Cyber Security. Securing Your Mobile and Online Banking Transactions



Similar documents
Protecting your business from fraud

NATIONAL CYBER SECURITY AWARENESS MONTH

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

What are the common online dangers?

& INTERNET FRAUD

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

BE SAFE ONLINE: Lesson Plan

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

General Security Best Practices

National Cyber Security Month 2015: Daily Security Awareness Tips

Recognizing Spam. IT Computer Technical Support Newsletter

Learn to protect yourself from Identity Theft. First National Bank can help.

STRONGER ONLINE SECURITY

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

Online Security Information. Tips for staying safe online

STOP. THINK. CONNECT. Online Safety Quiz

Protect yourself online

Deter, Detect, Defend

Advice about online security

How To Protect Yourself Online

How to stay safe online

Security Guide. for electronic transactions. UniBank is a division of Teachers Mutual Bank Limited

Protection from Fraud and Identity Theft

When you are prompted to enroll, you will be asked to enter a Security Phrase and select/answer three different Challenge Questions.

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

Cybersecurity Best Practices

Retail/Consumer Client. Internet Banking Awareness and Education Program

Internet basics 2.3 Protecting your computer

Don t Fall Victim to Cybercrime:

Fraud Guide Fraud Protection

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Internet threats: steps to security for your small business

Avoid completing forms in messages that ask for personal financial information.

Secure FAQs for External Stakeholders

Protecting Yourself from Identity Theft

Online Security Tips

Guide to credit card security

Malware & Botnets. Botnets

Identity Theft Protection

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Connect Smart for Business SME TOOLKIT

suntrust.com 800.SUNTRUST

2012 NCSA / McAfee Online Safety Survey

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1

October Is National Cyber Security Awareness Month!

Better protection for customers, and recurring revenue for you!

DON T BE FOOLED BY SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam FREE GUIDE. December 2014 Oliver James Enterprise

High Speed Internet - User Guide. Welcome to. your world.

Safe Practices for Online Banking

PREVENTING HIGH-TECH IDENTITY THEFT

Shop Online with Confidence

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness

Small businesses: What you need to know about cyber security

Cyber Security. Maintaining Your Identity on the Net

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Tips for Banking Online Safely

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Infocomm Sec rity is incomplete without U Be aware,

10 Quick Tips to Mobile Security

Protecting Yourself from Identity Theft

Website Privacy Policy Statement York Rd Lutherville, MD We may be reached via at

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS

Safeguarding Your information and accounts

Saheel KHOYRATTY. Partner Technology Advisor

2009 Antispyware Coalition Public Workshop

Website Privacy Policy Statement

STOP THINK CLICK Seven Practices for Safer Computing

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

When registering on a jobsite, first ensure that the site is reputable and has a physical address and landline phone number.

Deception scams drive increase in financial fraud

Fraud Prevention Tips

Computer Protection. Computer Protection. Computer Protection 5/1/2013. Classic Battle of Good vs Evil. David Watterson & Ross Cavazos

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Transcription:

Cyber Security Securing Your Mobile and Online Banking Transactions

For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet Security. All rights reserved. The information in this document is provided by the Center for Internet Security (CIS), for non-commerical informational and educational purposes only. CIS does not warrant the accuracy or completeness of the information or commit to issue updates or corrections to the information. CIS is not responsible for any damages resulting from use of or reliance on the information contained herein.

Introduction Are you confident when you use mobile and online banking that your transactions are secure? In today s rapidly developing digital world, where depositing a check can be as easy as taking a picture with your smart device or logging into your account from anywhere, protecting your information and devices has never been more critical. 3 Secure Transactions

Phishing, Malware, and Identity Theft While there are many ways that information can be compromised, and the techniques used by online criminals are constantly evolving, the majority of risks that users face fall into just a few categories. Here s a look at several of the most common techniques used by cyber criminals, and some steps you can take to help protect your devices and information. Phishing When cyber criminals go phishing, consumers are the prey and fake websites and fraudulent emails are the bait. Phishing typically works like this: A user receives an urgent email, allegedly from a trusted party such as a retailer, government agency, law enforcement, email provider, or bank. Such emails generally include links that lead to a website where the recipient is asked to enter sensitive information such as a password, Social Security number, or other privileged information. This information is then captured by the cyber criminals who designed both the email and the website to mimic the trusted third party s actual online presence. A phishing scam may also try to entice a user into opening a file attached to an email. Malicious code could be embedded in the file and if the user opens it, malware is downloaded to the computer. How to Protect Yourself from Phishing Scams Be smart when conducting online transactions. To avoid being conned by a phishing scam, always verify the legitimacy of any website that asks you for personal information. One way to make sure you re not being sent to a fraudulent website is to type the known and verified address of the website you re being asked to visit into your browser s address bar instead of clicking on a link provided in the email. Urgent-sounding or enticing communications should raise a red flag. Criminals create these scams to prey on emotions. Use caution any time you receive a text message or email telling you to immediately update your personal information, activate an account, or check on an unexpected delivery. Rather than clicking on a link or calling the number provided in the text or email, verify the request. Type the URL of the organization s website into your browser, or call the its general customer service number to check the validity of the message. Be sure to delete emails coming from addresses or individuals that are unknown to you. Resist the temptation to follow a link or open an attachment from someone unknown to you. Secure Transactions 4

Malware Computer programs intended to gather information or disrupt a computer s normal functions are known as malicious software or malware. Your computer or device can be infected with malware by visiting compromised or malicious websites or by opening infected email attachments. How to Protect Yourself from Malware Keep your computer and devices up to date with the latest security patches. It s not enough to install an Internet security software package when you first get your computer. You also need to download updates such as virus definitions for the antivirus software so it is equipped to respond to the latest malware threats. You will need to update regularly and there are many applications that let you set up automatic updates as well. Check to make sure your security subscription is current. A computer with antivirus software and an operating system that is regularly updated, combined with a personal firewall, provide a strong foundation for protection from malware and other online threats. Identity Theft Once criminals gain access to a user s personal information whether it s by phishing or malware they can then use the information to set up new financial accounts. Identity theft is sometimes the result of criminals gaining access to the type of information needed to set up fraudulent accounts such as name, Social Security number, date of birth or other personal information. Social media sites make things easier than ever for criminals, because there is so much personal information online about users, making it very simple to impersonate someone. How to Protect Yourself from Identity Theft Be cautious about how much personal information you make available online. Keeping financial information safe requires more than just secure online banking it s important to carefully check your privacy settings on social media sites that you can turn on to restrict access to any personal information. Do not conduct sensitive transactions on public computers, such as those in hotels, libraries or coffee shops. There is no way to know if they are infected with malware or are lacking adequate security protection. Avoid accessing financial accounts or making online purchases on such computers. Password protection is crucial. Knowing a password makes it much easier for criminals to access an account, even if they have no other information. All too often people use the same password for multiple accounts. This practice makes the cyber criminal s job easier. Once they have your password, it will work for multiple sites. 5 Secure Transactions

Mobile Device Considerations While the steps described above will help secure online banking, it s also important to consider your use of mobile devices. One simple solution to reduce your risk: Engage your mobile device s keypad lock function when you re not using it. Users should also be cautious about where they get their mobile applications, or apps, for their phones. Consumers should obtain apps from well known reputable sites, where listed apps go through various levels of review, and security tests. The Bottom Line By staying informed about the latest risks and staying vigilant about using good security practices, you ll minimize the chances of having your information or device compromised. Secure Transactions 6

For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet Security. All rights reserved.