Deter, Detect, Defend



Similar documents
Learn to protect yourself from Identity Theft. First National Bank can help.

Identity Theft Protection

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Retail/Consumer Client. Internet Banking Awareness and Education Program

Remote Deposit Quick Start Guide

& INTERNET FRAUD

Payment Fraud and Risk Management

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

PREVENTING HIGH-TECH IDENTITY THEFT

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

Protecting your business from fraud

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

Corporate Account Takeover & Information Security Awareness. Customer Training

Safe Practices for Online Banking

Online Security Tips

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness

Malware & Botnets. Botnets

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Protecting Yourself from Identity Theft

Tips for Banking Online Safely

Business ebanking Fraud Prevention Best Practices

When Fraud Comes Knocking

Cyber Security. Securing Your Mobile and Online Banking Transactions

High Speed Internet - User Guide. Welcome to. your world.

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

National Cyber Security Month 2015: Daily Security Awareness Tips

Don t Fall Victim to Cybercrime:

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005

How to Identify Phishing s

Information Security Awareness

I dentity theft occurs

BE SAFE ONLINE: Lesson Plan

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Protection from Fraud and Identity Theft

Corporate Account Take Over (CATO) Guide

How to stay safe online

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR

Infocomm Sec rity is incomplete without U Be aware,

Fraud Guide Fraud Protection

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.

Why is a strong password important?

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Protect yourself online

Online Cash Manager Security Guide

Fraud Prevention Tips

Internet basics 2.3 Protecting your computer

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Best Practices Guide to Electronic Banking

Basic Computer Security Part 2

Computer Security Maintenance Information and Self-Check Activities

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

Contents Security Centre

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Online Security Information. Tips for staying safe online

According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

How To Protect Yourself Online

Regions Identity Theft Kit

Don t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice

Best Practices: Reducing the Risks of Corporate Account Takeovers

FRAUD ALERT THESE SCAMS CAN COST YOU MONEY

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Cyber Security Survival Guide

F-Secure Anti-Virus for Mac 2015

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

3 day Workshop on Cyber Security & Ethical Hacking

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference

Identity Theft Protection

Transcription:

Deter, Detect, Defend

Deter Never provide personal information, including social security number, account numbers or passwords over the phone or Internet if you did not initiate the contact Never click on the link in an email if you believe it is fraudulent Don t use obvious passwords like your birth date, mother s maiden name or the last four digits of your social security number Keep your computers up to date with antivirus software, firewalls

Detect Be alert to signs that require immediate attention: Bills that do not arrive as expected Unexpected credit cards or account statements Denials of credit for no apparent reason Calls or letters about purchases you did not make

Defend If you fall victim to an attack, act immediately to protect yourself: Contact Customer Service at 913-381-3311 or email us at reportfraud@valleyviewbank.com Place fraud alerts on your credit files Monitor your credit files Keep computer safe with up to date antivirus software and firewalls

Phishing Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic or voice communication. Be aware if you receive an email that looks like it came from a reputable company. It could direct you to a phony website which may ask you to update your personal information. If you provide this information you may find yourself victim of identity theft.

Pharming Pharming is the term for criminal hackers redirecting Internet traffic from one website to a different, identical-looking site. Protect yourself: Always use a secure website Review your Internet banking often Check credit and debit card statements Regularly check that your browser is up to date

Spyware Spyware can be installed on your computer without your consent. It monitors or controls your computer use and may be used to send you pop-up ads, redirect your computer to websites, monitor your Internet surfing or record your keystrokes, which in turn, could lead to identity theft.

Effects of Spyware A barrage of pop-up ads A hijacked browser Sudden or repeated change in your computer s home Internet page New and unexpected toolbars New and unexpected icons on the system tray at the bottom of your computer screen Keys not working Random error messages System running slowly and anti-virus not updating

Malware Malware is short for malicious software; it includes viruses programs that copy themselves without your permission. Computers may be infected with malware if they: Slow down, malfunction or display repeated error messages Won t shut down or restart Serve up a lot of pop-up ads or display them when you re not surfing the web Display web pages or programs you didn t intend to use or send emails you didn t write

Dot Cons Con artists have gone high tech, using the Internet to defraud consumers in a variety of ways. According to the FTC, online consumers complain most about the following: Internet auctions Internet access services Credit card fraud International modem dialing Web cramming Multi-level marketing plans Travel and vacation Business opportunities Investments Health care products/services

Beware of a Free Security Scan Messages telling you to install and update security software for your computer seem to be everywhere. You might be tempted by an offer for a free security scan, especially when faced with a pop-up, an ad that claims malicious software has already been found on your machine. Unfortunately it s likely that the alarming message is a scam.

Wireless Network Security Tips The downside of a wireless network is, unless you take certain precautions, anyone with a wireless-ready computer can use your network. Use encryption Use anti-virus and anti-spyware software and a firewall Turn off identifier broadcasting Change the identifier on your router from the default Change your router s pre-set password for administration Allow only specific computers to access your wireless network Turn off your wireless network when you know you won t use it Don t assume that public hot spots are secure

Bank Provided Protection Multi-factor authentication 128 bit encryption Customer created password Email alerts Three failed logon attempts results in lockout Timeout feature

Bank Provided Protection A bank representative would only contact you if: An online bill payment failed Your email address needed to be verified You were locked out of online banking

Your Responsibilities Install anti-virus software on your computer and keep it up to date Scan your computer routinely for viruses Monitor your account(s) Do not write your password down or save it in a Word document Notify the bank if you believe your computer has been compromised, i.e. unauthorized transfers or misplaced passwords

Your Responsibilities In addition to the previously referenced recommendations, commercial customers should periodically perform a related risk assessment and control evaluation.

Bank Contact Information Notify Valley View Bank if you have any concerns about your account. Contact Customer Service 913-381-3311 or customerservice@valleyviewbank.com