FFIEC CONSUMER GUIDANCE



Similar documents
FFIEC CONSUMER GUIDANCE

Supplement to Authentication in an Internet Banking Environment

Electronic Fraud Awareness Advisory

ACI Response to FFIEC Guidance

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP

Presented by: Mike Morris and Jim Rumph

Pursuing Compliance with the FFIEC Guidance Risk Assessment 101 KPMG RISK ADVISORY SERVICES

& INTERNET FRAUD

Understanding It s Me 247 Security. A Guide for our Credit Union Clients and Owners

Online Account Takeover. Roger Nettie

Security Guidelines and Best Practices for Retail Online and Business Online

WHITE PAPER Moving Beyond the FFIEC Guidelines

How To Protect Your Online Banking From Fraud

A brief on Two-Factor Authentication

Your security is our priority

Payment Fraud and Risk Management

Online Banking Risks efraud: Hands off my Account!

STRONGER ONLINE SECURITY

Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT

Best Practices: Reducing the Risks of Corporate Account Takeovers

Online Cash Management Security: Beyond the User Login

SAFE ONLINE BANKING. Online Banking, Data Security You. Your Partnership for Safe Online Banking

Online Cash Manager Security Guide

Deception scams drive increase in financial fraud

IT Security Risks & Trends

Business ebanking Fraud Prevention Best Practices

Protecting your business from fraud

Best Practices Guide to Electronic Banking

Advanced Biometric Technology

Information Technology. A Current Perspective on Risk Management

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Securing Online Payments in ACH Client and Remote Deposit Express

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

A Practical Guide to Anomaly Detection

Attachment A. Identification of Risks/Cybersecurity Governance

BUSINESS ONLINE BANKING AGREEMENT

Don t Fall Victim to Cybercrime:

Safeguarding Your information and accounts

ABA Deposit Account Fraud Survey

September 20, 2013 Senior IT Examiner Gene Lilienthal

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Online Banking Customer Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program

Fighting ACH fraud: An industry perspective

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Information Technology

Remote Deposit Quick Start Guide

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Brian Wozniak IRS Stakeholder Liaison

FRAUD ALERT THESE SCAMS CAN COST YOU MONEY

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group

IDRBT Working Paper No. 11 Authentication factors for Internet banking

Wellesley College Written Information Security Program

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

Preventing Corporate Account Takeover Fraud

Get on First Base with your Regulators and Cyber Security

National Cyber Security Month 2015: Daily Security Awareness Tips

OCIE CYBERSECURITY INITIATIVE

Cyber Security. Securing Your Mobile and Online Banking Transactions

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

Voice Authentication On-Demand: Your Voice as Your Key

Identity Theft Protection

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Corporate Account Take Over (CATO) Guide

ecommercial SAT ecommercial Security Awareness Training Version 3.0

Network/Cyber Security

Client Security Guide

M&T BANK CANADIAN PRIVACY POLICY

Transcription:

FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their customers.

Online Security Is Our Top Priority! I If you use online or mobile banking, you will be interested to learn that six federal financial industry regulators teamed up recently to make your accounts more secure. New supervisory guidance from the Federal Financial Institutions Examination Council (FFIEC) will help banks strengthen their vigilance and make sure that the person signing into your account is actually you. The supervisory guidance is designed to make online transactions of virtually all types safer and more secure. UNDERSTANDING THE FACTORS Online security begins with the authentication process, used to confirm that it is you, and not someone who has stolen your identity. Authentication generally involves one or more basic factors: Some thing the user knows (e.g., password, PIN) Something the user has (e.g., ATM card, smart card) Something the user is (e.g., biometric characteristic, such as a fingerprint). Single factor authentication uses one of these methods; multi-factor authentication uses more than one, and thus is considered a stronger fraud deterrent. When you use your ATM, for example, you are utilizing multi-factor authentication: Factor number one is something you have, your ATM card; factor number two is something you know, your PIN.

To assure your continued security online, your bank uses both single and multi-factor authentication, as well as additional layered security measures when appropriate. LAYERED SECURITY FOR INCREASED SAFETY Layered security is characterized by the use of different controls at different points in a transaction process so that a weakness in one control is generally compensated for by the strength of a different control. An example of layered security might be that you follow one process to log in (user/password), and then give additional information to authorize funds transfers. Layered security can substantially strengthen the overall security of online transactions protecting sensitive customer information, preventing identity theft, and reducing account takeovers and the resulting financial losses. The purpose of these layers is to allow your bank to authenticate customers and detect and respond to suspicious activity related to initial login and then to reconfirm this authentication when further transactions involve the transfer of funds to other parties. INTERNAL ASSESSMENTS AT YOUR BANK On the back-end, the new supervisory guidance offers ways your bank can look for anomalies that could indicate fraud. The goal is to ensure

that the level of authentication called for in a particular transaction is appropriate to the transaction s level of risk. Accordingly, your bank has concluded a comprehensive risk-assessment of its current methods as recommended in this supervisory guidance. These risk assessments consider, for example: changes in the internal and external threat environment changes in the customer base adopting electronic banking changes in the customer functionality offered through electronic banking; and actual incidents of security breaches, identity theft, or fraud experienced by the institution or industry. Whenever increased risk to your transaction security might warrant it, your bank will be able to conduct additional verification procedures, or layers of control, such as: Utilizing call-back (voice) verification, e-mail approval, or cell phone-based identification. Employing customer verification procedures, especially when opening accounts online. Analyzing banking transactions to identify suspicious patterns. For example, that could mean flagging a transaction in which a customer who normally pays $10,000 a month to five different vendors suddenly pays $100,000 to a completely new vendor. Establishing dollar limits that require manual intervention to exceed a preset limit.

YOUR PROTECTIONS UNDER REG E Banks follow specific rules for electronic transactions issued by the Federal Reserve Board. Known as Regulation E, the rules cover all kinds of situations revolving around transfers made electronically. Under the consumer protections provided under Reg E, you can recover internet banking losses according to how soon you detect and report them. Here is what the Federal rules require: If you report the losses within two days of receiving your statement, you can be liable for the first $50. After two days, the amount increases to $500. After 60 days, you could be legally liable for the full amount. These protections can be modified by state law or by policies at your bank, so be sure to ask your banker how these protections apply to your particular situation. CUSTOMER VIGILANCE: THE FIRST LINE OF DEFENSE Of course, understanding the risks and knowing how fraudsters might trick you is a critical step in protecting yourself online. You can make your computer safer by installing and updating regularly your Anti-virus software Anti-malware programs Firewalls on your computer Operating system patches and updates

Your can also learn more about online safety and security at these websites: www.staysafeonline.com www.ftc.gov www.usa.gov www.idtheft.gov IF YOU HAVE SUSPICIONS If you notice suspicious activity within your account or experience security-related events (such as a Phishing email from someone purporting to be from your bank), you can contact anyone at your bank and you will be quickly and courteously guided to the person responsible for such issues. FINANCIAL EDUCATION CORPORATION

FFIEC BUSINESS ACCOUNT GUIDANCE RISK & ASSESSMENT LAYERED SECURITY FOR ONLINE BUSINESS TRANSACTIONS New financial standards will assist banks and business account holders to make online banking safer and more secure from account hijacking and unauthorized funds transfers.

Banks and Businesses Team Up for Security A As someone responsible for a business bank account, you will want to know that new supervisory guidance from the Federal Financial Institutions Examination Council (FFIEC) are helping banks strengthen their vigilance and assure that your business accounts are properly secured during money transfers of all kinds. FFIEC is the coordinating group that sets standards for the major financial industry regulators and examiners. UNDERSTANDING THE RISKS FFIEC studies have shown that there have been significant changes in the threat landscape in recent years. Fraudsters many from organized criminal groups have continued to deploy more sophisticated methods to compromise authentication mechanisms and gain unauthorized access to customers online accounts. For example, hacking tools have been developed and automated into downloadable kits, increasing their availability to less experienced fraudsters. As a result, online account takeovers and unauthorized funds transfers have risen substantially each year since 2005, particularly with respect to commercial accounts, representing losses of hundreds of millions of dollars. ENHANCED CONTROLS PROTECT HIGHER RISKS The FFIEC supervisory guidance addresses the fact that not every online transaction poses the same level of risk, recommending that financial

SUMMARY OF RECOMMENDATIONS FOR BUSINESS ACCOUNTS Banks to urge business account holders to conduct periodic assessment of their internal controls Use layered security for system administrators Initiate enhanced controls for high-dollar transactions Provide increased levels of security as transaction risks increase Offer customers multi-factor authentication institutions implement more robust controls as the risk level of the transaction increases. Online business transactions generally involve ACH file origination and frequent interbank wire transfers. Since the frequency and dollar amounts of these transactions are generally higher than consumer transactions, they pose a comparatively increased level of risk to the institution and its customer, according to FFIEC. Thus banks are advised to implement security plans utilizing controls consistent with the increased level of risk for covered business transactions. These enhanced controls are designed to exceed the controls applicable to routine customer users. For example, a preventive control could include requiring an additional authentication routine prior to final implementation of the access or application changes. A detective control might include a transaction verification notice immedi ately following implementation of the submitted access or application changes. Based upon the incidents the Agencies have reviewed, enhanced

controls over administrative access and functions can effectively reduce money transfer fraud. LAYERED SECURITY FOR INCREASED SAFETY Your bank uses both single and multi-factor authentication, as well as additional layered security measures when appropriate. Layered security is characterized by the use of different controls at different points in a transaction process so that a weakness in one control is generally compensated for by the strength of a different control. This allows your bank to authenticate customers and respond to suspicious activity related to initial login and then later to reconfirm this authentication when further transactions involve the transfer of funds. For business accounts, layered security might often include enhanced controls for system administrators who are granted privileges to set up or change system configurations, such as setting access privileges and application configurations and/or limitations. INTERNAL ASSESSMENTS AT YOUR BANK The new supervisory guidance offers ways your bank can look for anomalies that could indicate fraud. The goal is to ensure that the level of authentication called for in a particular transaction is appropriate to the level of risk in that application. Accordingly, your bank has concluded a comprehensive risk-assessment of its current methods as recommended in the FFIEC guidelines. These risk assessments consider, for example:

EXAMPLES OF LAYERED SECURITY FOR BUSINESS ACCOUNTS Whenever increased risk to your transaction security might warrant it, your bank will have available additional verifi cation procedures, or layers of control, such as: Fraud detection and monitoring systems that include consideration of customer history and behavior; Dual customer authorization through different access devices; Out-of-band verification for transactions; Positive pay, debit blocks, and other techniques to appropriately limit the transactional use of the account; Transaction value thresholds, number of transactions allowed per day, and allowable payment windows (e.g., days and times); Internet protocol (IP) reputation-based tools to block connection to banking servers from IP addresses known or suspected to be associated with fraudulent activities; Policies and practices for addressing customer devices identifi ed as potentially compromised and customers who may be facilitating fraud; Account maintenance controls over activities performed by customers either online or through customer service channels. Changes in the internal and external threat environment Changes in the customer base adopting electronic banking Changes in the customer functionality offered through electronic banking; and Actual incidents of security breaches, identity theft, or fraud experienced by the institution or industry. Your bank joins FFIEC and the financial regulatory agencies in strongly urging businesses account holders to conduct similar internal assessments to ensure the highest level of security possible for your transactions.

YOUR PROTECTIONS UNDER REG E Banks follow specific rules for electronic transactions issued by the Federal Reserve Board known as Regulation E. Under the protections provided under Reg E, consumers can recover internet banking losses according to how soon they are reported. In general, these protections are extended to consumers and consumer accounts. Your banker can provide additional details about how Reg E might affect your business account. IF YOU HAVE SUSPICIONS If you notice suspicious activity within your account or experience security-related events you can contact anyone at your bank and you will be quickly and courteously guided to the person responsible for handling such issues. FINANCIAL EDUCATION CORPORATION