Don t be tomorrow s headline: Protect and secure payment information



Similar documents
Office of Finance and Treasury

PCI Compliance Overview

Payment Methods. The cost of doing business. Michelle Powell - BASYS Processing, Inc.

Your Compliance Classification Level and What it Means

Frequently Asked Questions

Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance

Data Security Basics for Small Merchants

Data Security, Fraud Prevention, and Cost Control. Mike Dorland, CPP Regional Marketing Representative Michigan Retailers Association

PCI DSS Compliance Information Pack for Merchants

PCI DSS 101 FOR CTOs AND BUSINESS EXECUTIVES

PAI Secure Program Guide

FREQUENTLY ASKED QUESTIONS The MasterCard Site Data Protection (SDP) Program

TREASURER S OFFICE ADMINISTRATIVE STANDARDS FOR THE TREASURER S FISCAL PROCEDURE No MERCHANT DEBIT AND CREDIT CARD RECEIPTS

Project Title slide Project: PCI. Are You At Risk?

Treasury ManagementSM

PCI DSS Presentation University of Cincinnati

MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.

Payment Card Industry (PCI) Data Security Standard

Spokane Airport Board (Spokane International Airport, Airport Business Park, Felts Field) Addendum #1 - Q&A

AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009

How To Ensure Account Information Security

HOW SECURE IS YOUR PAYMENT CARD DATA? COMPLYING WITH PCI DSS

Understanding the Value of Tokens

Property of CampusGuard. Compliance With The PCI DSS

CREDIT CARD PROCESSING POLICY AND PROCEDURES

Commercial Online Banking Frequently Asked Questions Bryn Mawr Trust Company

SecurityMetrics Introduction to PCI Compliance

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS) Frequently Asked Questions

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Why Is Compliance with PCI DSS Important?

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business

Protecting Your Customers' Card Data. Presented By: Oliver Pinson-Roxburgh

This policy applies to all GPC units that process, transmit, or handle cardholder information in a physical or electronic format.

Online Cash Management Security: Beyond the User Login

PROTECTION OF OUR MERCHANTS AND REFERRAL PARTNERS IS OUR FIRST CONCERN

The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development

Two Approaches to PCI-DSS Compliance

* Any merchant that has suffered a hack that resulted in an account data compromise may be escalated to a higher validation level.

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance

Best Practices: Reducing the Risks of Corporate Account Takeovers

Payments Fraud: It's Not Fun & Games

How To Protect Your Credit Card Information From Being Stolen

E-Commerce, Merchant Processing, EMV and General Best Practices for Municipalities

Payments Fraud Best Practices

UCSB Credit Card Processing and PCI Compliance

Payment Fraud and Risk Management

Payment Card Industry (PCI) Data Security Standard

FREQUENTLY ASKED QUESTIONS The MasterCard Site Data Protection (SDP) Program

Bank Account Reconciliation, Bank Account Access and Automated Clearing House (ACH) Transactions Review

Case 2:13-cv ES-JAD Document Filed 12/09/15 Page 1 of 116 PageID: Appendix A

Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008

PCI DSS Gap Analysis Briefing

Becoming PCI Compliant

Version 7.4 & higher is Critical for all Customers Processing Credit Cards!

Payment Card Industry (PCI) Data Security Standard

Section 1: Assessment Information

Phishing for Fraud: Don't Let your Company Get Hooked!

Q: What is PCI? Q: To whom does PCI apply? Q: Where can I find the PCI Data Security Standards (PCI DSS)? Q: What are the PCI compliance deadlines?

Preparing for EMV chip card acceptance

Fraud Protection, You and Your Bank

Payment Cardholder Data Handling Procedures (required to accept any credit card payments)

Don t Fall Victim to Cybercrime:

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Josiah Wilkinson Internal Security Assessor. Nationwide

Payment Card Industry (PCI) Data Security Standard

Improving Small Business Payments Processing

Insurance-Specific Payment Services Requires Insurance Industry Knowledge

PCI Compliance Just the Facts. Rick Dakin President ext. 7001

Transcription:

Don t be tomorrow s headline: Protect and secure payment information Lexi Custis VP ereceivables Consultant Reid Andrews VP Treasury Management Consultant October 2015 Staunton, VA 2014 Wells Fargo Bank, N.A. All rights reserved.

Poll question: Are you familiar with Payment Card Industry (PCI)? A) Yes B) No 1

Agenda What is PCI-DSS & PA-DSS? Common causes of data breaches Tactics to help mitigate these risks Best practices for retail and card not present Best practices for other online transactions Q&A 2

What is PCI-DSS? Payment Card Industry Data Security Standards Industry tools and measurements to ensure the safe handling of sensitive information Applies to all merchants and third party service providers 3

What is PA-DSS? Payment Application Data Security Standard Applies to all vendors that develop payment applications and gateways 4

When does PCI & PA-DSS apply? Processing Storing Transmitting 5

PCI DSS validation requirements Compliance Classification Level Annual submission of compliant PCI DSS Report on Compliance (ROC) Annual submission of compliant Self Assessment Questionnaire (SAQ) Quarterly Network Scan Level 1 >6 MM annual transactions (Any payment network) Level 2* 1 MM to 6 MM annual transactions (Any payment network) Merchant can do either ROC or SAQ Level 3 20K to 1 MM annual transactions (Any payment network) ecommerce only Level 4 (recommended) < 20K e-commerce < 1MM annual transactions *Level 2 merchant Self Assessment Questionnaire (SAQ) must be completed by an ISA (Internal Security Assessor) 6

66% Breaches identified by external parties* 64% Breaches that go undetected for months* *Verizon 2013 Data Breach Investigations Report 7

63% Data breaches that involved a third Party responsible for system support* *Trustwave 2013 Global Security Report 8

Tactics to minimize data breach risk Card present E-commerce Point of sale (POS) system Remote access 9

Poll question: How are most breaches identified? A) By the merchant B) By the customer C) By the card processor D) By the issuing bank E) B,C,D Answer: E 10

Best practices 11

End-to-end encryption Card present transactions Includes tokenization Terminals and Point of sale Merchant 12

Tokenization Card not present transactions Card number: 3456 7890 1112 1314 Tokenized Number: 0176 2190 3475 1314 13

Poll question: The average cost of a data breach to an organization is $7.2 million? A) True B) False Answer: True * Network World March 8, 2011 news article 14

Poll question: Do you know if your company is PCI compliant today? A) Yes B) No 15

Positive payment fraud trends Fraud protection real world perspectives Results of the 2015 AFP Payments Fraud and Control Survey reveal three reasons for optimism: 50% Organizations that have adopted a stronger form of authentication or added layers of security for access to bank services. 2015 AFP Payments Fraud and Control Study 1. Check fraud is on the decline. 2. ACH debit fraud is declining and preventable. 3. Companies are fighting back. 77% of organizations that experienced actual or attempted fraud in 2014 were victims of check fraud down from 90% in 2009. As more businesses switch to electronic payments, expect the decline in check fraud to continue. 25% of organizations experienced ACH debit fraud in 2014 down from 27% in 2012. Of those that lost money, 40% attributed the loss to not using ACH debit blocks or filters. Nearly 28% cited the cause as untimely account reconciliation and 40% untimely ACH returns. Organizations have adopted or plan to adopt additional security measures: Nearly 70% of organizations now reconcile daily. 2 out of 5 are upgrading authentication procedures and devices for accessing their networks. Half are requiring a stronger form of authentication or adding layers of security for access to bank services. 16

Nine ways to foil ACH fraud Fraud protection best practices Three ways ACH fraud occurs 1. Thieves obtain account information from a check s MICR line. 2. Counterfeit and forged checks are converted to ACH debits. 3. Thieves access your online banking system and initiate ACH credits. 20 billion 23 billion Number of transactions Number processed of transactions through the Automated processed Clearing through the House Automated network in Clearing 2011. House network in 2014. NACHA The Electronic Payments NACHA Association, The Electronic April 15, Payments 2015 Association, April 12, 2012 Protect your accounts with these best practices 1. Use ACH Fraud Filter service to stop all ACH debits except those you specifically preauthorize. 2. Initiate online ACH payments using dedicated computers disabled from email and web browsing. 3. Use repetitive ACH payment templates to prevent unauthorized modifications to key fields. 4. Set authorization limits for each individual user of the ACH payment service. 5. Implement dual custody and use it properly. Require payments and user changes initiated by one user to be approved by a second user on a different computer or mobile device before they take effect. 6. Integrate check and electronic payment systems so checks converted to ACH debits flow through the positive pay system. 7. Reconcile accounts daily to identify unauthorized ACH debits. 8. Return unauthorized ACH debits promptly. 9. Implement the Perfect Receivables service to provide proxy account numbers for your customers use. 17

Perfect Receivables service for ACH & Wire Fraud Prevention and Automatic Reconciliation Track payments from each of your remitters Reduce the amount of time your employees spend manually tracking payments Reduce risk of fraudulent activity against your account your actual account number is never used Benefit from improved cash flow money is moved into your account faster How it works: A 17-digit Wells Fargo Payment Identification Code (WPIC) is substituted for your actual account number A unique WPIC is created for each remitter The first 4 digits of the WPIC identify your account at Wells Fargo; the last 13 positions are assigned by you and are unique to the remitter When payments are made using the WPIC, each remitter is identified with 100% accuracy to help speed up your receivables posting process and reduce payment exceptions 18

Supply chain fraud: Verify your vendors Fraud protection essentials Four ways that supply chain fraud occurs: A fraudster, purporting to be a vendor, requests that you change the payment instructions you have on file for them bank, routing transit number, and/or account number. Dual custody is generally not effective against supply chain fraud because approvers routinely approve payments they believe are going to trusted vendors. An employee of your company or a vendor company copies or scans a real vendor invoice and creates a counterfeit invoice from it, directing the payment to their own account. A hacker breaches your email system, studies the payment requests received by your accounts payable department, then submits a fraudulent invoice that looks legitimate. A hacker breaches your vendor s accounts receivable system and generates a fraudulent invoice or phony payment request. Three ways to reduce your risk: 1. Educate your employees 2. Verify payment change requests 3. Authenticate high-dollar invoices with out-of-band vendor communications 19

Imposter Fraud: Verify your executives Fraud protection essentials -----Original Message----- From: Christopher Howard [mailto:choward@hsc.edu] Sent: Tuesday, September 29, 2015 12:59 PM To: MSmith@hsc.edu Subject: Re: Fund Transfer Mike, Dual custody is generally not effective against Imposter fraud because approvers routinely approve payments they believe are going to trusted vendors. I sent the wire instructions to Glenn earlier. Here are the details; Amount: $9,240 Wells Fargo Bank Name on Acc : Patrick Nsan Account number 2054886383 Routing : 111900659 Address : 9715 Westheimer Rd, Houston, TX, 77042 Please process a same-day wire transfer to the beneficiary. Let me know when it is sent. Regards, Christopher Howard 20

Questions? 21

Thank you! 22