Fraud Update: Why Fraudsters Love Wires and How to Stop Them. Luis Rojas, Director, Product Management WesPay 2014
|
|
- Elvin French
- 5 years ago
- Views:
Transcription
1 Fraud Update: Why Fraudsters Love Wires and How to Stop Them Luis Rojas, Director, Product Management WesPay 2014
2 Competitive Pressures Drive Fraud and Operational Risk
3 Availability Of Information Creates Demise in Trust Malware Social Engineering Phishing Breaches Spear Phishing Icon Control accounts Usernames/passwords Bank account information Spoof devices, location Personal information Compromise
4 Availability Of Information Creates Demise in Trust Malware Social Engineering Phishing Breaches Spear Phishing Icon Control accounts Usernames/passwords Bank account information Spoof devices, location Personal information Compromise
5 Availability Of Information Creates Demise in Trust Your Customers Malware Corporation Social Engineering Phishing Breaches Spear Phishing Icon Control accounts Usernames/passwords Bank account information Spoof devices, location Personal information SMB Consumer Wire Room IT Compromise HR Your Employees
6 The Challenge With Wire Fraud Methods of Compromise Malware Social Engineering Phishing Vishing Smishing Spear Phishing Icon Points of Compromise Mobile Call Center Customers Methods of Wire Initiation Branch Call Center Fax Bank Wire System Multiple points of compromise Multiple channels for initiation Criminals use creative combinations Combinations difficult to predict and detect Compromise Bank Employee Bank Employee
7 Criminal Wire Activity Is Widespread and Successful Wire is still the favorite channel for criminals 76% of fraud attempts were wire based 14 out of 100 businesses have experienced wire fraud Increasing trend of criminals attacking bank wire systems
8 Wire Fraud Losses Are Significant Case Loss PATCO vs. Ocean Bank $580,000 Experia Metal, Inc. vs. Comerica Bank Village View Escrow, Inc. vs. Professional Business Bank Hillary Machinery vs. Plains Capital Bank Texas Bankcorp South vs. Choice Escrow and Land Title $561,399 $393,000 $229,000 $440,000 Large losses for banks plus reputation loss and high legal fees Fraud attacks happen at banks of all sizes Average wire fraud attempt $116K One incident would pay for fraud prevention solution
9 WIRE FRAUD SCENARIOS
10 Schemes We ll Cover Today Methods of Compromise Points of Compromise Methods of Wire Initiation Malware Social Engineering Phishing Vishing Smishing Spear Phishing Icon Compromise Mobile Call Center Customers Bank Employee Branch Call Center Fax Bank Employee Bank Wire System 1. Funeral scheme 2. Fake invoice scheme 3. Masquerading business social engineering 4. Bank employee scheme 5. call center combo 6. Live chat 7. template modifications
11 #1 Trickery/Funeral Scheme 1) Compromise victim s account 4) Funds transferred to criminal Wire Transfer 2) Monitor victim s account for financial relationships (bank, financial advisors, etc) 3) financial advisor requesting wire transfer citing funeral, large purchase, etc.
12 #2 Vendor/Business Compromise Fake Invoice Compromise Wire Transfer
13 #3 Masquerade Trick 1 Business Spoofing Target: Controller Becky Criminal creates fake domain, but very close to actual domain Fake sent looks CEO John to CFO Sally Criminal forwards fake from Sally to Becky to trick Becky into thinking it is a legitimate request
14 #3 Masquerade Trick 2 Business Account Takeover 1. Through phishing, social engineering, gain access to mail credentials 2. Take over at a small business (rather than spoofing) 3. Send from CEO/CFO to controller 4. Express urgency to get the transfer initiated
15 #4 Bank Operations Employee As The Target Compromise bank employee rather than account holder Direct access to wire system Scale to multiple accounts at once Criminal Social engineering Malware Bank Employee Wire system Customers $ $ $ Criminal Account
16 # 5 Social Engineering Call Center Agents 79% of banking executives report account takeover and social engineering represent the majority of their contact center fraud. 1) Call Center to social engineer call center to reset online credentials Wire $ 2) to Call Center compromise online banking, then social engineer call center agent to initiate transaction Wire $
17 #6 to Live Chat Agent Scheme Human fraudster successfully authenticates using user credentials Banking 1. Explores all accounts 2. Consolidates funds to checking account 3. Initiates chat session from online banking 1. Ask for general help 2. Then ask for help with wire transfer
18 #7 Using Victim As Key Actor in The Process Victim Fraudster Criminal compromised account Edit Wire Templates Criminal modifies template does not attempt transaction Legitimate user sends out wire to mule using modified template
19 Sweetheart Scam 2) Gains access to online banking Victim s existing or new account Used to set up mobile banking Check balance and transfer $ $ Mobile banking Check Account takeover victim 1) Lures victim through dating or social media site Sweetheart victim banking Victim bank 3)Funds the sweetheart victim s account Mobile RDC (stolen, counterfeit check) Check overnighted to the bank Transfer from another victim s account $ $ Third party money transfer $ 4) Victim sends money to the criminal banking transfer Wire Take cash to third party money transfer Send debit card
20 Bypassing Common Controls Dual Controls Take over one account to initiate transfer Use administrative privileges of first account to create a new account Modify entitlements Change submit and approval limits Bypass alerts Change address (altogether or just slightly) Disabling alerts Delete alerts from compromised accounts OOB Reroute/forward phone number Malware on mobile phones to re route text messages Proactively call in and pretend to be the user checking on their payment Launch TDoS attack against victim Tokens Criminals use malware to grab token codes
21 Lessons Learned Fraud doesn t always look like fraud, detection difficult To the you To your customers You can t educate your way out of the problem It doesn t hurt, but it s not the answer Criminals can get past many controls They will defeat what they can study
22 FRAUD PREVENTION CONSIDERATIONS
23 Need For Enhanced ACH Risk Management Drive for faster processing Volume of wire payments rising Wire Fraud Risk Ongoing Average ACH fraud attempt $116 Wire fraud attempts increasing Lawsuits continuing Regulatory Pressures Growing FFIEC expects anomaly detection Recent reports of regulators giving short timeframes for ACH monitoring Operational Pressure Increasing Need for New ACH Risk Management Strategy More transactions at risk Fraud harder to detect Less time to find fraud Manual protections or rulesbased approaches costly and miss fraud Limits address part of the problem Can t place the burden on customers Competitive Pressures Wire services critical to competitiveness Customers want frictionless experience Customers expect protections Customers want speed
24 A New Approach Behavioral Analytics Originator Name Account ID Code Originator FI Sender FI Instructing FI OBI Transaction Direction Amount Transfer Type Business Code Type/Subtype Beneficiary Name Account ID Code Receiver FI Beneficiary FI Intermediate FI Frequency Wire Transaction Data Each user has a unique behavioral fingerprint User behavior changes with malicious activity Behavioral changes are unavoidable and detectable Need user centric behavioral analytic tools to automatically detect anomalous activity and account abuse
25 How Wire Behavioral Analytics Works Originator Name Account ID Code Originator FI Sender FI Instructing FI OBI Transaction Direction Amount Transfer Type Business Code Type/Subtype Data Fields and Text Wire Behavioral Analytics Originator Model Individual Beneficiary Model Population level Models Are the customer s wire actions normal? (timing, velocity, type, accounts, direction) Are the transactions typical? (type, amount, originator/ beneficiary history) Beneficiary Name Account ID Code Receiver FI Beneficiary FI Intermediate FI Frequency Fraud/Threat Models Are the transactions being made to a risky or safe beneficiary? (beneficiary history, suspected mule)
26 Integrating Automation Into Your Wire Workflow Customers Wire Transfer Methods Fax Call Center Wire Behavioral Analytics FRAUDMAP Wire RISKAPPLICATION Fraud Analyst Branch FRAUDMAP Wire RISKENGINE Review High Risk Alerts Criminals Automated Wire Request Auto Release/ Hold Manual Release / Cancel Wire Management System/Queue Send To Fed
27 Typical Wire Processes Expensive and Ineffective Growing volumes to review driving higher staff costs and overtime Time & Costs Increasing Cutoff window Manually hunt for similar accounts, payees, amounts Manually look for suspicious online activity Manually hunt through old wires to identify previous payments, payees Look at each wire individually Low Fraud Detection Missed fraud Manual processes cant sort through all transactions False positives defocus reviews on wrong batch entries Reviews prone to human error Focus on larger dollar amounts that may not be fraud Miss smaller dollar amounts that are fraud Extra pressure and mistakes around cut off times
28 Wire Behavioral Analytics Changes The Dynamics Typical Processes Wire Behavioral Analytics High Time & Costs Low Fraud Detection Lower Time and Costs Focus few high risk alerts Instant context Visibility to all batch and transaction details One click comparison to prior batches and transactions Enhance Fraud Detection Behavioral Analytics
29 Why Banks/CUs Invest in FraudMAP Support competitive objectives and business imperatives Reduce fraud losses and fraud risk Increase operational efficiency and scale processes Enhance compliance Gain confidence to Speed processing time Increase wire limits Offer international services Key sale message position best protections Increase customer service Reduce callbacks Identify high risk wires Stop wires before they leave the bank Focus on the critical few Reduce cutoff crunch pressure Reducing manual efforts and time Move free staff time to other projects Increase processing speed Meet FFIEC expectations for anomaly detection Demonstrate resilient solution for managing wire risks Know your customers
30 Summary Wire fraud growing and evolving New solutions needed to address the problem Better solutions can increase fraud detection effectiveness and reduce costs Better controls allow for more competitive services and service levels
31 Q & A
32 Thank You For Attending! We will send a copy of the slides and the recording Sign up for our Fraud Factor and Fraud Informers at info@guardiananalytics.com If you are interested in learning more about behavioral analytics to protect customer or employee access or payments, contact us at info@guardiananalytics.com
33 Thank You!
January 23, Online Banking Risk Management: A Multifaceted Approach for Commercial Customers
January 23, 2012 Online Banking Risk Management: A Multifaceted Approach for Commercial Customers Risk Management Rajiv Donde - CEO Laru Corporation Agenda Risk Premise FFIEC prescription for a layered
More informationCYBER SECURITY RESOURCE GUIDE. Cyber Fraud Overview. Best Practices and Resources. Quick Reference Guide for Employees. Cyber Security Checklist
CORPORATE & INSTITUTIONAL BANKING CYBER SECURITY RESOURCE GUIDE Cyber Fraud Overview Best Practices and Resources Quick Reference Guide for Employees Cyber Security Checklist 2 5 7 9 AWARENESS OF CYBER
More informationA Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services
A Layered Approach to Fraud Mitigation Nick White Product Manager, FIS Payments Integrated Financial Services Session Agenda Growing Fraud Concerns Old Habits Die Hard Maneuvering through the Barriers
More informationWHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?
WHAT IS CORPORATE ACCOUNT TAKEOVER? Corporate Account Takeover (also referred to as CATO) is a type of fraud where criminals gain access to a business financial accounts to make unauthorized transactions.
More informationASSESSMENT LAYERED SECURITY
FFIEC BUSINESS ACCOUNT GUIDANCE RISK & ASSESSMENT LAYERED SECURITY FOR ONLINE BUSINESS TRANSACTIONS New financial standards will assist banks and business account holders to make online banking safer and
More informationCLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies
Fraud Overview and Mitigation Strategies SUNTRUST TEAM: DOUG HICKMAN SENIOR VICE PRESIDENT FOUNDATIONS AND ENDOWMENTS SPECIALTY PRACTICE JAMES BERNAL ASSISTANT VICE PRESIDENT FOUNDATIONS AND ENDOWMENTS
More informationEvolution of Spear Phishing. White Paper
Evolution of Spear Phishing White Paper Executive Summary Phishing is a well-known security threat, but few people understand the difference between phishing and spear phishing. Spear phishing is the latest
More informationCyber Insurance: What is your bank doing to manage risk? presented by
Cyber Insurance: What is your bank doing to manage risk? David Kitchen presented by Lisa Micciche Today s Agenda Claims Statistics Common Types of Cyber Attacks Typical Costs Incurred to Respond to an
More informationVERIFICATION METHOD. Deskside User Guide
VERIFICATION METHOD Deskside User Guide OVERVIEW Our company considers the security of your financial information a top priority. We employ extensive security measures designed to provide a safe and reliable
More informationBest Practices Guide to Electronic Banking
Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have
More informationThe Double Edged Sword of Mobile Banking
The Double Edged Sword of Mobile Banking Meeting client demand for mobile services while mitigating escalating fraud threats White Paper The Double Edged Sword of Mobile Banking: Meeting client demand
More informationFirst Republic Bank Corporate Online User Guide
\ First Republic Bank Corporate Online User Guide August 2017 dsfdsfdsfirst Republic Bank- Mobile Check Deposit User Guide Welcome to First Republic Corporate Online, the online solution to managing your
More informationsecurity FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.
security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name. Security for Your Business Mitigating risk is a daily reality for business owners, but you don t have
More informationSecurity Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment
Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment Ray Colado, Information Security Analyst Raise awareness around information security to help
More informationSecurity & Phishing
Email Security & Phishing Best Practices In Cybersecurity Presenters Bill Shieh Guest Speaker Staff Engineer Information Security Ellie Mae Supervisory Special Agent Cyber Crime FBI 2 What Is Phishing?
More informationBUILDING AN EFFECTIVE PROGRAM TO PROTECT AGAINST FRAUD
BUILDING AN EFFECTIVE PROGRAM TO PROTECT AGAINST EMAIL FRAUD Navindra Ramnauth CISSP Principal Sales Engineer 1 2017 Proofpoint, Inc. Proofpoint at a Glance LEADING CUSTOMERS DEEP SECURITY DNA UNIQUE VISIBILITY
More informationCybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City
1 Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City The opinions expressed are those of the presenters and are not those of the Federal Reserve Banks, the
More informationIt pays to stop and think
It pays to stop and think Protect yourself from financial fraud Together we thrive 2 In the first six months of 2018, over 34,000 people were scammed out of 145.4m At HSBC, we work hard to keep our customers
More informationBusiness Online Banking & Bill Pay Guide to Getting Started
Business Online Banking & Bill Pay Guide to Getting Started What s Inside Contents Security at Vectra Bank... 4 Getting Started Online... 5 Welcome to Vectra Bank Business Online Banking. Whether you re
More informationUniversal Representation of a Consumer's Identity Is it Possible? Presenter: Rob Harris, VP of Product Strategy, FIS
Universal Representation of a Consumer's Identity Is it Possible? Presenter: Rob Harris, VP of Product Strategy, FIS Topics Consumer identity why it is important How big a problem is identity fraud? What
More informationRSA Fraud & Risk Intelligence Solutions
RSA Fraud & Risk Intelligence Solutions Separating Customers from Criminals May 2015 1 Mobile Social Identities IOT Alternative Authentication Market Disruptors Biometrics Cross Channel Intelligence Sharing
More informationEBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats.
EBOOK Stopping Email Fraud How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats www.proofpoint.com EBOOK Stopping Email Fraud 2 Today s email attacks have
More informationAccelerating growth and digital adoption with seamless identity trust
Accelerating growth and digital adoption with seamless identity trust IBM Trusteer helps organizations seamlessly establish identity trust across the omnichannel customer journey Let s get started 3 Introduction
More informationWho We Are! Natalie Timpone
Who We Are! Natalie Timpone Manager of Security Business Management Office Enterprise Security Awareness Manager Carmelo Walsh Security, Risk, and Compliance Security Awareness Subject Matter Expert Who
More informationhuntington Business security suite user guide
huntington Business security suite user guide Contents Welcome 3 Section 1: Getting Started Logging In 5 Section 2: ACH Positive Pay Overview 7 Filters 8 managing exceptions 11 warehouse 14 approvals 15
More informationHow Cyber-Criminals Steal and Profit from your Data
How Cyber-Criminals Steal and Profit from your Data Presented by: Nick Podhradsky, SVP Operations SBS CyberSecurity www.sbscyber.com Consulting Network Security IT Audit Education 1 Agenda Why cybersecurity
More informationTarget Breach Overview
Target Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more specifics? A: Yes, Target has confirmed that it experienced unauthorized access to its systems
More informationTreasury Management User Guide. Online Banking
Treasury Management User Guide Online Banking Released August 2018 Treasury Management... 4 Logging in to Treasury Management...5 Helpful Hints...10 User Menu... 12 Profile and Preferences... 12 Notification
More informationGuide to Getting Started. Personal Online Banking & Bill Pay
Guide to Getting Started Personal Online Banking & Bill Pay What s Inside Welcome to National Bank of Arizona s Online Banking. Whether you re at home, at work, or on the road, our online services are
More informationThe BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO
The BUSINESS of Fraud. Don t let it put you out of business. Veenindra J. Singh, First Vice President, Treasury Management Consultant California Bank & Trust 300 Lakeside Drive, Suite 800 Oakland, Ca 94612
More informationHow to Catch a Thief. Trends & Technologies in the Fight Against Fraud. Rohan Langley SAS
How to Catch a Thief Trends & Technologies in the Fight Against Fraud Rohan Langley SAS Global Drivers & Challenges: The Changing Fraud Landscape Fixing Fraud: A Fraud Solution A Real World Example: Online
More informationFAQ. Usually appear to be sent from official address
FAQ 1. What is Phishing Email? A form of fraud by which an attacker masquerades as a reputable entity in order to obtain your personal information. Usually appear to be sent from official email address
More informationSafeguarding Your Dealership from Fraud
Safeguarding Your Dealership from Fraud Fraud continues to be a problem at dealerships and the risks are only getting greater. Today s fraud schemes are more elaborate than ever and often employ an astonishingly
More informationTexas Department of Banking United States Secret Service January 25, 2012
Texas Department of Banking United States Secret Service January 25, 2012 Presented by: Texas Department of Banking Banking Commissioner Charles G. Cooper Deputy Commissioner Bob Bacon Chief IT Security
More informationTrustwave SEG Cloud BEC Fraud Detection Basics
.trust Trustwave SEG Cloud BEC Fraud Detection Basics Table of Contents About This Document 1 1 Background 2 2 Configuring Trustwave SEG Cloud for BEC Fraud Detection 5 2.1 Enable the Block Business Email
More information2017 Annual Meeting of Members and Board of Directors Meeting
2017 Annual Meeting of Members and Board of Directors Meeting Dan Domagala; "Cybersecurity: An 8-Point Checklist for Protecting Your Assets" Join this interactive discussion about cybersecurity trends,
More informationBusiness Accounts. Important information. Keeping you up to date. danskebank.co.uk
danskebank.co.uk Important information Keeping you up to date Business Accounts This booklet contains important information about changes to your agreement with us and other important information about
More informationAUTHENTICATION. Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response
AUTHENTICATION Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response Who we are Eric Scales Mandiant Director IR, Red Team, Strategic Services Scott Koller
More informationMobile Cash Management
Mobile Cash Management Best Practices Presented by: Dawn Papadatos Date: April 24, 2017 Agenda I. Current Mobile Banking Landscape II. Benefits of Corporate Mobile Banking III. Mobile Security IV. The
More informationCyber Security Updates and Trends Affecting the Real Estate Industry
Cyber Security Updates and Trends Affecting the Real Estate Industry What, Why, and How? Agenda Cyber Security Today Changes to Security Standards and Trends Protecting Yourself and Your Organization Takeways
More informationBest Practices for Detecting Banking Fraud. White Paper
Best Practices for Detecting Banking Fraud White Paper Best Practices for Detecting Banking Fraud Table of Contents INTRODUCTION... 1 OVERALL FRAUD PREVENTION STRATEGIES... 1 MONITORING ACCOUNT HOLDER
More informationBusiness ebanking User Guide May 2015
Business ebanking User Guide May 2015 Contents INTRODUCTION... 5 Signing In... 6 Signing Off... 9 First Time Access... 10 Dashboard Setup Tool... 10 WELCOME... 11 Welcome Page... 12 Managing panels...
More informationCoreFirst Bank & Trust
CoreFirst Bank & Trust New Commercial Internet Banking Frequently Asked Questions ACCOUNT OVERVIEW 1. Q: Why are some of my account numbers highlighted and marked with an asterisk A: Highlighted account
More informationPreventing fraud in public sector entities
Preventing fraud in public sector entities Fraud is a serious problem that can affect anyone, from individuals to large companies and associations. For public sector entities, fraud both external and internal
More informationThe Guide below is to help assist Users in navigating our Cash Management Online Banking
The Guide below is to help assist Users in navigating our Cash Management Online Banking If you have questions please call or email our Cash Management Support Team at 1-844-213-5198 or CEN-CMOperations@my100bank.com
More informationNOT-FOR- PROFIT SERVICES GROUP Client Information Bulletin
NOT-FOR- PROFIT SERVICES GROUP GUARDING AGAINST CYBERTHEFT The Problem: There has been an increase in electronic funds transfer (EFT) fraud being perpetrated on small to medium-size businesses in the past
More informationProtecting Your Business From Hackers
Protecting Your Business From Hackers Technology Has Changed Real Estate Today, consumers have access to vast troves of information that enable them to make decisions faster than ever before Real estate
More information9/11/ FALL CONFERENCE & TRAINING SEMINAR 2014 FALL CONFERENCE & TRAINING SEMINAR
1 2 1 Agenda: Types of Fraud Things you can do internally Things that companies can do Services Provided by the Bank 3 Because that is where the money is. 4 2 Checks Credit Cards ACH (Debits / Credits)
More informationPhishing in the Age of SaaS
Phishing in the Age of SaaS AN ESSENTIAL GUIDE FOR BUSINESSES AND USERS The Cloud Security Platform Q3 2017 intro Phishing attacks have become the primary hacking method used against organizations. In
More informationWebomania Solutions Pvt. Ltd. 2017
The other name for link manipulation is Phishing or you can say link manipulation is type of phishing attack done generally to mislead the user to a replica website or a looka-like of some well-known site.
More informationSecurity Awareness. Chapter 2 Personal Security
Security Awareness Chapter 2 Personal Security Objectives After completing this chapter, you should be able to do the following: Define what makes a weak password Describe the attacks against passwords
More informationBusiness/Commercial Client Internet Banking Awareness and Education Program
Business/Commercial Client Internet Banking 1.855.860.5952 TMClientSupport@opusbank.com www.opusbank.com Table of Contents Unsolicited Client Contact... 1 E-mail Risk... 1 Internet Risks... 3 Telephone
More informationSecuring today s identity and transaction systems:! What you need to know! about two-factor authentication!
Securing today s identity and transaction systems:! What you need to know! about two-factor authentication! 1 Today s Speakers! Alex Doll! CEO OneID Jim Fenton! Chief Security Officer OneID 2 Contents!
More informationFraud Risks Facing Credit Unions. ALLIED SOLUTIONS LLC SERVICE CENTER 210 East Main Street, Suite 200, Niles, MI Fax:
Fraud Risks Facing Credit Unions Today s Session Global risks Share how the bad guys are getting in Focus on Cyber and Card Risk Discuss what the credit union can do to prevent the risk Open discussion
More informationFFIEC CONSUMER GUIDANCE
FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their
More informationWHITEPAPER. Protecting Against Account Takeover Based Attacks
WHITEPAPER Protecting Against Account Takeover Based Email Attacks Executive Summary The onslaught of targeted email attacks such as business email compromise, spear phishing, and ransomware continues
More informationPersonal Online Banking & Bill Pay. Guide to Getting Started
Personal Online Banking & Bill Pay Guide to Getting Started What s Inside Contents Security at Vectra Bank... 4 Getting Started Online... 5 Welcome to Vectra Bank Online Banking. Whether you re at home,
More informationBusiness Online Banking
First State Community Bank Business Online Banking End User Guide Table of Contents Logging In... 3 Navigation... 5 Account Activity Options... 7 Transactions... 8 Transfers... 9 Stop Payments...10 Statements...12
More informationBehavioral Analytics A Closer Look
SESSION ID: GPS2-F03 Behavioral Analytics A Closer Look Mike Huckaby VP, Global Systems Engineering RSA The world is full of obvious things which nobody by any chance ever observes. Sherlock Holmes 2 Patterns
More informationRecognizing Fraud Staying Safe 2018 Information/Cyber Security Training
Recognizing Fraud Staying Safe 2018 Information/Cyber Security Training Copyright Sage Data Security 2017-2018 All Rights Reserved Presented by: John H Rogers, CISSP Director of Advisory Services john.rogers@sagedatasecurity.com
More informationRetail/Consumer Client Internet Banking Awareness and Education Program
Retail/Consumer Client Internet Banking Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 1) E-mail Risk... 3 2) Internet Risks... 4 3) Telephone
More informationTOP RISK CONCERNS MERCHANT DATA BREACHES. Presented by Ann Davidson, VP of Risk Consulting at Allied Solutions
TOP RISK CONCERNS MERCHANT DATA BREACHES Presented by Ann Davidson, VP of Risk Consulting at Allied Solutions Today s Webinar Will Cover: Current state of merchant data breaches Impact of merchant data
More informationFrauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam
Frauds & Scams Why is the Internet so attractive to scam artists? Anonymity Low cost Rapid growth Easy to adapt Be Cyber Savvy with C-SAFE 118 2006 Internet Fraud Trends Average Loss Online Auctions 34%
More informationSYSTEM LOGIN/PASSWORD SUPPORT
SYSTEM LOGIN/PASSWORD SUPPORT Why am I unable to log into the system? What if I forgot my password? Why do I need to create Security Questions/Answers? Why does it ask me if I want to remember this computer?
More informationProtect Your Business from Fraud.
Protect Your Business from Fraud www.fraudsmart.ie 2 Contents FraudSMART.................. 4 Top Tips to prevent fraud in your business....... 5 Email Scams.................. 6 Invoice Fraud.................6
More informationRisk Outlook Anti money Laundering and Cybercrime. Steve Wilmott and George Hawkins
Risk Outlook Anti money Laundering and Cybercrime Steve Wilmott and George Hawkins Introductions Steve Wilmott, Director of Intelligence and Investigations George Hawkins, Senior Technical Advisor, Risk
More informationRSA Web Threat Detection
RSA Web Threat Detection Online Threat Detection in Real Time Your Name Here 2 The Online Threat Environment 3 Web Threat Landscape In the Wild Begin Session Login Transaction Logout Web Threat Landscape
More informationRSA Web Threat Detection
RSA Web Threat Detection Online Threat Detection in Real Time Alaa Abdulnabi. CISSP, CIRM RSA Pre-Sales Manager, TEAM Region 1 Web Threat Landscape In the Wild Begin Session Login Transaction Logout Web
More informationEmployee Security Awareness Training
Employee Security Awareness Training September 2016 Purpose Employees have access to sensitive data through the work they perform for York. Examples of sensitive data include social security numbers, medical
More informationThe Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015
The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table
More informationBasics of the Admin Widget
Basics of the Admin Widget As an Admin user, you ve been assigned the ability to administer and maintain the users on your company s online banking profile. You ll see the above widget on your dashboard
More informationRecognizing & Protecting Against Fraud
Fraud Mitigation and Cyber Strategies for Public Entities April 209 Recognizing & Protecting Against Fraud 2 Why is it Important to Remain Vigilant? Fraud does not discriminate it occurs everywhere, and
More informationSecuring Office 365 with SecureCloud
Securing Office 365 with SecureCloud 1 Introduction Microsoft Office 365 has become incredibly popular because of the mobility and collaboration it enables. With Office 365, companies always have the latest
More informationWire Fraud Begins to Hammer the Construction Industry
Wire Fraud Begins to Hammer the Construction Industry Cybercriminals are adding new housing construction to their fraud landscape and likely on a wide scale. Created and published by: Thomas W. Cronkright
More informationManaging User Roles & Corporate Users
Managing User Roles & Corporate Users Each Corporate user will belong to a User Role. User Roles contain all the rights for the company's users. Corporate's default roles have different features, permissions,
More informationBut it Was Such a Little Phish February 2016 Webinar
But it Was Such a Little Phish February 2016 Webinar Firestorm Insights February 2016 1000 Holcomb Woods Parkway Suite 130 Roswell, GA 30076 770-643-1114 Fax: 1-800-418-9088 www.firestorm.com Page Intentionally
More informationAccount Takeover: Why Payment Fraud Protection is Not Enough
Cybercrime Protection Account Takeover: Why Payment Fraud Protection is Not Enough Mustafa Rassiwala, ThreatMetrix, Inc. April 2014 1 Agenda 1. Customer Accounts Blessing or Curse? 2. Passwords Weakest
More informationKnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks.
KnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks. About Us The world s most popular integrated Security Awareness Training and Simulated
More informationQuick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page
Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security
More informationA CFO s Guide to Cyber Security in the Coming Year
CYBER SECURITY A CFO s Guide to Cyber Security in the Coming Year LEVERAGE TECHNOLOGY AND YOUR FINANCIAL INSTITUTION TO BUILD BETTER DEFENSES www.cfo.com www.huntington.com A CFO s Guide to Cyber Security
More informationHow Enterprise Tackles Phishing. Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong
How Enterprise Tackles Phishing Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong Hackers turning to easy marks - Social engineering Phishing was the #1 threat vector (> 50%) for Office
More informationRSA NetWitness Suite Respond in Minutes, Not Months
RSA NetWitness Suite Respond in Minutes, Not Months Overview One can hardly pick up a newspaper or turn on the news without hearing about the latest security breaches. The Verizon 2015 Data Breach Investigations
More informationBusiness Online User Guide July 2017
Business Online User Guide July 2017 Business Online Account Holder 1 Introduction.. 1 Types of Activity 1 Log In 2 Multifactor Authentication. 2 MFA Device Print Security 2 MFA Enrollment 3 Registered
More informationUsing Security to Lock in Commercial Banking Customers
EXECUTIVE SUMMARY Webinar Using Security to Lock in Commercial Banking Customers Commercial banking is a market opportunity that financial institutions (FIs) should not ignore. Tens of billions of dollars
More informationFFIEC CONSUMER GUIDANCE
FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their
More informationCE Advanced Network Security Phishing I
CE 817 - Advanced Network Security Phishing I Lecture 15 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained
More informationWhy you MUST protect your customer data
Why you MUST protect your customer data If you think you re exempt from compliance with customer data security and privacy laws because you re a small business, think again. Businesses of all sizes are
More information2014 CliftonLarsonAllen LLP Cyber Crime and Payment Fraud Trends Key Threats to All Businesses CliftonLarsonAllen LLP. CLAconnect.
Cyber Crime and Payment Fraud Trends Key Threats to All Businesses CLAconnect.com What do the following have in common? Catholic church parish Hospice Collection agency Main Street newspaper stand Electrical
More informationybersecurity for the Modern Era Three Steps to Stopping malware, Credential Phishing, Fraud and More
ybersecurity for the Modern Era Three Steps to Stopping malware, Credential Phishing, Email Fraud and More www.proofpoint.com EBOOK Cybersecurity in the modern era 2 ONLY AMATEURS ATTACK MACHINES. PROFESSIONALS
More informationRegulator s Perspective of Best Practices in Combatting Cybercrime Executive Fraud Forum October 30, 2013
Regulator s Perspective of Best Practices in Combatting Cybercrime Executive Fraud Forum October 30, 2013 Tony DaSilva, AAP, CISA Senior Examiner Federal Reserve Bank of Atlanta Disclaimer The views and
More informationTools, Tips and Techniques to Mitigate Fraud. September 2017
Tools, Tips and Techniques to Mitigate Fraud September 2017 1 Agenda Email Threats Establish Controls Fraud Invoice Schemes Reducing Risk 2 Email Threats 3 What it all Means PHISHING Infected files/malicious
More informationBUSINESS ADVANTAGE USER GUIDE
Table of Contents Getting Started... Account Summary...5 Navigation Tools...6 Account History...8 Quick Reference Guide...9 Frequently Asked Questions... Need Help?... Getting Started. Visit.. In the Online
More informationPersonal Cybersecurity
Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions
More informationWeb Cash Fraud Prevention Best Practices
Web Cash Fraud Prevention Best Practices Tips on what you can do to prevent Online fraud. This document provides best practices to avoid or reduce exposure to fraud. You can use it to educate your Web
More informationAuthentication and Fraud Detection Buyer s Guide
Entrust, Inc. North America Sales: 1-888-690-2424 entrust@entrust.com EMEA Sales: +44 (0) 118 953 3000 emea.sales@entrust.com November 2008 Copyright 2008 Entrust. All rights reserved. Entrust is a registered
More information10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS
10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND
More informationPhishing: When is the Enemy
Phishing: When E-mail is the Enemy Phishing, once only a consumer worry, is creating headaches for e-mail administrators as businesses become the next target. CONTENTS Understanding the Enemy 2 Three Things
More informationOne Phish, Two Phish, Three! Building an Active Threat Management Framework for Malicious
One Phish, Two Phish, Three! Building an Active Threat Management Framework for Malicious Email - Ron Weiss, Incident Response Team lead Disclaimer: The information in this presentation is based on lessons
More informationJoe Stocker, CISSP, MCITP, VTSP Patriot Consulting
Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting Microsoft Cloud Evangelist at Patriot Consulting Principal Systems Architect with 17 Years of experience Technical certifications: MCSE, MCITP Office
More informationCapital Bank Express User Guide. The Tech Behind the Money
Capital Bank Express User Guide The Tech Behind the Money Capital Bank is a full service commercial bank dedicated to providing the friendliest, most responsive banking services to professionals and businesses
More information