating Online Fraud in 2014
Understanding and Combating Online Fraud in 2014 Fraud is pervasive online and high-risk merchants must be vigilant in employing a multi-layered, comprehensive approach to security and risk management.
Osterman Research Executive Summary
Osterman Research Executive Summary Report Focus This report focuses on demand for unified communications and related technologies in the North American market. The research conducted for this report,
Vishing (and SMiShing ) Countermeasures
Vishing (and SMiShing ) Countermeasures Fraud Investigation & Education FIS www.fisglobal.com Vishing What is it? Vishing also called (Voice Phishing) is the voice counterpart to the phishing scheme. Instead
Solutions. Billing and Payment Solutions for Billers A Multi-Channel, Integrated Approach to Reduce Costs and Delight Customers
Solutions Billing and Payment Solutions for Billers A Multi-Channel, Integrated Approach to Reduce Costs and Delight Customers Solutions Are you looking to reduce costs, collect payments faster and delight
XYPRO Technology Brief: Stronger User Security with Device-centric Authentication
Ken Scudder Senior Director Business Development & Strategic Alliances XYPRO Technology Talbot A. Harty CEO DeviceAuthority XYPRO Technology Brief: Stronger User Security with Device-centric Authentication
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
2014 Media Kit & Editorial Calendar
2014 Media Kit & Editorial Calendar Magazine Advertising Email Marketing Newsletters White Papers Advertorials Sales Promotions Website Banners Direct Mail List Rental List Purchase Who We Are January/
Accounts Payable and Payments Policy
REV. 07/07/15 Accounts Payable and Payments Policy Accounts Payable and Payments Policy Purpose 1. The purpose of this policy is to establish the responsibilities, controls, authorizations and procedures
Defending the Internet of Things
Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity
Completing an Accounts Payable Audit With ACL (Aired on Feb 15)
AuditSoftwareVideos.com Video Training Titles (ACL Software Sessions Only) Contents Completing an Accounts Payable Audit With ACL (Aired on Feb 15)... 1 Statistical Analysis in ACL The Analyze Menu (Aired
Protective Life Corporation (PL) - Financial and Strategic SWOT Analysis Review
Protective Life Corporation (PL) - Financial and Strategic SWOT Analysis Review Protective Life Corporation (PL) - Financial and Strategic SWOT Analysis Review Sector Publishing Intelligence Limited (SPi)
BENCHMARK REPORT. 2011 Social Marketing. New research and insights on the monetization of social marketing for ROI. sponsored by EXCERPT
BENCHMARK REPORT 2011 Social Marketing New research and insights on the monetization of social marketing for ROI sponsored by EXCERPT 2011 Social Marketing Benchmark Report New research and insights on
Frequently Asked Questions on FFIEC Guidance on Authentication in an Internet Banking Environment. August 15, 2006
Board of Governors of the Federal Reserve System Federal Deposit Insurance Corporation National Credit Union Administration Office of the Comptroller of the Currency Office of Thrift Supervision Frequently
Hospital Certified Electronic Health Record (EHR) Technology Questionnaire
Page 1 of 10 Hospital Certified Electronic Health Record (EHR) Technology Questionnaire Thank you for taking time to complete this questionnaire. The Office of Inspector General (OIG) is conducting this
2. Once the 5 day right to cancel period has passed, we will begin investigating and repairing your credit profile.
IMPORTANT: Please take a few minutes to review our process. Thank you for choosing Heartland Credit Restoration Services. Our goal is to help you build a positive credit profile. It is very important to
Failure to follow the following procedures may subject the state to significant losses, including:
SUBJECT: Policy and Procedures PAGE: 1 of 5 INTRODUCTION During fiscal year 2014, State of Wisconsin agencies accepted approximately 6 million credit/debit card payments through the following payment channels:
E Source Multichannel Metrics Survey 2012
E Source Multichannel s Survey 2012 Instructions Fill in only the fields highlighted in blue; the yellow fields will automatically populate with the calculated s. In the "Number" column please use numerals;
