Mifflinburg Bank & Trust. Corporate Account Takeover & Information Security Awareness



Similar documents
Corporate Account Takeover & Information Security Awareness

THE HOME LOAN SAVINGS BANK. Corporate Account Takeover & Information Security Awareness

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

Corporate Account Takeover & Information Security Awareness. Customer Training

Information Security Awareness

Corporate Account Takeover & Information Security Awareness

PATRIOT BANK CUSTOMERS. Corporate Account Takeover & Information Security Awareness

Corporate Account Takeover & Information Security Awareness

Best Practices: Reducing the Risks of Corporate Account Takeovers

Corporate Account Takeover & Information Security Awareness

Don t Fall Victim to Cybercrime:

Remote Deposit Quick Start Guide

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

Protecting your business from fraud

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Deter, Detect, Defend

Business ebanking Fraud Prevention Best Practices

Payment Fraud and Risk Management

Electronic Fraud Awareness Advisory

Retail/Consumer Client. Internet Banking Awareness and Education Program

What are the common online dangers?

Online Cash Manager Security Guide

Reliance Bank Fraud Prevention Best Practices

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

Identity Theft Protection

Online Banking Fraud Prevention Recommendations and Best Practices

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

BE SAFE ONLINE: Lesson Plan

Best Practices Guide to Electronic Banking

Corporate Account Take Over (CATO) Guide

Preventing Corporate Account Takeover Fraud

Computer Protection. Computer Protection. Computer Protection 5/1/2013. Classic Battle of Good vs Evil. David Watterson & Ross Cavazos

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Information Security. Louis Morgan, CISSP Information Security Officer

Common Cyber Threats. Common cyber threats include:

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Network Security. Demo: Web browser

Learn to protect yourself from Identity Theft. First National Bank can help.

How to Identify Phishing s

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Cyber Security Survival Guide

Infocomm Sec rity is incomplete without U Be aware,

Section 12 MUST BE COMPLETED BY: 4/22

Business Identity Fraud Prevention Checklist

How to stay safe online

Get Started Guide - PC Tools Internet Security

E Commerce and Internet Security

Cyber Security. Securing Your Mobile and Online Banking Transactions

& INTERNET FRAUD

thriller INTERNET SECURITY

How To Protect Your Online Banking From Fraud

Security Tips You are here: Home» Security Tips

Statistical Analysis of Internet Security Threats. Daniel G. James

Staying Safe Online. Produced in association with

How to easily clean an infected computer (Malware Removal Guide)

F-Secure Anti-Virus for Mac 2015

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Network Security and the Small Business

FAKE ANTIVIRUS MALWARE This information has come from - a very useful resource if you are having computer issues.

Internet basics 2.3 Protecting your computer

Understanding Spyware

Practical guide for secure Christmas shopping. Navid

PC Security and Maintenance

Introduction to Computer Security Table of Contents

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Practical tips for a. Safe Christmas

Recognizing Spam. IT Computer Technical Support Newsletter

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Security

High Speed Internet - User Guide. Welcome to. your world.

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

Phishing Scams Security Update Best Practices for General User

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

Think Before You Click. UH Information Security Team

Trust the Innovator to Simplify Cloud Security

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Spyware Doctor Enterprise Technical Data Sheet

Countermeasures against Spyware

Phishing Activity Trends Report. 1 st Half Committed to Wiping Out Internet Scams and Fraud

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware

Malware & Botnets. Botnets

Ten Tips to Avoid Viruses and Spyware

Computer Network and Internet Security Awareness and Responsible Use. Indian River County School District

Keeping you and your computer safe in the digital world.

ecommercial SAT ecommercial Security Awareness Training Version 3.0

National Cyber Security Month 2015: Daily Security Awareness Tips

WHITE PAPER. Understanding How File Size Affects Malware Detection

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

ESET NOD32 Antivirus. Table of contents

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Symptoms of a Data Breach in Your Business

Transcription:

Mifflinburg Bank & Trust Corporate Account Takeover & Information Security Awareness

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only. Before acting on any ideas presented in this session; security, legal, technical, and reputational risks should be independently evaluated considering the unique factual circumstances surrounding each institution. No computer system can provide absolute security under all conditions. Any views or opinions presented do not necessarily state or reflect those of Mifflinburg Bank & Trust or any other entity.

What Will Be Covered? What is Corporate Account Takeover? How does it work? Statistics Current Trend Examples What can we do to Protect? What can Businesses do to Protect?

What is Corporate Account Takeover? A fast growing electronic crime where thieves typically use some form of malware to obtain login credentials to Corporate Online Banking accounts and fraudulently transfer funds from the account(s).

Malware Short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent. Malware includes computer viruses, worms, trojan horses, spyware, dishonest adware, crimeware, most rootkits, and other malicious and unwanted software.

Domestic and International Wire Transfers, Business-to-Business ACH payments, Online Bill Pay and electronic payroll payments have all been used to commit this crime Fact!

Criminals target victims by scams Victim unknowingly installs software by clicking on a link or visiting an infected Internet site. Fraudsters began monitoring the accounts Victim logs on to their Online Banking Fraudsters Collect Login Credentials Fraudsters wait for the right time and then depending on your controls they login after hours or if you are utilizing a token they wait until you enter your code and then they hijack the session and send you a message that Online Banking is temporarily unavailable. How Does it Work?

Statistics Where does it come from? Malicious websites (including Social Networking sites) Email P2P Downloads (e.g. LimeWire) Ads from popular web sites Web-borne infections: According to researchers in the first quarter of 2011, 76% of web resources used to spread malicious programs were found in 5 countries worldwide ~ United States, Russian Federation, Netherlands, China, & Ukraine.

Rogue Software/Scareware Form of malware that deceives or misleads users into paying for the fake or simulated removal of malware. Has become a growing and serious security threat in desktop computing. Mainly relies on social engineering in order to defeat the security software. Most have a Trojan Horse component, which users are misled into installing. Browser plug-in (typically toolbar). Image, screensaver or ZIP file attached to an e-mail. Multimedia codec required to play a video clip. Software shared on peer-to-peer networks A free online malware scanning service

Rogue Software/Scareware

Rogue Software/Scareware

Rogue Software/Scareware

Phishing Criminally fraudulent process of attempting to acquire sensitive information (usernames, passwords, credit card details) by masquerading as a trustworthy entity in an electronic communication. Commonly used means: Social web sites Auction sites Online payment processors IT administrators

Phishing

Phishing

Phishing

Phishing

Phishing

Phishing

Phishing

E-mail Usage CAUTION! What may be relied upon today as an indication that an email is authentic may become unreliable as electronic crimes evolve. This is why it is important to stay abreast of changing security trends.

E-mail Usage

E-mail Usage

E-mail Usage Some experts feel e-mail is the biggest security threat of all. The fastest, most-effective method of spreading malicious code to the largest number of users. Also a large source of wasted technology resources Examples of corporate e-mail waste: Electronic Greeting Cards Chain Letters Jokes and graphics Spam and junk e-mail

What can we do to PROTECT? Provide Security Awareness Training for Our Employees & Customers Review our Product Agreements. Make sure that both parties understand their roles & responsibilities Make sure our Customers are Aware of Basic Online Security Standards Stay Informed -Attend webinars/seminars & other user group meetings Develop a layered security approach

What can Businesses do to PROTECT? Education is Key Train your employees Secure your computer and networks Limit Administrative Rights -Do not allow employees to install any software without receiving prior approval. Install and Maintain Spam Filters Surf the Internet carefully Install & maintain real-time anti-virus & anti-spyware desktop firewall & malware detection & removal software. Use these tools regularly to scan your computer. Allow for automatic updates and scheduled scans.

What can Businesses do to PROTECT? Install routers and firewalls to prevent unauthorized access to your computer or network. Change the default passwords on all network devices. Install security updates to operating systems and all applications as they become available. Block Pop-Ups Do not open attachments from e-mail -Be on the alert for suspicious emails Do not use public Internet access points Reconcile Accounts Daily

What can Businesses do to PROTECT? Note any changes in the performance of your computer Dramatic loss of speed, computer locks up, unexpected rebooting, unusual popups, etc. Make sure that your employees know how and to whom to report suspicious activity to at your Company & the Bank Contact the Bank if you: Suspect a Fraudulent Transaction If you are trying to process an Online Wire or ACH Batch & you receive a maintenance page. If you receive an email claiming to be from the Bank and it is requesting personal/company information >

Mifflinburg Bank & Trust Thank you for taking the opportunity to view this information. We hope that you find it to be useful. Please contact us if you have any questions or comments.