Will You be the Next Headline?

Size: px
Start display at page:

Download "Will You be the Next Headline?"

Transcription

1 Will You be the Next Headline? Payments fraud awareness & prevention FOCUS Spring 2017 Conference

2 On the agenda What s Driving the Security Landscape Terminology to know Planning ahead and best practices Q & A With a demographic shift towards social networking and using online channels and mobile devices for communication and transactions, fraudsters are taking advantage of the changing landscape. Areas of vulnerability are not as clear as they used to be. 3 4 out of companies were a target of cyber attack over the past 18 months companies surveyed in 2016 AFP Risk Survey 2 AFP is a registered trademark of the Association for Financial Professionals.

3 Payments fraud in the news Sony Pictures 100 terabytes of data Home Depot 56 MM customer records JPMorgan Chase 76 MM account holders ebay 145 MM user records Target 56 MM credit card records Source: zations/worlds-biggest-data-breaches-hacks/ (1) Wall Street Journal : White House Cybersecurity Event to Draw Top Tech, Wall Street Execs (Feb. 11, 2015) (2) The Province: Cyber Crime: Fake from the boss is a popular fraud (March 30, 2015) (3) CNN: Insurance giant Anthem hit by massive data breach (Feb. 6, 2015) 4) The Washington Times: Despite evidence, FBI insists North Korea to blame for Sony hacking (Dec. 30, 2014) 3

4 What s Driving the Security Landscape? Innovation Government Data Compromises New entrants New technologies New business models Security mandates Payment networks Concentrated in North America Leading to card fraud (card-not-present as well as counterfeit fraud) 4

5 Terminology to know

6 What it all means DATA BREACH An incident in which sensitive, protected or confidential data is viewed, stolen or used by unauthorized individual MALWARE Software that is intended to damage or disable computers and computer systems SPOOFING messages with a forged sender address successful fraudulent transaction PHISHING/SMISHING Infected files/malicious links sent through or SMS message MASQUERADING Attack that uses a fake identity, such as a network identity, to gain unauthorized access to personal computer information through legitimate access identification 6 AFP is a registered trademark of the Association for Financial Professionals.

7 How phishing works Looks like a legitimate correspondence from the company Wording does not have the level of refinement expected from an authentic company message Has an attention getter high dollar amount of a cell bill in this example Embedded links activate malware download on your device Some individuals click on the links and may not even recognize they don t have a relationship with the company 7

8 Headline HEADLINE.. Even University Fraudsters Prefer Direct Deposit of Their Pay University Adds Fraudsters to its Payroll 8

9 Headline HEADLINE.. Fraudsters Make Quick Work of Unsuspecting University and its Funds 9

10 How spoofing and masquerading work Once malware is in your system, fraudsters can Access credentials Read s Collect business contacts Initiate s to accounts payable pretending to be you Ask the recipient to process a payment From: Treasurer@mycompany.com Sent: Monday, February 2, :17am To: rebecca.dumornay@mycompany.com Subject: FW: Wire Transfer This is the third one. We are pulling the confirmation now and will send to you. From: Treasurer@mycompany.com Sent: Monday, January 12, :30am To: rebecca.dumornay@mycompany.com Subject: FW: Wire Transfer FYI, this needs to get processed today. I checked with?? to get your help processing it along. I will assume we take care of any vendor forms after the fact. I can send am directly to??? or let you drive from here. Let me know. From: Treasurer@mycompany.com Sent: Monday, January 12, :59am To: rebecca.dumornay@mycompany.com Subject: FW: Wire Transfer Process a wire of $73, to the attached account information. Code it to admin expense. Let me know when this has been completed. Thanks Forwarded message From: CEO@mycompany.com Sent: Monday, January 12, :45am To: Treasurer@mycompany.com Subject: Wire Transfer Nick - Per our conversation, I have attached the wiring instructions for the wire. Let me know when done. Thanks. Charlie 10

11 Headline HEADLINE.. University CFO Authorizes $500,000 Fraudulent Payment University Grateful to Make $1 Million Fraudulent Payment 11

12 Planning ahead & best practices

13 Collaboration is key Online Banking and Mobile Applications User authentication Device authentication Two factor authentication Client internal controls and policies Fraud detection and monitoring Entitlements and administrative controls Client education and awareness Fraud plan Fraud monitoring across channels to protect our clients Device authentication Online session activity Detect out-ofpattern transactions Electronic / IT standards Transaction protocols Segregation of duties Fraud prevention products Information compromise event response Awareness and education 13

14 File transmission connectivity security features CashPro Connect Layered features across the channel Transmission Content Self-Service Encrypted passwords (HTTPS/FTP protocols) Robust transmission channel, such as SWIFT FileAct Use notifications about file receipt and processing issues Test files in test environment with test data only If PGP is desired, double encryption (securing both contents and transmission channel) is required Digitally sign files with clientprivate PGP keys or 3SKey tokens Restrict access by integrating files directly to a corporate server Monitor payment file activity transmission status Use final release of file transmission payments in the bank s online portal Separation of roles and entitlements in ERP/TMS: Vendors Banks Accounts Manage 3SKey digital token assignments 14

15 Establish segregation of duties Requires (through dual approval) that two different users initiate and approve transactions Requires (through dual approval) that two different users initiate and approve creation of user accounts, as well as changes to entitlements Provides customized authorization/entitlement to set level of system access for each user by service, by function or by transaction amount Use the least privilege model, user doesn t need it, don t grant it Review user account and administration settings regularly Helps deter internal and external fraud Adds a layer of security to help protect high risk transactions 15

16 Protection solutions Best practices Check fraud reminder Reconcile accounts on a daily basis Segregate duties / auditing duties for financial activities Migrate to electronic payment products Become fraud focused on inquiries from other institutions regarding legitimacy of checks Escalate suspicious activities to management team Safeguard check stock with check stock security features Consider outsourcing check processing to secured vendor Positive Pay Automate review of items before decision to Pay or Return Teller Positive Pay Integrates check decision at teller in banking centers Payee Positive Pay Determine if payee names have been altered Reverse Positive Pay Notify bank of exception items identified on file Maximum Dollar Control Flag any check over a given dollar amount to decision Fraudsters have easy access to paper, printers and scanners to create phony checks with detailed personal banking information obtained from stolen paper or electronic image items 16

17 Wire and ACH fraud prevention Separate duties / auditing responsibilities across user credentials to provide additional security within cash management system Set individual user limits appropriate for payment / user Maximum dollar amount per transaction for initiating and/or approving wires and ACH Maximum daily cumulative dollar amount for wires initiated and/or approved Review procedures on regular basis, confirm user credentials updated and maintained to represent appropriate needs Use Repetitive Wire Templates to eliminate manual intervention/manipulation Establish a secondary channel for changes to beneficiary payment details to help address non-standard payment requests that come may from potential phishing scams Advancement in technology and information systems has provided companies with significant opportunities for greater productivity, efficiency and profitability AFP Risk Survey ACH Blocks Block incoming ACH transactions from posting to accounts ACH Positive Pay Monitor / control transactions before post to bank account Allow transaction acceptance or rejection in real time ACH Authorization Post only incoming authorized ACH items ACH fraud prevention solutions for U.S. domiciled accounts only. 17 AFP is a registered trademark of the Association for Financial Professionals.

18 Headline HEADLINE.. Employee Has Big Black Friday on University Dime Big Limits + No Controls Equals Boon for Local Little League 18

19 Card industry: Best Practices to Prevent Misuse Internal audit processes 2. Sample metrics 3. Client controls 4. Program administrators 5. Cardholders Create guidelines for card issuance and handling Determine who should be eligible to apply for a card Determine approval levels required Segregate duties of ordering and receiving of cards Create internal procedures Requirements for obtaining a card Administrative / Management Usage / Purchasing Accounts Payable/Accounting Online Cardholder Reconciliation Audit/Intellilink Create policies or business rules o o o o o o o Business versus Personal Use Cash access Card sharing Ghost cards Roles and responsibilities Training Audit exceptions

20 Make a cyber attack plan Prevention ESTABLISH sound internal COMMUNICATE and ESCALATE any transaction payment processes using best practices enforce processes across organization that does not follow the established process Response CONTACT your treasury representative and follow their instructions DISABLE impacted electronic equipment and user access YOU determine based on your internal controls 60% companies surveyed in 2015 AFP Risk Survey of companies do not have a response plan for a cyber breach 20 AFP is a registered trademark of the Association for Financial Professionals.

21 Other Considerations to Stay out of the Headlines 21 Do your employees have access to personal or social media on their work computers? If yes, WHY??? Do you store any payment information in your system? Payroll, AP, Student Refunds? Who obtains this information and how is it validated? Where is this information stored and how does it get updated? Do you utilize any Alias Based payments? Paymode-X Digital Disbursements For your Pcard program, do you utilize online reconciliation? How do you educate your employees about these risks? Awareness is key for some these emerging fraudulent schemes Is Training mandatory? Bank experts and industry leaders share trends, tools and tactics for all business segments through video vignettes, case studies, podcasts, and featured white papers. Learn more: managing fraud risk website ACH fraud prevention solutions for U.S. domiciled accounts only.

22 Q & A Kevin Larkin SVP and Market Leader Bank of America Merrill Lynch Kevin.larkin@baml.com

23 Notice to Recipient "Bank of America Merrill Lynch" is the marketing name for the global banking and global markets businesses of Bank of America Corporation. Lending, derivatives and other commercial banking activities are performed globally by banking affiliates of Bank of America Corporation, including Bank of America, N.A., member FDIC. Securities, strategic advisory, and other investment banking activities are performed globally by investment banking affiliates of Bank of America Corporation ("Investment Banking Affiliates"), including, in the United States, Merrill Lynch, Pierce, Fenner & Smith Incorporated and Merrill Lynch Professional Clearing Corp., both of which are registered as broker-dealers and members of SIPC, and, in other jurisdictions, by locally registered entities. Merrill Lynch, Pierce, Fenner & Smith Incorporated and Merrill Lynch Professional Clearing Corp. are registered as futures commission merchants with the CFTC and are members of the NFA. Investment products offered by Investment Banking Affiliates: Are Not FDIC Insured * May Lose Value * Are Not Bank Guaranteed. This document is intended for information purposes only and does not constitute a binding commitment to enter into any type of transaction or business relationship as a consequence of any information contained herein. These materials have been prepared by one or more subsidiaries of Bank of America Corporation solely for the client or potential client to whom such materials are directly addressed and delivered (the Company ) in connection with an actual or potential business relationship and may not be used or relied upon for any purpose other than as specifically contemplated by a written agreement with us. We assume no obligation to update or otherwise revise these materials, which speak as of the date of this presentation (or another date, if so noted) and are subject to change without notice. Under no circumstances may a copy of this presentation be shown, copied, transmitted or otherwise given to any person other than your authorized representatives. Products and services that may be referenced in the accompanying materials may be provided through one or more affiliates of Bank of America, N.A. We are required to obtain, verify and record certain information that identifies our clients, which information includes the name and address of the client and other information that will allow us to identify the client in accordance with the USA Patriot Act (Title III of Pub. L , as amended (signed into law October 26, 2001)) and such other laws, rules and regulations. We do not provide legal, compliance, tax or accounting advice. Accordingly, any statements contained herein as to tax matters were neither written nor intended by us to be used and cannot be used by any taxpayer for the purpose of avoiding tax penalties that may be imposed on such taxpayer. For more information, including terms and conditions that apply to the service(s), please contact your Bank of America Merrill Lynch representative. Investment Banking Affiliates are not banks. The securities and financial instruments sold, offered or recommended by Investment Banking Affiliates, including without limitation money market mutual funds, are not bank deposits, are not guaranteed by, and are not otherwise obligations of, any bank, thrift or other subsidiary of Bank of America Corporation (unless explicitly stated otherwise), and are not insured by the Federal Deposit Insurance Corporation ( FDIC ) or any other governmental agency (unless explicitly stated otherwise). This document is intended for information purposes only and does not constitute investment advice or a recommendation or an offer or solicitation, and is not the basis for any contract to purchase or sell any security or other instrument, or for Investment Banking Affiliates or banking affiliates to enter into or arrange any type of transaction as a consequent of any information contained herein. With respect to investments in money market mutual funds, you should carefully consider a fund s investment objectives, risks, charges, and expenses before investing. Although money market mutual funds seek to preserve the value of your investment at $1.00 per share, it is possible to lose money by investing in money market mutual funds. The value of investments and the income derived from them may go down as well as up and you may not get back your original investment. The level of yield may be subject to fluctuation and is not guaranteed. Changes in rates of exchange between currencies may cause the value of investments to decrease or increase. We have adopted policies and guidelines designed to preserve the independence of our research analysts. These policies prohibit employees from offering research coverage, a favorable research rating or a specific price target or offering to change a research rating or price target as consideration for or an inducement to obtain business or other compensation. Copyright 2015 Bank of America Corporation. Bank of America N.A., Member FDIC, Equal Housing Lender. 23

Wholesale Lockbox Standards and Options. US Sites Atlanta, Boston, Chicago, Dallas, Los Angeles, St. Louis

Wholesale Lockbox Standards and Options. US Sites Atlanta, Boston, Chicago, Dallas, Los Angeles, St. Louis Wholesale Lockbox Standards and Options US Sites Atlanta, Boston, Chicago, Dallas, Los Angeles, St. Louis November 2017 Introduction As a wholesale lockbox client, we want to provide you with upfront processing

More information

Tools, Tips and Techniques to Mitigate Fraud. September 2017

Tools, Tips and Techniques to Mitigate Fraud. September 2017 Tools, Tips and Techniques to Mitigate Fraud September 2017 1 Agenda Email Threats Establish Controls Fraud Invoice Schemes Reducing Risk 2 Email Threats 3 What it all Means PHISHING Infected files/malicious

More information

The BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO

The BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO The BUSINESS of Fraud. Don t let it put you out of business. Veenindra J. Singh, First Vice President, Treasury Management Consultant California Bank & Trust 300 Lakeside Drive, Suite 800 Oakland, Ca 94612

More information

9/11/ FALL CONFERENCE & TRAINING SEMINAR 2014 FALL CONFERENCE & TRAINING SEMINAR

9/11/ FALL CONFERENCE & TRAINING SEMINAR 2014 FALL CONFERENCE & TRAINING SEMINAR 1 2 1 Agenda: Types of Fraud Things you can do internally Things that companies can do Services Provided by the Bank 3 Because that is where the money is. 4 2 Checks Credit Cards ACH (Debits / Credits)

More information

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name. security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name. Security for Your Business Mitigating risk is a daily reality for business owners, but you don t have

More information

CYBER SECURITY RESOURCE GUIDE. Cyber Fraud Overview. Best Practices and Resources. Quick Reference Guide for Employees. Cyber Security Checklist

CYBER SECURITY RESOURCE GUIDE. Cyber Fraud Overview. Best Practices and Resources. Quick Reference Guide for Employees. Cyber Security Checklist CORPORATE & INSTITUTIONAL BANKING CYBER SECURITY RESOURCE GUIDE Cyber Fraud Overview Best Practices and Resources Quick Reference Guide for Employees Cyber Security Checklist 2 5 7 9 AWARENESS OF CYBER

More information

You are signing up to use the Middlesex Savings Bank Person to Person Service powered by Acculynk that allows you to send funds to another person.

You are signing up to use the Middlesex Savings Bank Person to Person Service powered by Acculynk that allows you to send funds to another person. Middlesex Bank Person to Person Service You are signing up to use the Middlesex Savings Bank Person to Person Service powered by Acculynk that allows you to send funds to another person. This Agreement

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

OBTAINING YOUR PIN# FOR UNIVERSITY PROCUREMENT CARD

OBTAINING YOUR PIN# FOR UNIVERSITY PROCUREMENT CARD OBTAINING YOUR PIN# FOR UNIVERSITY PROCUREMENT CARD 1) www.baml.com/pincheck 2) CLICK ON Register New User 3) Card Number (whole cc number) 4) Select: I am a Cardholder. This is my corporate cc number

More information

Works. Works Quick Reference Guide. Managing Transactions for Accountholders

Works. Works Quick Reference Guide. Managing Transactions for Accountholders Works Quick Reference Guide Managing Transactions for Accountholders Table of Contents About this Guide...3 Allocating or Editing a Transaction...4 Adding a Transaction to an Expense Report...8 Managing

More information

CashPro Online Getting Started Guide. Client Side Capture

CashPro Online Getting Started Guide. Client Side Capture CashPro Online Getting Started Guide Client Side Capture Table of Contents Introduction...3 Accessing Client Side Capture...4 Downloading and Configuring the Micro Server...4 Scanning Documents...6 Inspecting

More information

Business Online Banking & Bill Pay Guide to Getting Started

Business Online Banking & Bill Pay Guide to Getting Started Business Online Banking & Bill Pay Guide to Getting Started What s Inside Contents Security at Vectra Bank... 4 Getting Started Online... 5 Welcome to Vectra Bank Business Online Banking. Whether you re

More information

huntington Business security suite user guide

huntington Business security suite user guide huntington Business security suite user guide Contents Welcome 3 Section 1: Getting Started Logging In 5 Section 2: ACH Positive Pay Overview 7 Filters 8 managing exceptions 11 warehouse 14 approvals 15

More information

Cyber Insurance: What is your bank doing to manage risk? presented by

Cyber Insurance: What is your bank doing to manage risk? presented by Cyber Insurance: What is your bank doing to manage risk? David Kitchen presented by Lisa Micciche Today s Agenda Claims Statistics Common Types of Cyber Attacks Typical Costs Incurred to Respond to an

More information

Security and Fraud Prevention

Security and Fraud Prevention Security and Fraud Prevention Mary Rosendahl Director, Digital Channels Bank of America Merrill Lynch December 2017 Agenda Evolving threat environment Fraud schemes and scams Security best practices The

More information

CashPro Online. Information Reporting: BTRS Format. Introduction. BTRS Record Descriptions

CashPro Online. Information Reporting: BTRS Format. Introduction. BTRS Record Descriptions CashPro Online Information Reporting: BTRS Format Introduction This card provides the information needed to interpret Balance and Transaction Reporting Standard (BTRS) format in Information Reporting within

More information

CitiManager. Registering for CitiManager, Enrolling in Paper-Free Statements, and Viewing Your Electronic Statement

CitiManager. Registering for CitiManager, Enrolling in Paper-Free Statements, and Viewing Your Electronic Statement CitiManager Registering for CitiManager, Enrolling in Paper-Free Statements, and Viewing Your Electronic Statement August 6, 2013 Table of Contents 1. Self-Registration in CitiManager (Cardholders) 3 2.

More information

Prevention of Identity Theft in Student Financial Transactions AP 5800

Prevention of Identity Theft in Student Financial Transactions AP 5800 Reference: Fair and Accurate Credit Transactions Act (Pub. L. 108-159) The Board recognizes that some activities of the Shasta-Tehama-Trinity Joint Community College District, "District," are subject to

More information

Identity Theft Prevention Program. Effective beginning August 1, 2009

Identity Theft Prevention Program. Effective beginning August 1, 2009 Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Christian Brothers University developed this Identity Theft Prevention Program pursuant to the Federal Trade Commission's

More information

CashPro Online. CashPro Statements. Getting Started Guide

CashPro Online. CashPro Statements. Getting Started Guide CashPro Online CashPro Statements Getting Started Guide Table of Contents Introduction... 3 Demand Deposit Account Online Statements Overview... 3 Accessing Demand Deposit Account Online Statements...

More information

CitiManager Alerts

CitiManager  Alerts GSA SmartPay 2010 Conference CitiManager Email Alerts Mini Session 12 th Annual GSA SmartPay Conference Atlanta, GA August 10 12, 2010 Goals & Objectives This course is designed to assist you in achieving

More information

CashPro Online. Information Reporting: BAI2 Format. Introduction. BAI Record Descriptions

CashPro Online. Information Reporting: BAI2 Format. Introduction. BAI Record Descriptions CashPro Online Information Reporting: BAI2 Format Introduction This card provides the information needed to interpret BAI formats in Information Reporting within CashPro Online. BAI2 and BAI2a, a Bank

More information

Capital Bank Express User Guide. The Tech Behind the Money

Capital Bank Express User Guide. The Tech Behind the Money Capital Bank Express User Guide The Tech Behind the Money Capital Bank is a full service commercial bank dedicated to providing the friendliest, most responsive banking services to professionals and businesses

More information

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications Gramm-Leach Bliley Act Section 501(b) and Customer Notification Roger Pittman Director of Operations Risk Federal Reserve Bank of Atlanta Overview Bank IT examination perspective Background information

More information

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies Fraud Overview and Mitigation Strategies SUNTRUST TEAM: DOUG HICKMAN SENIOR VICE PRESIDENT FOUNDATIONS AND ENDOWMENTS SPECIALTY PRACTICE JAMES BERNAL ASSISTANT VICE PRESIDENT FOUNDATIONS AND ENDOWMENTS

More information

JHA Payment Solutions. MASTER Site Funds Verification jxchange. Client Training Guide. ipay Solutions December 2016

JHA Payment Solutions. MASTER Site Funds Verification jxchange. Client Training Guide. ipay Solutions December 2016 JHA Payment Solutions MASTER Site Product Training... 1 Learning Objectives... 1 Recommended Audience... 1 Contact FI Support for Assistance... 1 MASTER Site Training... 2 Login Screen... 2 Home Page...

More information

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS? FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit

More information

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.

More information

SANTANDER TREASURY LINK TRANSITION FREQUENTLY ASKED QUESTIONS (FAQ)

SANTANDER TREASURY LINK TRANSITION FREQUENTLY ASKED QUESTIONS (FAQ) TRANSITION FREQUENTLY ASKED QUESTIONS (FAQ) INTRODUCING FOR ONLINE BANKING A NEW EXPERIENCE AHEAD We are pleased to introduce you to Santander Treasury Link and look forward to providing you with an Online

More information

[Utility Name] Identity Theft Prevention Program

[Utility Name] Identity Theft Prevention Program [Utility Name] Identity Theft Prevention Program Effective beginning, 2008 Minnesota Municipal Utilities Association Sample Red Flag policy I. PROGRAM ADOPTION The [Utility Name] ("Utility") developed

More information

CashPro Online Getting Started Guide. Global Payments

CashPro Online Getting Started Guide. Global Payments CashPro Online Getting Started Guide Global Payments Table of Contents Introduction...3 Creating a Payment...3 Initiating a Free Form Payment...3 Initiating a Payment Using a Template...7 Decisioning a

More information

HF Markets SA (Pty) Ltd Protection of Personal Information Policy

HF Markets SA (Pty) Ltd Protection of Personal Information Policy Protection of Personal Information Policy Protection of Personal Information Policy This privacy statement covers the website www.hotforex.co.za, and all its related subdomains that are registered and

More information

Questions and Answers

Questions and Answers How do I setup users in Business Bill Pay? Please contact your Treasury Management Services team at 1-877-305-7125 for assistance. Who can assist me with my Business Online Banking, Bill Pay, QuickBooks

More information

Safeguard Your Assets ABCs to Mitigate Fraud in an Evolving Payments Environment. April 10, 2014

Safeguard Your Assets ABCs to Mitigate Fraud in an Evolving Payments Environment. April 10, 2014 Safeguard Your Assets ABCs to Mitigate Fraud in an Evolving Payments Environment April 10, 2014 Speakers Milton Santiago, Portal and Treasury echannel Executive, Bank of America Merrill Lynch (Moderator)

More information

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS STOCKTON UNIVERSITY PROCEDURE Identity Theft Prevention Program Procedure Administrator: Director of Risk Management and Environmental/Health/Safety Authority: Fair and Accurate Credit Transactions Act

More information

Wire Fraud Scams: How to Protect

Wire Fraud Scams: How to Protect 1 Wire Fraud Scams: How to Protect Your Buyer Clients Connection Jessica Edgerton, NAR Associate Counsel GOV GODWIN EMEFELE URGENT NOTICE, Is my pleasure to inform you that your

More information

Mobile Cash Management

Mobile Cash Management Mobile Cash Management Best Practices Presented by: Dawn Papadatos Date: April 24, 2017 Agenda I. Current Mobile Banking Landscape II. Benefits of Corporate Mobile Banking III. Mobile Security IV. The

More information

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN? WHAT IS CORPORATE ACCOUNT TAKEOVER? Corporate Account Takeover (also referred to as CATO) is a type of fraud where criminals gain access to a business financial accounts to make unauthorized transactions.

More information

NOT-FOR- PROFIT SERVICES GROUP Client Information Bulletin

NOT-FOR- PROFIT SERVICES GROUP Client Information Bulletin NOT-FOR- PROFIT SERVICES GROUP GUARDING AGAINST CYBERTHEFT The Problem: There has been an increase in electronic funds transfer (EFT) fraud being perpetrated on small to medium-size businesses in the past

More information

IDENTITY THEFT PREVENTION Policy Statement

IDENTITY THEFT PREVENTION Policy Statement Responsible University Officials: Vice President for Financial Operations and Treasurer Responsible Office: Office of Financial Operations Origination Date: October 13, 2009 IDENTITY THEFT PREVENTION Policy

More information

Seattle University Identity Theft Prevention Program. Purpose. Definitions

Seattle University Identity Theft Prevention Program. Purpose. Definitions Seattle University Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in connection

More information

CashPro Online. CashPro Online Quick Reference Guide Global Payments Using Bank-Defined Import File Formats

CashPro Online. CashPro Online Quick Reference Guide Global Payments Using Bank-Defined Import File Formats CashPro Online CashPro Online Quick Reference Guide Global Payments Using Bank-Defined Import File Formats CashPro Online Table of Contents About this Guide...3 Global Payments Comma-Separated Value Format...5

More information

QNB Bank-ONLINE AGREEMENT

QNB Bank-ONLINE AGREEMENT This is an Agreement between you and QNB Bank ("QNB"). It explains the rules of your electronic access to your accounts through QNB Online. By using QNB-Online, you accept all the terms and conditions

More information

Mobile Cash Management

Mobile Cash Management Mobile Cash Management Best Practices Presented by: Ed Hiddleson Date: April 19/20, 2018 Agenda I. Current Mobile Banking Landscape II. Benefits of Mobile Banking III. Mobile Security IV. The Future of

More information

Cybersecurity in Higher Ed

Cybersecurity in Higher Ed Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,

More information

Taking control of your finances... 5 Use these tips to manage your finances

Taking control of your finances... 5 Use these tips to manage your finances In focus Index In focus... 2 Safeguard your NRI account Taking control of your finances... 5 Use these tips to manage your finances NRI Expert speak... 6 Mr. S. Shanbhag - Financial Expert, answers queries

More information

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE COMPLIANCE ADVISOR NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE A PUBLICATION BY THE EXCESS LINE ASSOCIATION OF NEW YORK One Exchange Plaza 55 Broadway 29th Floor New York, New York 10006-3728 Telephone:

More information

Detailed Conversion Steps to Transition from Business Online Banking Getting Started Business Continuity Checklist for CashManager OnLine

Detailed Conversion Steps to Transition from Business Online Banking Getting Started Business Continuity Checklist for CashManager OnLine Detailed Conversion Steps to Transition from Business Online Banking Getting Started Business Continuity Checklist for CashManager OnLine *Once logged on to CashManager OnLine, users have access to extensive

More information

Fraud Update: Why Fraudsters Love Wires and How to Stop Them. Luis Rojas, Director, Product Management WesPay 2014

Fraud Update: Why Fraudsters Love Wires and How to Stop Them. Luis Rojas, Director, Product Management WesPay 2014 Fraud Update: Why Fraudsters Love Wires and How to Stop Them Luis Rojas, Director, Product Management WesPay 2014 Competitive Pressures Drive Fraud and Operational Risk Availability Of Information Creates

More information

CashPro Online Getting Started Guide. Foreign Exchange Administration

CashPro Online Getting Started Guide. Foreign Exchange Administration CashPro Online Getting Started Guide Foreign Exchange Administration Table of Contents Introduction...3 Creating a User...3 Reviewing and Approving User Requests...4 Assigning Detailed Entitlements...6

More information

Electronic Communication of Personal Health Information

Electronic Communication of Personal Health Information Electronic Communication of Personal Health Information A presentation to the Porcupine Health Unit (Timmins, Ontario) May 11 th, 2017 Nicole Minutti, Health Policy Analyst Agenda 1. Protecting Privacy

More information

Cyber Security Updates and Trends Affecting the Real Estate Industry

Cyber Security Updates and Trends Affecting the Real Estate Industry Cyber Security Updates and Trends Affecting the Real Estate Industry What, Why, and How? Agenda Cyber Security Today Changes to Security Standards and Trends Protecting Yourself and Your Organization Takeways

More information

Adding and Removing User Entitlements

Adding and Removing User Entitlements Administration: Automated Clearing House Adding and Removing User Entitlements Technical Support Go to CashPro Online > Support > Help > Contact Us. This card provides the information needed to add and

More information

Small Business FRAUD PREVENTION Manual

Small Business FRAUD PREVENTION Manual Small Business FRAUD PREVENTION Manual TABLE OF CONTENTS PREFACE... ix PART 1: INTERNAL FRAUD THREATS I. INTRODUCTION TO EMPLOYEE FRAUD The Shocking Cost of Employee Theft and Fraud... 1 The Cost of Fraud

More information

When you provide personal information to us it will only be used in the ways described in this privacy policy.

When you provide personal information to us it will only be used in the ways described in this privacy policy. Website Privacy Policy Overview Welcome to this Global Payroll Management Institute website, owned and produced by the Global Payroll Management Institute, Inc. (GPMI). Our website is available to all

More information

Supervisor s Guide. supervisor s guide (continued) Welcome to NBT Online Banker for Business! Supervisor Functions NBT ONLINE BANKER FOR BUSINESS

Supervisor s Guide. supervisor s guide (continued) Welcome to NBT Online Banker for Business! Supervisor Functions NBT ONLINE BANKER FOR BUSINESS supervisor s guide () NBT ONLINE BANKER FOR BUSINESS Supervisor s Guide Welcome to NBT Online Banker for Business! This Supervisor s Guide was created to provide your organization s designated Online Supervisor

More information

Works 4 Quick Reference Guide. Managing Transactions for Accountholders

Works 4 Quick Reference Guide. Managing Transactions for Accountholders Works 4 Quick Reference Guide Managing Transactions for Accountholders 1 CONTENTS About This Guide... 5 About The Works 4 Enhancements... 5 Which Browsers Are Certified to Run Works?... 6 Login Page...

More information

Works 4 Quick Reference Guide Managing Transactions for Approvers

Works 4 Quick Reference Guide Managing Transactions for Approvers Works 4 Quick Reference Guide Managing Transactions for Approvers CONTENTS About this Guide... 4 About The Works Enhancements... 4 Which Browsers Are Certified to Run Works?... 5 Login page... 6 Introduction...

More information

Red Flag Policy and Identity Theft Prevention Program

Red Flag Policy and Identity Theft Prevention Program Unified Government of Wyandotte County and Kansas City, Kansas Adopted: 5/11/2011 Red Flag Policy and Identity Theft Prevention Program Authority: The Mayor and the Board of Commissioners are responsible

More information

The Guide below is to help assist Users in navigating our Cash Management Online Banking

The Guide below is to help assist Users in navigating our Cash Management Online Banking The Guide below is to help assist Users in navigating our Cash Management Online Banking If you have questions please call or email our Cash Management Support Team at 1-844-213-5198 or CEN-CMOperations@my100bank.com

More information

Reference Guide (IRIS)

Reference Guide (IRIS) Reference Guide For Santander Bank s Interactive Reporting & Initiation Services (IRIS) Equal Housing Lender. Santander Bank, N.A. is a Member FDIC and a wholly owned subsidiary of Banco Santander, S.A.

More information

Cybersecurity and Nonprofit

Cybersecurity and Nonprofit Cybersecurity and Nonprofit 2 2 Agenda Cybersecurity and Non Profits Scenario #1 Scenario #2 What Makes a Difference Cyber Insurance and How it Helps Question and Answer 3 3 Cybersecurity and Nonprofit

More information

University of North Texas System Administration Identity Theft Prevention Program

University of North Texas System Administration Identity Theft Prevention Program University of North Texas System Administration Identity Theft Prevention Program I. Purpose of the Identity Theft Prevention Program The Federal Trade Commission ( FTC ) requires certain entities, including

More information

Legal Aspects of Cybersecurity

Legal Aspects of Cybersecurity Legal Aspects of Cybersecurity John W. Mashni Taylor A. Gast (517) 371-8257 (517) 371-8238 jmashni@fosterswift.com tgast@fosterswift.com Alexander A. Ayar (248) 538-6326 AAyar@FosterSwift.com Risks Data

More information

Set and Mobile Alert Messaging

Set  and Mobile Alert Messaging CitiManager Set Email and Mobile Alert Messaging Quick Reference Guide May 2013 Transaction Services User Guide Overview Use this procedure to set email and mobile alerts for various account activities.

More information

Guide to Getting Started. Personal Online Banking & Bill Pay

Guide to Getting Started. Personal Online Banking & Bill Pay Guide to Getting Started Personal Online Banking & Bill Pay What s Inside Welcome to National Bank of Arizona s Online Banking. Whether you re at home, at work, or on the road, our online services are

More information

Six Steps to Protect Your Clients and Protect Yourself from Identity Theft

Six Steps to Protect Your Clients and Protect Yourself from Identity Theft Six Steps to Protect Your Clients and Protect Yourself from Identity Theft Ley Mills IRS Stakeholder Liaison January 26, 2018 Cost of Data Theft Example: Connecticut tax preparer with 800 clients; mostly

More information

Personal Online Banking & Bill Pay. Guide to Getting Started

Personal Online Banking & Bill Pay. Guide to Getting Started Personal Online Banking & Bill Pay Guide to Getting Started What s Inside Contents Security at Vectra Bank... 4 Getting Started Online... 5 Welcome to Vectra Bank Online Banking. Whether you re at home,

More information

Target Breach Overview

Target Breach Overview Target Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more specifics? A: Yes, Target has confirmed that it experienced unauthorized access to its systems

More information

Regulatory Notice 10-21

Regulatory Notice 10-21 Regulatory Notice 10-21 SEC Approves New Consolidated FINRA Rules SEC Approval and Effective Dates for New Consolidated FINRA Rules and the Repeal of Certain NASD and Incorporated NYSE Rules Effective

More information

Caribbean Cyber Security: Not Only Government s Responsibility

Caribbean Cyber Security: Not Only Government s Responsibility Caribbean Cyber Security: Not Only Government s Responsibility AWARENESS AND VIGILANCE IS EVERYBODY S RESPONSIBILITY Preseted at: ICT Symposium Antigua and Barbuda March 2017 Caribbean Cyber Security Events

More information

OVERVIEW TIMING AND DEADLINES PERMISSIONS, LIMITS, AND APPROVALS PROCEDURES REPORTS STOP PAYMENTS PROCEDURES...

OVERVIEW TIMING AND DEADLINES PERMISSIONS, LIMITS, AND APPROVALS PROCEDURES REPORTS STOP PAYMENTS PROCEDURES... TABLE OF CONTENTS TABLE OF CONTENTS... 1 ACCESSING THE SYSTEM... 4 LOGGING IN... 4 FIRST TIME LOG-IN ONLY... 4 UPDATING USER PROFILE, USER PASSWORD, AND SECURITY QUESTIONS... 6 ESTABLISHING USER PREFERENCES...

More information

Six Steps to Protect Your Clients and Protect Yourself from Identity Theft. Ley Mills IRS Stakeholder Liaison December 20, 2017

Six Steps to Protect Your Clients and Protect Yourself from Identity Theft. Ley Mills IRS Stakeholder Liaison December 20, 2017 Six Steps to Protect Your Clients and Protect Yourself from Identity Theft Ley Mills IRS Stakeholder Liaison December 20, 2017 Cost of Data Theft Example: Connecticut tax preparer with 800 clients; mostly

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

( Utility Name ) Identity Theft Prevention Program

( Utility Name ) Identity Theft Prevention Program ***DRAFT*** ( Utility Name ) Identity Theft Prevention Program Implemented as of, 2008 *** This document is intended to give guidance to municipal utilities in their understanding of the FTC Red Flag Rule.

More information

CERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement

CERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement CERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement Welcome to Certified Mail Envelopes and Certified Mail Labels web sites (the Site ) a website, trademark and business name owned and operated

More information

CSBANK ONLINE ENROLLMENT FORM CITIZENS STATE BANK

CSBANK ONLINE ENROLLMENT FORM CITIZENS STATE BANK CSBANK ONLINE ENROLLMENT FORM CITIZENS STATE BANK To sign up for Citizens State Bank s Internet Banking Services, complete all information on this form. Please read the CSBank Online Internet Banking Agreement

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

CashPro Online Getting Started Guide. Remote Deposit

CashPro Online Getting Started Guide. Remote Deposit CashPro Online Getting Started Guide Remote Deposit Table of Contents Introduction... 3 Logging in to Remote Deposit Service... 3 Installing the Scanner Driver... 4 Making a Deposit... 5 Transmitting a

More information

FinFit will request and collect information in order to determine whether you qualify for FinFit Loans*.

FinFit will request and collect information in order to determine whether you qualify for FinFit Loans*. FinFit Web Privacy Policy General: This Privacy Policy ( Policy ) describes the ways FinFit, LLC ( FinFit, we, us) collects, stores, uses and protects information we receive from you or that you may provide

More information

CashPro Online Getting Started Guide. Receivables

CashPro Online Getting Started Guide. Receivables CashPro Online Getting Started Guide Receivables Table of Contents Introduction...3 Setting Preferences...3 Viewing a Batch Summary Report...4 Viewing a Batch Detail - Basic Report...5 Viewing Images...6

More information

Web Cash Fraud Prevention Best Practices

Web Cash Fraud Prevention Best Practices Web Cash Fraud Prevention Best Practices Tips on what you can do to prevent Online fraud. This document provides best practices to avoid or reduce exposure to fraud. You can use it to educate your Web

More information

GLBA. The Gramm-Leach-Bliley Act

GLBA. The Gramm-Leach-Bliley Act GLBA The Gramm-Leach-Bliley Act Table of content Introduction 03 Who is affected by GLBA? 06 Why should my organization comply with GLBA? 07 What does GLBA require for email compliance? 08 How can my organization

More information

Fighting Fraud: Safeguarding Your Business. November 5th, 2015

Fighting Fraud: Safeguarding Your Business. November 5th, 2015 Fighting Fraud: Safeguarding Your Business November 5th, 2015 Duane Bunn, SVP, Dealer Financial Services Treasury Management Sales Manager Duane Bunn Bank of America Merrill Lynch Duane Bunn Dealer Financial

More information

Regions Quick Deposit

Regions Quick Deposit Regions Quick Deposit Frequently Asked Questions It s time to expect more. Regions Bank Member FDIC Revised April 2016 Regions Quick Deposit Note: Select a question below to view the answer. Where can

More information

Recognizing & Protecting Against Fraud

Recognizing & Protecting Against Fraud Fraud Mitigation and Cyber Strategies for Public Entities April 209 Recognizing & Protecting Against Fraud 2 Why is it Important to Remain Vigilant? Fraud does not discriminate it occurs everywhere, and

More information

Terms and Conditions P2P Service E-Signature and Electronic Disclosures Agreement

Terms and Conditions P2P Service E-Signature and Electronic Disclosures Agreement You are signing up to use the P2P service powered by Acculynk ( Service ) that allows you to send funds to another person. This ( E-Sign Agreement ) applies to all communications, documents, disclosures

More information

On Audit of FOREX Transactions

On Audit of FOREX Transactions Note On Audit of FOREX Transactions ADVANCES COMPLIANCE ADVANCES- FOREIGN: Is Branch in B or C category PCs and PCFCs FBP/FBN PCs: Given against LCs/confirmed orders Whether reported in stock statements

More information

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It The Credential Phishing Handbook Why It Still Works and 4 Steps to Prevent It Introduction Phishing is more than 20 years old, but still represents more than 90% of targeted attacks. The reason is simple:

More information

Who We Are! Natalie Timpone

Who We Are! Natalie Timpone Who We Are! Natalie Timpone Manager of Security Business Management Office Enterprise Security Awareness Manager Carmelo Walsh Security, Risk, and Compliance Security Awareness Subject Matter Expert Who

More information

A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services

A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services A Layered Approach to Fraud Mitigation Nick White Product Manager, FIS Payments Integrated Financial Services Session Agenda Growing Fraud Concerns Old Habits Die Hard Maneuvering through the Barriers

More information

Business ebanking Online Wire Transfers

Business ebanking Online Wire Transfers Business ebanking Online Wire Transfers This guide instructs users how to originate Wire transfers through Business ebanking. If you need support, please contact Treasury Services Support at (877) 920

More information

Red Flags Program. Purpose

Red Flags Program. Purpose Red Flags Program Purpose The purpose of this Red Flags Rules Program is to document the protocol adopted by the University of Memphis in compliance with the Red Flags Rules. Many offices at the University

More information

Policy 24 Identity Theft Prevention Program IDENTITY THEFT PREVENTION PROGRAM OF WEBB CREEK UTILITY DISTRICT

Policy 24 Identity Theft Prevention Program IDENTITY THEFT PREVENTION PROGRAM OF WEBB CREEK UTILITY DISTRICT Policy 24 Identity Theft Prevention Program IDENTITY THEFT PREVENTION PROGRAM OF WEBB CREEK UTILITY DISTRICT The Utility maintains accounts for its customers to pay for utility service where bills are

More information

June 2012 First Data PCI RAPID COMPLY SM Solution

June 2012 First Data PCI RAPID COMPLY SM Solution June 2012 First Data PCI RAPID COMPLY SM Solution You don t have to be a security expert to be compliant. Developer: 06 Rev: 05/03/2012 V: 1.0 Agenda Research Background Product Overview Steps to becoming

More information

Agreement Between the Per Diem Prepaid Cardholder and U.S. Bank National Association ( U.S. Bank ) (Dated January, 2014)

Agreement Between the Per Diem Prepaid Cardholder and U.S. Bank National Association ( U.S. Bank ) (Dated January, 2014) Non-Consumer Per Diem Cardholder Agreement Agreement Between the Per Diem Prepaid Cardholder and U.S. Bank National Association ( U.S. Bank ) (Dated January, 2014) IMPORTANT: The enclosed U.S. Bank Per

More information

Recognizing Fraud Staying Safe 2018 Information/Cyber Security Training

Recognizing Fraud Staying Safe 2018 Information/Cyber Security Training Recognizing Fraud Staying Safe 2018 Information/Cyber Security Training Copyright Sage Data Security 2017-2018 All Rights Reserved Presented by: John H Rogers, CISSP Director of Advisory Services john.rogers@sagedatasecurity.com

More information

First Federal Savings Bank of Mascoutah, IL Agreement and Disclosures

First Federal Savings Bank of Mascoutah, IL Agreement and Disclosures Agreement and Disclosures INTERNET BANKING TERMS AND CONDITIONS AGREEMENT This Agreement describes your rights and obligations as a user of the Online Banking Service and all other services made available

More information

THE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, December 29, 2003

THE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, December 29, 2003 THE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, 2004 This FAQ is not intended to provide specific advice about individual legal, business, or other questions. It was prepared

More information

CHAPTER 13 ELECTRONIC COMMERCE

CHAPTER 13 ELECTRONIC COMMERCE CHAPTER 13 ELECTRONIC COMMERCE Article 13.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial

More information