FRAUD GUIDANCE. Helping you protect your business

Size: px
Start display at page:

Download "FRAUD GUIDANCE. Helping you protect your business"

Transcription

1 FRAUD GUIDANCE Helping you protect your business

2 This guide gives you the information to support you in protecting your business against financial fraud. We show you how and where fraud can take place throughout your organisation and highlight the tell-tale things to look out for. We ve also included key actions you should take to safeguard yourself and your business. Taking some very basic steps can make a real difference to fraudsters success rates.

3 Contents Online Fraud 2 Top tips to prevent Online Fraud 3 Social Engineering 4 Scams 6 Employee Fraud 7 Cheque and Card Fraud 9 Case Studies 10 Take five to stop Fraud 13 Find out more 14 1

4 Online fraud Cyber-enabled fraud Malware Your systems can be infected by malware (malicious software) through viruses and trojans which can then interrupt your online banking sessions and present you with a fake, but seemingly genuine screen prompting you to enter passwords and codes which can be captured. Fraudsters will use this information to access your online accounts and make fraudulent payments. Ransomware This is a type of malware that operates by either blocking access to key files or by encryption, which requires a private key to decrypt files and restore your access. An attack is followed with a ransom demand to restore your access to the files and documents. The ransom payment is usually requested by digital currency e.g. Bitcoin which is almost impossible for the authorities to trace. Malware code is often hidden in attachments and free downloads, but fraudsters are always looking for new ways of downloading malware and malvertising is one recent type that has been used. It uses online advertising to spread malware and involves injecting malicious or malware-laden advertisements into legitimate online advertising networks and web pages. REPORTING FRAUD AND ATTEMPTED FRAUD Make sure you report any type of fraud or attempted fraud to Action Fraud UK 2

5 Top tips to prevent Online fraud Protecting your business 1. Ensure all PCs are protected by high-quality antivirus software and run frequent scans. Always ensure updates are actioned promptly and keep your firewalls switched on. 2. Ensure that unique, strong and secure passwords are used. 3. Only download software to your PC from sources you trust and delete it when no longer needed. 4. Make sure staff are trained in online fraud awareness and understand the importance of not opening any files attached to an from an unknown, suspicious or untrustworthy source. Ensure that they know to look out for indications for secure sites such as a key or padlock symbol. Refresh this training and ensure it is revisited by your colleagues regularly. 5. If possible dedicate a PC to be used solely for processing financial transactions. Do not use this PC for web browsing, and other activities that could allow the device to be infected with malware. 6. Use dual authorisation for payments where possible. 7. If you use a card and card reader, remove the card as soon as you ve logged on and only re-insert to carry out a signing action. Always log out correctly when you ve finished online banking. 8. Check the detail for every payment you make thoroughly, in particular the beneficiary account number. If possible, set up your system to require more than one individual to set up, amend and send each payment. 9. Log out and call the bank immediately if you see unexpected screens or pop-ups during a banking session. Refer to your IT specialist if your PC runs unusually slowly. 10. Back up critical data regularly to an independent source such as a hard drive or cloud. 3

6 Social Engineering The use of deception and manipulation to obtain confidential information Your social media footprint When used appropriately, social media networking makes it easy to keep in touch with friends, families, your customers and your clients, but for fraudsters these sites are valuable tools. Think about the information that s routinely loaded onto sites such as Facebook, LinkedIn, Twitter and Snapchat. We draw attention to birthdays, holidays, family, friends and pets. We also convey information on what we re doing, where we work, and the clubs that we are members of. All this information helps the fraudster build up a profile of their victims which can then be used to convincingly carry out their scams using social engineering techniques. Take a look at some real-life case studies on page 10. Keeping your information safe & protecting your business from social engineering Remember that following best practice guidelines for social networking / social media in the workplace are very similar to those in your private life. Bear in mind that fraudsters will look for and use information about your business posted by your staff on their social media sites. Provide training and guidance for all staff on best practice on using social media, and set guidelines for keeping personal and business information safe. These should include: setting privacy settings so that only trusted people can access your posts being cautious on who you let join your network not publishing any identifying confidential information about your business, directors, employees or customers. 4

7 Types of Social Engineering Techniques used What does it look like? Vishing Telephone scams, usually to obtain online banking passwords, confidential details or persuade you to transfer money from your account. Fraudsters, often purporting to be from your bank s fraud department, may call you to report a problem with your account, and ask you to confirm payments are genuine. Often the fraudsters have your name, address, colleague names, bank details essentially the kind of information you would expect a genuine caller to have. They will create a state of urgency and you may be made to believe your money is in danger and have to act quickly creating fear that no action will lead to a financial loss. It pays to take time and think. Banks will never call you to ask you to move money to a safe account or to read out passwords or passcodes. Smishing Targets users of mobile phones using text messages to obtain private and confidential information from individuals or encouraging them to ring a number or click on a link for more information. The message will typically alert you to a problem with your account. Fraudsters may spoof the message onto a genuine message thread. Unsolicited text messages from unknown numbers should raise alarm bells, but if you think it is genuine you should call the sender using a number from a bank statement or a verified source, not from the text message. Phishing scams, when fraudsters masquerade as your bank or another trusted organisation to obtain confidential information such as personal information, bank details or passwords. The may link through to a fake website, which looks almost identical to the legitimate one. A message might suggest that you need to act urgently, for example to prevent your online access from being blocked. Phishing s can look very convincing, copying branding and 'spoofing' addresses to make them look genuine. If you are in doubt about an you have received try these tips: Hover the mouse over the link and the URL details will come up and show if it's genuine Open up a new web page in your browser, go to the website via that route Contact the sender directly. Do not use the contact details or links provided in the If in doubt, don't click on the link. Spoofing Describes a fraudster s use of technology to imitate genuine telephone numbers and addresses of financial institutions or other trusted people or organisations. This can allow them to alter the incoming number that appears on your phone s caller display, to one that you know is the genuine number for the Bank. Alternatively, they could send an that appears to come from a senior person within the business, instructing an urgent payment to be made, usually via online banking; however the senior person s account is either hacked or copied by fraudsters. Take a look at some real life case studies on page 10. 5

8 Scams Protect your business from scams CEO Fraud Fraudsters send an to a member of staff within a business and make it look like it s come from the genuine CEO of the company or another senior person. They do this by spoofing the address and setting up almost identical account name or they can sometimes hack the CEO s account. The asks for an urgent and strictly confidential payment to be made and because staff believe that the has come from the business owner, partner or senior executive of the company, they do not question it. If the payment is made the funds will go to an account controlled by the fraudster. Small and large organisations alike have been targeted and have fallen for the scam. Invoice Fraud Fraudsters contact a business posing as one of their suppliers or contractors and they ask for future payments to be sent to a different bank account. Usually they claim to be a regular supplier who has recently changed their bank account details. The fraudster sends the business new details (sometimes on headed note paper) advising of changes to the supplier s bank account. The details are amended by the business, who believes that any funds remitted will still be transferred to the original beneficiary. However, when the next payment is sent, the funds are actually sent to the fraudster s account. How to help protect your business from these scams Establish a single point of contact (SPOC) with companies to which you make regular payments. Always verify the source of any change of details request (including sort code & account numbers) using a recognised telephone number or with your usual contact or SPOC. Set clear procedures for payment management which is known by all staff and includes verification of payments requested internally and externally. Raise staff awareness of the current scams on a regular basis. 6

9 Employee Fraud A business risk How it works Employee fraud has escalated recently across the UK. The most common example is when corrupt employees present cheques drawn on your business account for personal gain, usually forging signatures. How to protect your business The costs of dealing with employee fraud are high and the chance of retrieving lost money is slim. So your priority should be a robust recruitment policy, aligned to your business type and risks, and a culture that minimises fraud opportunities. Steps to consider: 1. Implement a robust recruitment process, including criminal record and character checks for applicants. 2. Regularly review access to business bank accounts, telephony and Internet passwords and to your computer systems and files. Restrict access to only those who need it. 3. Check your bank statements thoroughly. 4. Treat cheque books and cards with the same level of security as cash. 5. Ensure employees dealing with business finances are adequately supervised by senior colleagues. Have open conversations with employees and publicise the steps taken against fraudsters to show that fraud is not tolerated. Have a Whistleblowing reporting facility to allow employees to report suspicious activity anonymously. Adopt a 'zero tolerance' policy to criminal activity and publicise enforcement. Help when you need it If you fall victim to employee fraud please tell us. Your account manager can provide practical support including: Help to contain the extent of losses and recover stolen funds. Help to secure and protect the bank account and records. Support for internal and Police investigations. Financial support, advice and guidance. WHERE TO FIND OUT MORE business 7

10 15 seconds Every 15 seconds there is an incident of financial fraud (Jan June 2016) Source: Financial Fraud Action UK (FFA UK) September 2016

11 Cheque and Card Fraud Understand the common risks Cheque Fraud What are the risks? Criminals can target your business by printing counterfeit cheques to take money from your account. They can steal genuine unused cheques or chequebooks, then forge your signature. Or they can fraudulently alter cheques you have written by changing the payee name or, if they are the payee, by increasing the amount that s payable to them. How to protect your business Follow these steps to issuing your cheques safely: Complete cheques fully before signing and cross through spaces on your cheques after the payee name and amounts. Write payee names in full e.g. "British Broadcasting Corporation" rather than "BBC". If you issue cheques using a laser printer, use one recommended for cheques. Keep cheque books secure and reconcile cheque payments to statements reporting inaccuracies immediately. If you are expecting a new cheque book, contact us as soon as possible if it does not arrive. For further guidance on cheque fraud, visit Card Fraud from the user s perspective How can you protect your business? Ensure you are the only person that knows your PIN banks or the police will never ask for it. Watch out for card expiry dates. If your replacement card doesn t arrive, call the bank. If you move your business correspondence address, tell your bank, card issuer and other organisations you deal with straightaway. Ask the Royal Mail to redirect your post for at least a year. Always shield the keypad to prevent anyone seeing you enter your PIN. If you spot anything unusual about the cash machine don t use it report it to the bank concerned immediately. On the Internet Protect your PC with the latest firewall browser and antivirus software. Look for the padlock symbol when buying online it shows the information you input will be encrypted. Card Fraud from a merchant s perspective Protecting your business if you need to accept payments made by card: Consider 3D secure for processing card payments it offers greater protection from fraudulent payments. Ensure your business has sufficient staff who know how to review high risk transactions referred by your merchant services supplier. This information will help you to investigate and take action where a high level of fraud activity is reported. Failure to identify this problem could result in card issuing providers taking action to restrict payments to your business. Chip & PIN terminals must be held securely at all times to avoid unauthorised tampering. Any cardholder information must be held securely and in accordance with the card payment industry requirements. Access to this information should be restricted only to those staff needing it. Comprehensive security information will be available from your merchant services provider. Ensure that all key staff are aware of the security guidance. 9

12 Case Studies Take a look at real life fraud scenarios The fraudulent invoice scam XYZ Building Plc* regularly purchases materials from ABC Merchants. A fraudster sent a letter to XYZ on what appeared to be ABC Merchant headed paper. It advised that ABC had changed their bank account, quoting a new sort code and account number for all future payments to be sent to. XYZ amended ABC account details in their payment records held with their bank. When ABC sent the next monthly invoice of 60,000 for materials supplied, XYZ instructed their bank to send the payment. The 60,000 was sent to the new account controlled by the fraudster. ABC contacted XYZ chasing non-payment, at which time the fraud was discovered and the funds long gone. The cheque overpayment scam Alpha Limited* receives an order for 2,000 worth of goods from a new client. The client promises to send an online payment so the goods can be dispatched. When Alpha check their bank account they find a payment for 62,000. They contact the client who says the overpayment is a processing error. The new client asks for Alpha to return the extra 60,000 to a specific bank account. Alpha returns the 60,000 using online banking and dispatches the goods for the original 2,000 order. A few days later Alpha realise that the 62,000 payment was actually a cheque paid in at a branch counter and has been returned unpaid. They ve lost 60,000 in cash and 2,000 in goods. They contact the bank immediately for help. Luckily the stolen funds are still in the fraudsters account at another bank and a full recovery is made. How to protect your business: Carry out a thorough review of existing processes for sending and receiving payments and ensure that there are strong authentication measures in place. Establish a single point of contact (SPOC) with each regular supplier or contractor. Confirm any requests to change payment details with your SPOC, calling them via their verified company switchboard number. How to protect your business: Be suspicious of any new clients who send a larger amount of funds than you were expecting. Ask the Bank to check the origin of any such overpayments. Check with the Bank if you need to know whether a cheque has definitely been paid. * The business names used in these case studies have been changed, to protect the identity of the genuine clients. 10

13 The phishing scam 999 Doctors Surgery*, receives an from the Bank advising them of upcoming improvements to their online banking service, and asking them to log-on, re-validate their security details and register new security questions. The 'helpfully' provides a link for 999 Doctors Surgery to use. A staff member follows the link which appears to take them to their online banking homepage. They enter their details including confidential information that the screen asks for. Unfortunately, although the sender s address had Lloyds Bank within the name, the full address was not genuine and was from a fraudster. By following the link to the fake site, 999 Doctors Surgery has now given the fraudster information that they may be able to use to access their online banking. The vishing scam Builders Limited* receive a phone call purporting to come from the Bank stating that their account has been targeted by fraudsters and they need to take immediate action. The phone number displaying on the incoming call shows a number known to match that of the Bank. They are given information that leads the building firm to believe that the call is genuine. They are advised to move all funds ( 250,000) to a secure account, which they do following instructions. The next day they contact the Bank and realise the call was not genuine. They had been tricked into sending 250,000 to an account at another bank under the fraudster s control. When contact was made with the bank who received the funds they advised that all funds had been moved on into bank accounts at multiple banks. Only 27,000 was recovered for the building firm. How to protect your business: Genuine Bank s will contain your name be wary of anything that begins with Dear valued customer or similar. We ll never send an asking you to enter login, account details, or an with a link to a page that requires this information. Hover over any links within s, to see what the true web address is. How to protect your business: If you are not certain that it is the Bank calling, call the Bank back using a number known to be correct, preferably using a different phone line. Or wait at least 5 minutes before calling back, or call a friend or family member first to test the line. Do not rely on the phone number appearing on your handset as confirmation of the source of the call. These numbers are easy to spoof making life easy for criminals to copy a bank's number. The Bank will never ask for your online login details on the phone and will never ask you to move money to a 'safe' or 'secure' account. Be wary of calls received seemingly from the Bank, at night or at weekends. Fraudsters know that businesses may not report their suspicions to the Bank at these times. The Bank will never call and ask you for card and reader details. These are only needed to set up and authorise a payment when banking online. 11

14 The CEO Fraud Sarah, who works in the finance department at Computing PLC, receives an from her Chief Executive Officer. The asks Sarah to make an urgent payment of 112,000 to a bank account in Germany in order to secure a new contract. It also states that she must not mention this deal to anyone else, until it s finalised. Sarah sends the payment using online banking, but soon afterwards it is evident that the CEO s account had been hacked and the payment instruction had actually been ed to Sarah by fraudsters. Ransomware Jayne s PC at ABC School* displayed a message which stated that all data on the computer had been encrypted and demanded a ransom of 2 Bitcoins for an encryption key. The message stated the time that the encryption key will be destroyed so Jayne and the business had a short timescale to act. The school decided not to pay the ransom but as data had not been backed up for 2 weeks the school lost that data and had to spend time reconstructing it. How to protect your business: Carry out a thorough review of existing processes for sending payments, to ensure that all payment requests are fully authenticated. Document all payment processes to ensure that staff are fully aware of what they need to check before making payments and what to do if they are in doubt. How to protect your business: Do not reply or click onto links contained in s from companies or individuals you don t recognise. Ensure you have effective and up-to-date antivirus and firewalls installed. Regularly back up data onto a totally separate independent source. 12

15 Take five to stop fraud Guidance from Financial Fraud Action UK Ltd Financial Fraud Action UK Ltd (FFA UK) Take Five Campaign urges you to stop and consider whether a situation is genuine to stop and think if what you re being told really makes sense. Its key points are: 1. Never disclose security details, such as your pin or full banking password Banks and other trusted organisations will never ask you for these in an , on the phone, by text or in writing. Before you share anything with anyone, pause to consider what you re being asked for and question why they need it. Unless you re 100% sure who you re talking to, don t disclose any personal or financial details. 2. Don t assume an or phone call is authentic Just because someone knows your basic details (name and address, even your mother s maiden name), it doesn t mean they are genuine. Fraudsters may try to trick you and gain your confidence by telling you that you ve been a victim of fraud. Fraudsters can also make any telephone number appear on your handset, so even if you recognise the number or it seems authentic, do not assume it is genuine. 3. Don t be pressured into a decision Under no circumstances would a bank or organisation force you to make a financial transaction on the spot; they would never ask you to transfer money into another account for fraud reasons. 4. Listen to your instincts If something feels wrong, it is usually right to question it. Fraudsters may lull you into a false sense of security when you are out and about or rely on your defences being down when you re in the comfort of your own home. They may appear trustworthy, but they may not be who they claim to be. 5. Stay in control Have the confidence to refuse unusual requests for personal or financial information. It s easy to feel embarrassed when faced with complex conversations, but it s OK to stop the discussion if you do not feel in control of it. 13

16 Find out more Go to lloydsbank.com/business Visit to view our short videos, to view our fraud slides or download more copies of this brochure For external support Contact your relationship management team Please contact us if you would like this information in an alternative format such as Braille, large print or audio. If you have a hearing or speech impairment you can use the Next Generation Text (NGT) Service (previously Text Relay/ Typetalk) or if you would prefer to use a Textphone, please feel free to call us on (lines open 7am-8pm, Monday-Friday and 9am-2pm Saturday). Calls may be monitored or recorded in case we need to check we have carried out your instructions correctly and to help improve our quality of service. Important information Lloyds Bank plc Registered Office: 25 Gresham Street, London EC2V 7HN. Registered in England and Wales no Telephone: Authorised by the Prudential Regulation Authority and regulated by the Financial Conduct Authority and the Prudential Regulation Authority. Our service promise If you experience a problem, we will always try to resolve it as quickly as possible. Please bring it to the attention of any member of staff. Our complaints procedures are published at lloydsbank.com/business/contactus M60416 (01/17)

It pays to stop and think

It pays to stop and think It pays to stop and think Protect yourself from financial fraud Together we thrive 2 In the first six months of 2018, over 34,000 people were scammed out of 145.4m At HSBC, we work hard to keep our customers

More information

Guide to credit card security

Guide to credit card security Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely

More information

Commercial Cards Internet Servicing Lloyds Bank (CCIS) Getting started: Registration and Sign-in for Cardholders and Programme Administrators

Commercial Cards Internet Servicing Lloyds Bank (CCIS) Getting started: Registration and Sign-in for Cardholders and Programme Administrators Commercial Cards Internet Servicing Lloyds Bank (CCIS) Getting started: Registration and Sign-in for Cardholders and Programme Administrators Page 1 of 9 Contents Introduction...3 CCIS Homepage...3 Cardholders...3

More information

Page 1 of 6 Bank card and cheque fraud

Page 1 of 6 Bank card and cheque fraud Page 1 of 6 happens when criminals steal your cards or chequebook and gain access to funds in your account. More about bank card and cheque fraud Criminals steal your bank cards or cheque book; or they

More information

Your security on click Jobs

Your security on click Jobs Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can

More information

Contents. What we re doing to protect your accounts. Protecting yourself from the most common scams and types of fraud

Contents. What we re doing to protect your accounts. Protecting yourself from the most common scams and types of fraud Fraud awareness Being a victim of fraud can be a distressing and worrying time. This leaflet gives you advice and guidance to help you protect yourself. 02 Contents Help keep yourself safe from fraud 4

More information

Financial scams. What to look for and how to avoid them.

Financial scams. What to look for and how to avoid them. Financial scams What to look for and how to avoid them. Keep your money secure We take the security and wellbeing of our customers very seriously. So we ve created this guide to highlight the most common

More information

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Quick recap on  ing  Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

Protect Your Business from Fraud.

Protect Your Business from Fraud. Protect Your Business from Fraud www.fraudsmart.ie 2 Contents FraudSMART.................. 4 Top Tips to prevent fraud in your business....... 5 Email Scams.................. 6 Invoice Fraud.................6

More information

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

Identity Theft, Fraud & You. PrePare. Protect. Prevent. PrePare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer

More information

CYBER SECURITY RESOURCE GUIDE. Cyber Fraud Overview. Best Practices and Resources. Quick Reference Guide for Employees. Cyber Security Checklist

CYBER SECURITY RESOURCE GUIDE. Cyber Fraud Overview. Best Practices and Resources. Quick Reference Guide for Employees. Cyber Security Checklist CORPORATE & INSTITUTIONAL BANKING CYBER SECURITY RESOURCE GUIDE Cyber Fraud Overview Best Practices and Resources Quick Reference Guide for Employees Cyber Security Checklist 2 5 7 9 AWARENESS OF CYBER

More information

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN? WHAT IS CORPORATE ACCOUNT TAKEOVER? Corporate Account Takeover (also referred to as CATO) is a type of fraud where criminals gain access to a business financial accounts to make unauthorized transactions.

More information

Text Alerts. Current accounts

Text Alerts. Current accounts Text Alerts. Current accounts Helping you manage your money. Sometimes life can be all go. But with our Text Alert Services you can easily keep in touch with your finances, even when you re rushing around.

More information

How to Build a Culture of Security

How to Build a Culture of Security How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your

More information

Payment Systems Department

Payment Systems Department Note: Please follow these guidelines for your safety as you enjoy the convenience of technology. However these guidelines are general; therefore, specific precautions may be taken as warranted by the situation

More information

Business Accounts. Important information. Keeping you up to date. danskebank.co.uk

Business Accounts. Important information. Keeping you up to date. danskebank.co.uk danskebank.co.uk Important information Keeping you up to date Business Accounts This booklet contains important information about changes to your agreement with us and other important information about

More information

Security and Fraud Awareness

Security and Fraud Awareness Security and Fraud Awareness Our Approach to Security When it comes to your financial information, your security is our top priority and when you access your e-money account, it is important that we know

More information

CLIENT MANAGER PORTAL. A supplier s guide to the Supplier Finance website

CLIENT MANAGER PORTAL. A supplier s guide to the Supplier Finance website CLIENT MANAGER PORTAL A supplier s guide to the Supplier Finance website Contents Welcome to Supplier Finance 1 Your payments 2 Logging on 3 Moving around 4 Your summary 5 Requesting early payments 7 Approving

More information

CUSTOMER TIPS: HOW TO GUARD AGAINST FRAUD WHEN USING ONLINE BANKING OR ATM s

CUSTOMER TIPS: HOW TO GUARD AGAINST FRAUD WHEN USING ONLINE BANKING OR ATM s CUSTOMER TIPS: HOW TO GUARD AGAINST FRAUD WHEN USING ONLINE BANKING OR ATM s ATM Fraud - Watch out for the following scams. Scam 1 - you find you are having difficulty with your card. Someone will come

More information

Taking control of your finances... 5 Use these tips to manage your finances

Taking control of your finances... 5 Use these tips to manage your finances In focus Index In focus... 2 Safeguard your NRI account Taking control of your finances... 5 Use these tips to manage your finances NRI Expert speak... 6 Mr. S. Shanbhag - Financial Expert, answers queries

More information

REDUCING THE RISK OF CARD NOT PRESENT FRAUD

REDUCING THE RISK OF CARD NOT PRESENT FRAUD www.globalpaymentsinc.co.uk REDUCING THE RISK OF CARD NOT PRESENT FRAUD 02 03 REDUCING THE RISK OF CARD NOT PRESENT FRAUD INTRODUCTION Many businesses accept Card Not Present (CNP) transactions on a daily

More information

Risk Outlook Anti money Laundering and Cybercrime. Steve Wilmott and George Hawkins

Risk Outlook Anti money Laundering and Cybercrime. Steve Wilmott and George Hawkins Risk Outlook Anti money Laundering and Cybercrime Steve Wilmott and George Hawkins Introductions Steve Wilmott, Director of Intelligence and Investigations George Hawkins, Senior Technical Advisor, Risk

More information

Service administrator and Card ordering user guide

Service administrator and Card ordering user guide Service administrator and Card ordering user guide 1 Contents 1. What is a service administrator? 2. What is a service role? 3. How do I apply as the initial service administrator / register my organisation?

More information

AIB Merchant Services AIB Merchant Services Quick Reference Guide Verifone

AIB Merchant Services AIB Merchant Services Quick Reference Guide Verifone AIB Merchant Services AIB Merchant Services Quick Reference Guide Verifone AIB Merchant Services AIBMS Quick Reference Guide This quick reference guide has been designed to answer the most common queries

More information

Important Information

Important Information Important Information Important Information Effective from 13 January 2018 1. Your information 1.1 Who we are We are Coutts & Co, of 440 Strand, London WC2R OQS. We are a member of The Royal Bank of Scotland

More information

CLIENT MANAGER PORTAL. A buyer s guide to the Supplier Finance website

CLIENT MANAGER PORTAL. A buyer s guide to the Supplier Finance website CLIENT MANAGER PORTAL A buyer s guide to the Supplier Finance website Contents Welcome to Supplier Finance 1 Logging on 2 Moving around 3 Your summary 4 Uploading invoices and credit notes 5 Approving

More information

Safety and Security. April 2015

Safety and Security. April 2015 Safety and Security April 2015 Protecting your smartphone and your data 2 Set a passcode on your smartphone For some smartphone models: 1. Go to Settings. 2. Tap ID & Passcode. 3. Set a 4-digit passcode.

More information

Octopus Online Service Safety Guide

Octopus Online Service Safety Guide Octopus Online Service Safety Guide This Octopus Online Service Safety Guide is to provide you with security tips and reminders that you should be aware of when using online and mobile services provided

More information

Target Breach Overview

Target Breach Overview Target Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more specifics? A: Yes, Target has confirmed that it experienced unauthorized access to its systems

More information

Newcomer Finances Toolkit. Fraud. Worksheets

Newcomer Finances Toolkit. Fraud. Worksheets Newcomer Finances Toolkit Fraud Worksheets Ottawa Community Loan Fund Fonds d emprunt Communautaire d Ottawa 22 O Meara St., Causeway Work Centre, Ottawa, ON K1Y 4N6 Tel: 613-594-3535 Fax: 613-594-8118

More information

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

COMMON WAYS IDENTITY THEFT CAN HAPPEN: COMMON WAYS IDENTITY THEFT CAN HAPPEN: OLD FASHIONED STEALING / DUMPSTER DIVING Thieves typically steal wallets and purses. They also steal mail such as credit card and bank statements, pre-approved credit

More information

RETIREMENT ACCOUNT APPLICATION FORM. Share Dealing

RETIREMENT ACCOUNT APPLICATION FORM. Share Dealing RETIREMENT ACCOUNT APPLICATION FORM Share Dealing Please fully complete this form if you wish to set up a Share Dealing account for a Scottish Widows Retirement Account. Please note that the purchase of

More information

Preventing fraud in public sector entities

Preventing fraud in public sector entities Preventing fraud in public sector entities Fraud is a serious problem that can affect anyone, from individuals to large companies and associations. For public sector entities, fraud both external and internal

More information

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information

More information

PHISHING ATTACK TARGETING UNIVERSITY STUDENTS MAY 2016

PHISHING ATTACK TARGETING UNIVERSITY STUDENTS MAY 2016 PHISHING ATTACK TARGETING UNIVERSITY STUDENTS MAY 2016 Page 1 of 5 PURPOSE OF THE ALERT The information contained within this alert is based on the reports received by Action Fraud and the National Fraud

More information

Terms and conditions of use for the Online and Mobile Banking Service

Terms and conditions of use for the Online and Mobile Banking Service Terms and conditions of use for the Online and Mobile Banking Service Effective from July 2016 Please read these terms and conditions carefully. They re also available on our website and our Mobile Banking

More information

Would you fall for the latest ingenious bank scam?

Would you fall for the latest ingenious bank scam? Would you fall for the latest ingenious bank scam? Mark Winterton and Jana Parkin suspected the Lloyds letter was fake when it arrived at their office but said they were 'very impressed' with the quality

More information

What is NPP, Osko and PayID?

What is NPP, Osko and PayID? What is NPP, Osko and PayID? The New Payment Platform (NPP) is a new way of making payments that is: Fast You can send funds to anyone in real-time. Easy You can send funds to a PayID (such as an email

More information

Cyber Security Guide for NHSmail

Cyber Security Guide for NHSmail Cyber Security Guide for NHSmail Version 3.0 February 2017 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created by statute,

More information

South Central Power Stop Scams

South Central Power Stop Scams Don t get tricked. People around the country have been receiving emails and phone calls from scammers. South Central Power wants to help you keep your money and prevent scams. Review the helpful tips below.

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

How to recognize phishing s

How to recognize phishing  s Phishing email messages, websites, and phone calls are designed to steal money, steal data and/or destroy information. Cybercriminals can do this by installing malicious software on your computer or stealing

More information

FAQ. Usually appear to be sent from official address

FAQ. Usually appear to be sent from official  address FAQ 1. What is Phishing Email? A form of fraud by which an attacker masquerades as a reputable entity in order to obtain your personal information. Usually appear to be sent from official email address

More information

CAREERBUILDER.COM - PRIVACY POLICY

CAREERBUILDER.COM - PRIVACY POLICY Effective Date: September 15, 2010 CareerBuilder, LLC and its subsidiaries and divisions (collectively, CareerBuilder, We or Our ) has drafted its Privacy Policy to ensure that you can use CareerBuilder

More information

FAQ: Privacy, Security, and Data Protection at Libraries

FAQ: Privacy, Security, and Data Protection at Libraries FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library

More information

INTERNET SAFETY IS IMPORTANT

INTERNET SAFETY IS IMPORTANT INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being

More information

Retail/Consumer Client Internet Banking Awareness and Education Program

Retail/Consumer Client Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 1) E-mail Risk... 3 2) Internet Risks... 4 3) Telephone

More information

ELECTRONIC BANKING & ONLINE AUTHENTICATION

ELECTRONIC BANKING & ONLINE AUTHENTICATION ELECTRONIC BANKING & ONLINE AUTHENTICATION How Internet fraudsters are trying to trick you What you can do to stop them How multi-factor authentication and other new techniques can help HELPING YOU STAY

More information

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS? FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit

More information

9/11/ FALL CONFERENCE & TRAINING SEMINAR 2014 FALL CONFERENCE & TRAINING SEMINAR

9/11/ FALL CONFERENCE & TRAINING SEMINAR 2014 FALL CONFERENCE & TRAINING SEMINAR 1 2 1 Agenda: Types of Fraud Things you can do internally Things that companies can do Services Provided by the Bank 3 Because that is where the money is. 4 2 Checks Credit Cards ACH (Debits / Credits)

More information

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies Fraud Overview and Mitigation Strategies SUNTRUST TEAM: DOUG HICKMAN SENIOR VICE PRESIDENT FOUNDATIONS AND ENDOWMENTS SPECIALTY PRACTICE JAMES BERNAL ASSISTANT VICE PRESIDENT FOUNDATIONS AND ENDOWMENTS

More information

Code Authenticator. User guide

Code Authenticator. User guide Code Authenticator User guide Contents Introduction 1 Service administrator 1-2 Role and responsibilities Adding Deleting and suspending User 3 Role Adding Deleting and suspending Smart Cards 3-4 Issuing

More information

Webomania Solutions Pvt. Ltd. 2017

Webomania Solutions Pvt. Ltd. 2017 The other name for link manipulation is Phishing or you can say link manipulation is type of phishing attack done generally to mislead the user to a replica website or a looka-like of some well-known site.

More information

Introduction to

Introduction to Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting

More information

Fraud awareness & Information pack for ANZ Customers

Fraud awareness & Information pack for ANZ Customers Fraud awareness & Information pack for ANZ Customers 2 INTRODUCTION IS FRAUD THE SILENT PARTNER IN YOUR BUSINESS? If fraud was a country it would rate as the fifth largest economy in the world - according

More information

The BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO

The BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO The BUSINESS of Fraud. Don t let it put you out of business. Veenindra J. Singh, First Vice President, Treasury Management Consultant California Bank & Trust 300 Lakeside Drive, Suite 800 Oakland, Ca 94612

More information

Paid-for antivirus software

Paid-for antivirus software Paid-for antivirus software Many people keep their computer safe by paying for a security suite (almost half of Which? members, according to our recent survey), which will usually include antivirus software,

More information

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name. security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name. Security for Your Business Mitigating risk is a daily reality for business owners, but you don t have

More information

Recognizing & Protecting Against Fraud

Recognizing & Protecting Against Fraud Fraud Mitigation and Cyber Strategies for Public Entities April 209 Recognizing & Protecting Against Fraud 2 Why is it Important to Remain Vigilant? Fraud does not discriminate it occurs everywhere, and

More information

IMPORTANT SECURITY INFORMATION PHISHING

IMPORTANT SECURITY INFORMATION PHISHING IMPORTANT SECURITY INFORMATION PHISHING Protect Yourself and Your Accounts Important Security Information At Century Savings Bank, security and privacy of your financial information is a top priority.

More information

When you provide personal information to us it will only be used in the ways described in this privacy policy.

When you provide personal information to us it will only be used in the ways described in this privacy policy. Website Privacy Policy Overview Welcome to this Global Payroll Management Institute website, owned and produced by the Global Payroll Management Institute, Inc. (GPMI). Our website is available to all

More information

BEST PRACTICES FOR PERSONAL Security

BEST PRACTICES FOR PERSONAL  Security BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple

More information

PIN / Password Security

PIN / Password Security PIN / Password Security www.gatewaycu.com.au INDEX PIN / Password Security 2 Protection of Information 3 Keep Informed 3 Your Protection 4 Online Banking Security 5 Visa Debit Card Security 6 Electronic

More information

PROTECTING YOUR BUSINESS ASSETS

PROTECTING YOUR BUSINESS ASSETS PROTECTING YOUR BUSINESS ASSETS How to Spot Danger Before Your Computer Gets Infected, Your Site Hosts Malware, and Your Credit Card Number Gets Stolen A MyNAMS Presentation by Regina Smola @2012 Regina

More information

Guide to Getting Started. Personal Online Banking & Bill Pay

Guide to Getting Started. Personal Online Banking & Bill Pay Guide to Getting Started Personal Online Banking & Bill Pay What s Inside Welcome to National Bank of Arizona s Online Banking. Whether you re at home, at work, or on the road, our online services are

More information

Online Security and Safety Protect Your Computer - and Yourself!

Online Security and Safety Protect Your Computer - and Yourself! Online Security and Safety Protect Your Computer - and Yourself! www.scscu.com Fraud comes in many shapes and sizes, but the outcome is simple: the loss of both money and time. That s why protecting your

More information

The 12 scams of Christmas

The 12 scams of Christmas The 12 scams of Christmas November 2011: SCAMwatch is advising consumers to watch out for this year s 12 scams of Christmas. Scams occur all year round but scammers prey on people s generosity and vulnerabilities

More information

Service administrator and card ordering user guide

Service administrator and card ordering user guide Service administrator and card ordering user guide Contents 1 What is a service administrator? 2 What is a service role? 3 How do I apply as the initial service administrator / register my organisation?

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS In order to better assist you with the transition to our new home banking service, we wanted to provide you with a list of anticipated questions and things that may need your

More information

TIPS TO AVOID PHISHING SCAMS

TIPS TO AVOID PHISHING SCAMS TIPS TO AVOID PHISHING SCAMS WHAT IS PHISHING? Phishing is the use of fraudulent email, websites, text messages and phone calls to trick people into disclosing personal financial or identity information,

More information

GLOBAL PAYMENTS AND CASH MANAGEMENT. Security

GLOBAL PAYMENTS AND CASH MANAGEMENT. Security GLOBAL PAYMENTS AND CASH MANAGEMENT Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of

More information

CSV CONVERTING LLOYDSLINK ONLINE IAT (GBP) CSV FILES. Importing Payments in Commercial Banking Online

CSV CONVERTING LLOYDSLINK ONLINE IAT (GBP) CSV FILES. Importing Payments in Commercial Banking Online CSV Ò CONVERTING LLOYDSLINK ONLINE IAT (GBP) CSV FILES Importing Payments in Commercial Banking Online Import your Payment Files in Commercial Banking Online In Commercial Banking Online all Payment Files

More information

1 of 11 10/1/ :26 AM

1 of 11 10/1/ :26 AM 1 of 11 10/1/2010 12:26 AM About Us Careers Calculators Contact Us Search Home Your Money HQ ID Theft & Fraud FRAUD ALERT E-mail Scams ID Theft and Fraud Avoid Becoming a Victim What To Do If You Are a

More information

Common Scams and Fraud. Charlottesville/Albemarle County TRIAD Group

Common Scams and Fraud. Charlottesville/Albemarle County TRIAD Group Common Scams and Fraud Charlottesville/Albemarle County TRIAD Group What We ll Cover 3 parts of a scam or fraud Common scams What can you do? Common Scams Three Parts of Any Scam or Fraud 1. Victim has

More information

Web Cash Fraud Prevention Best Practices

Web Cash Fraud Prevention Best Practices Web Cash Fraud Prevention Best Practices Tips on what you can do to prevent Online fraud. This document provides best practices to avoid or reduce exposure to fraud. You can use it to educate your Web

More information

Business Online Banking & Bill Pay Guide to Getting Started

Business Online Banking & Bill Pay Guide to Getting Started Business Online Banking & Bill Pay Guide to Getting Started What s Inside Contents Security at Vectra Bank... 4 Getting Started Online... 5 Welcome to Vectra Bank Business Online Banking. Whether you re

More information

3.5 SECURITY. How can you reduce the risk of getting a virus?

3.5 SECURITY. How can you reduce the risk of getting a virus? 3.5 SECURITY 3.5.4 MALWARE WHAT IS MALWARE? Malware, short for malicious software, is any software used to disrupt the computer s operation, gather sensitive information without your knowledge, or gain

More information

Do not open attachments on s that you are not sure of.

Do not open attachments on  s that you are not sure of. Avoid free online offers of programs to rid your hard drive of viruses and shred your history completely. It will probably install spyware or infect your hard drive. Do not open attachments on emails that

More information

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected.

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected. I Use of computers This document is part of the UCISA Information Security Toolkit providing guidance on the policies and processes needed to implement an organisational information security policy. To

More information

Online Scams. Ready to get started? Click on the green button to continue.

Online Scams. Ready to get started? Click on the green button to continue. Online Scams Hi, I m Kate. We re here to learn how to protect ourselves from online scams. We ll follow along with Kevin to learn what types of scams are out there, how to recognize the warning signs,

More information

Top 5 Tips To Take A Stand Against Telephone Scams

Top 5 Tips To Take A Stand Against Telephone Scams Scammers often use the telephone as a method to gain personal details and con people out of their life savings. Avoid being one of them, protect yourself. Top 5 Tips To Take A Stand Against Telephone Scams

More information

MODEL COMPLAINTS SYSTEM AND POLICY THE OMBUDSMAN'S GUIDE TO DEVELOPING A COMPLAINT HANDLING SYSTEM

MODEL COMPLAINTS SYSTEM AND POLICY THE OMBUDSMAN'S GUIDE TO DEVELOPING A COMPLAINT HANDLING SYSTEM MODEL COMPLAINTS SYSTEM AND POLICY THE OMBUDSMAN'S GUIDE TO DEVELOPING A COMPLAINT HANDLING SYSTEM Published by the Office of the Ombudsman 18 Lower Leeson Street Dublin 2 Telephone: 01 639 5600 Lo-call:

More information

In this policy, whenever you see the words we, us, our, it refers to Ashby Concert Band Registered Charity Number

In this policy, whenever you see the words we, us, our, it refers to Ashby Concert Band Registered Charity Number ASHBY CONCERT BAND PRIVACY POLICY The privacy and security of your personal information is extremely important to us. This privacy policy explains how and why we use your personal data. We will keep this

More information

>MESSAGELABS END USER IT SECURITY GUIDE >WHAT STEPS CAN YOU TAKE TO KEEP YOURSELF, YOUR COLLEAGUES AND YOUR COMPANY SAFE ONLINE?

>MESSAGELABS END USER IT SECURITY GUIDE >WHAT STEPS CAN YOU TAKE TO KEEP YOURSELF, YOUR COLLEAGUES AND YOUR COMPANY SAFE ONLINE? >MESSAGELABS END USER IT SECURITY GUIDE >WHAT STEPS CAN YOU TAKE TO KEEP YOURSELF, YOUR COLLEAGUES AND YOUR COMPANY SAFE ONLINE? >CONTENTS >WHAT IS MESSAGING AND WEB SECURITY? >P1 >EMAIL THREATS >P1 >VIRUSES

More information

BANK WAYS TO. Secure and convenient banking options to fit your lifestyle. Branches. Online Banking. Phoneline Banking. Mobile Banking.

BANK WAYS TO. Secure and convenient banking options to fit your lifestyle. Branches. Online Banking. Phoneline Banking. Mobile Banking. WAYS TO BANK Secure and convenient banking options to fit your lifestyle Branches Online Banking Phoneline Banking Mobile Banking Post Office Cash Machines Contents 01 What can I do in branch? What can

More information

IT Security Protecting Ourselves From Phishing Attempts. Ray Copeland Chief Information Officer (CIO)

IT Security Protecting Ourselves From Phishing Attempts. Ray Copeland Chief Information Officer (CIO) IT Security Protecting Ourselves From Phishing Attempts Ray Copeland Chief Information Officer (CIO) Phishing Defined The fraudulent practice of sending emails claiming to be from reputable people or companies

More information

falanx Cyber Falanx Phishing: Measure your resilience

falanx Cyber Falanx  Phishing: Measure your resilience falanx Cyber Falanx Email Phishing: Measure your resilience Contents What is Email Phishing? 3 Why should I carry out an Email Phishing exercise? 4 PhishEd Managed regular phishing 5 Single assessments

More information

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk Ages 11-14 Donʼt Fall for : Activity 1 Don t bite that phishing hook! Children play a game where they study various emails and texts and try to decide which messages are legit and which are phishing scams.

More information

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person) Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,

More information

Fraud Awareness Campaign for the Travel industry

Fraud Awareness Campaign for the Travel industry Fraud Awareness Campaign for the Travel industry The Fraud Awareness Campaign for the Travel industry (FACT) is an outreach and education initiative of the International Air Transport Association (IATA)

More information

Data protection. 3 April 2018

Data protection. 3 April 2018 Data protection 3 April 2018 Policy prepared by: Ltd Approved by the Directors on: 3rd April 2018 Next review date: 31st March 2019 Data Protection Registration Number (ico.): Z2184271 Introduction Ltd

More information

Cyber Security Guide. For Politicians and Political Parties

Cyber Security Guide. For Politicians and Political Parties Cyber Security Guide For Politicians and Political Parties Indian Election Integrity Initiative Design by ccm.design Cover Image by Paul Dufour Helping to Safeguard the Integrity of the Electoral Process

More information

Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment

Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment Ray Colado, Information Security Analyst Raise awareness around information security to help

More information

IT & DATA SECURITY BREACH PREVENTION

IT & DATA SECURITY BREACH PREVENTION IT & DATA SECURITY BREACH PREVENTION A PRACTICAL GUIDE Part 1: Reducing Employee and Application Risks CONTENTS EMPLOYEES: IT security hygiene best practice APPLICATIONS: Make patching a priority AS CORPORATE

More information

Protecting your Security and Privacy on the Web. Tony Brett Head of IT Support Staff Services IT Services. 11 March 2013

Protecting your Security and Privacy on the Web. Tony Brett Head of IT Support Staff Services IT Services. 11 March 2013 Protecting your Security and Privacy on the Web Tony Brett Head of IT Support Staff Services IT Services 11 March 2013 Agenda Why bother? Common data leaks Email security Viruses & Trojans Phishing Why

More information

Cyber security tips and self-assessment for business

Cyber security tips and self-assessment for business Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this

More information

Personal Online Banking & Bill Pay. Guide to Getting Started

Personal Online Banking & Bill Pay. Guide to Getting Started Personal Online Banking & Bill Pay Guide to Getting Started What s Inside Contents Security at Vectra Bank... 4 Getting Started Online... 5 Welcome to Vectra Bank Online Banking. Whether you re at home,

More information

Personal Cybersecurity

Personal Cybersecurity Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions

More information

ONLINE SAFETY. Messaging, , Vlogging and Sexting

ONLINE SAFETY. Messaging,  , Vlogging and Sexting ONLINE SAFETY Messaging, email, Vlogging and Sexting www.eitts.co.uk Contents WhatsApp & Messaging Email Vlogging Sexting THE RISKS People online are not necessarily who they say they are or seem to be.

More information