Corporate Account Takeover & Information Security Awareness. Customer Training



Similar documents
Information Security Awareness

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

Corporate Account Takeover & Information Security Awareness

Best Practices: Reducing the Risks of Corporate Account Takeovers

Don t Fall Victim to Cybercrime:

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

Corporate Account Take Over (CATO) Guide

Protecting your business from fraud

Remote Deposit Quick Start Guide

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Payment Fraud and Risk Management

Business ebanking Fraud Prevention Best Practices

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Deter, Detect, Defend

Retail/Consumer Client. Internet Banking Awareness and Education Program

Electronic Fraud Awareness Advisory

Best Practices Guide to Electronic Banking

Preventing Corporate Account Takeover Fraud

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

BE SAFE ONLINE: Lesson Plan

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

Common Cyber Threats. Common cyber threats include:

Online Cash Manager Security Guide

How to Identify Phishing s

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Get Started Guide - PC Tools Internet Security

Identity Theft Protection

Information Security. Louis Morgan, CISSP Information Security Officer

Phishing Scams Security Update Best Practices for General User

Learn to protect yourself from Identity Theft. First National Bank can help.

Malware & Botnets. Botnets

What are the common online dangers?

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

How to stay safe online

PC Security and Maintenance

How to easily clean an infected computer (Malware Removal Guide)

Internet basics 2.3 Protecting your computer

Network Security. Demo: Web browser

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

ANDRA ZAHARIA MARCOM MANAGER

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Countermeasures against Spyware

WHITE PAPER. Understanding How File Size Affects Malware Detection

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.

Section 12 MUST BE COMPLETED BY: 4/22

CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3

Infocomm Sec rity is incomplete without U Be aware,

Computer Protection. Computer Protection. Computer Protection 5/1/2013. Classic Battle of Good vs Evil. David Watterson & Ross Cavazos

Network Security and the Small Business

Recognizing Spam. IT Computer Technical Support Newsletter

Cyber Security Survival Guide

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

DON T BE FOOLED BY SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam FREE GUIDE. December 2014 Oliver James Enterprise

ecommercial SAT ecommercial Security Awareness Training Version 3.0

E Commerce and Internet Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Cyber Security. Securing Your Mobile and Online Banking Transactions

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Spyware Doctor Enterprise Technical Data Sheet

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

Frequently Asked Questions

How To Protect Your Online Banking From Fraud

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

OIG Fraud Alert Phishing

Online Cash Management Security: Beyond the User Login

suntrust.com 800.SUNTRUST

Security Bank of California Internet Banking Security Awareness

McAfee Labs Combating Fake Alert infections. - Amith Prakash, Global Threat Response

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Contents. McAfee Internet Security 3

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Introduction (Contd )

Fraud Trends. HSBCnet Online Security Controls PUBLIC

Online Banking Risks efraud: Hands off my Account!

Introduction to Computer Security Table of Contents

& INTERNET FRAUD

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

Transcription:

Corporate Account Takeover & Information Security Awareness Customer Training

No computer system can provide absolute security under all conditions. NO SECURITY MEASURE OR LIST OF SECURITY MEASURES CAN BE ALL INCLUSIVE AND FOOLPROOF FOR PREVENTING THEFT. HOWEVER, THE FOLLOWING MEASURES WILL HELP TO REDUCE YOUR RISK OF LOSS AND MITIGATE THE DAMAGES IF YOUR ACCOUNT IS COMPROMISED.

What will be covered? What is Corporate Account Takeover? How does it work? Statistics Current Trend Examples What can we do to Protect? What can Businesses do to Protect?

What is Corporate Account Takeover? A fast growing electronic crime where thieves typically use some form of malware to obtain login credentials to Corporate Online Banking accounts and fraudulently transfer funds from the account(s).

Malware Short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent. Malware includes computer viruses, worms, trojan horses, spyware, dishonest adware, crimeware, most rootkits, and other malicious and unwanted software.

Domestic and International Wire Transfers, Business to Business ACH payments, Online Bill Pay and electronic payroll payments have all been used to commit this crime.

Criminals target victims by scams How does it work? Victim unknowingly installs software by clicking on a link or visiting an infected Internet site. Criminals began monitoring the accounts Victim logs onto Online Banking Criminals Collect Login Credentials Criminals wait for the right time and then depending on your controls login after hours, or, if you are utilizing a token, wait until you enter your code, hijack the session, and send you a message that Online Banking is temporarily unavailable.

Statistics Where does it come from? Malicious websites (including Social Networking sites) Email P2P Downloads (e.g. LimeWire) Ads from popular web sites Web borne infections: According to researchers, in the first quarter of 2011, 76% of web resources used to spread malicious programs were found in 5 countries worldwide ~ the United States, Russian Federation, Netherlands, China, & the Ukraine.

Rogue Software/Scareware Form of malware that deceives or misleads users into paying for the fake or simulated removal of malware. Has become a growing and serious security threat in desktop computing. Mainly relies on social engineering in order to defeat the security software. Most have a Trojan Horse component, which users are misled into installing. Browser plug in (typically toolbar). Image, screensaver or ZIP file attached to an e mail. Multimedia codec required to play a video clip. Software shared on peer to peer networks A free online malware scanning service (Examples Following)

Misleading Free Online Malware Scanning Service containing a Trojan Component

Misleading Free Online Malware Scanning Service containing a Trojan Component

Misleading Free Online Malware Scanning Service containing a Trojan Component

Phishing Criminally fraudulent process of attempting to acquire sensitive information (usernames, passwords, credit card details) by masquerading as a trustworthy entity in an electronic communication. Commonly used means: Social web sites Auction sites Online payment processors IT administrators

E-mail Usage CAUTION! What may be relied upon today as an indication that an email is authentic may become unreliable as electronic crimes evolve. This is why it is important to stay abreast of changing security trends.

E-mail Usage Some experts feel e mail is the biggest security threat of all. The fastest, most effective method of spreading malicious code to the largest number of users. Also a large source of wasted technology resources Examples of corporate e mail waste: Electronic Greeting Cards Chain Letters Jokes and graphics Spam and junk e mail

What you can do to PROTECT! Provide Security Awareness Training for your Employees Review our Contracts Make sure that you understand your roles & responsibilities Make sure your Employees are Aware of Basic Online Security Standards Stay Informed Attend webinars/seminars Develop a layered security approach (next page)

Layered Security Layered Security approach Maintain the same IP Addresses Independent PC New User Controls Administrator can create a new user. Bank must activate user. Adhere to established Frequencies, and Limits Dual Control Processing of files recommended Utilize Fax or Out of Band Confirmation Secure and use the RSA Security Token

What can Businesses do to Protect? Education is Key Train your employees Secure your computer and networks Limit Administrative Rights Do not allow employees to install any software without receiving prior approval. Install and Maintain Spam Filters Surf the Internet on another PC Use an Independent PC for online banking. Install & maintain real time anti virus & anti spyware desktop firewall & malware detection & removal software. Use these tools regularly to scan your computer. Allow for automatic updates and scheduled scans. Install routers and firewalls to prevent unauthorized access to your computer or network. Change the default passwords on all network devices. Install security updates to operating systems and all applications as they become available. Block Pop Ups

What can Businesses do to Protect? Do not open attachments from e mail Be on the alert for suspicious emails Do not use public Internet access points Reconcile Online Banking Accounts Daily preferably more than once, and at the end of each day. Note any changes in the performance of your computer Dramatic loss of speed, computer locks up, unexpected rebooting, unusual popups, etc. Make sure that your employees know how and to whom to report suspicious activity to at your Company & the Bank Contact FABT (800 738 2265) if you: Suspect a Fraudulent Transaction If you are trying to process an Online Wire or ACH Batch & you receive a maintenance page. If you receive an email claiming to be from the Bank and it is requesting personal/company information. Ask for Security Officer Michael Guillot