Safeguard Your Assets ABCs to Mitigate Fraud in an Evolving Payments Environment. April 10, 2014

Size: px
Start display at page:

Download "Safeguard Your Assets ABCs to Mitigate Fraud in an Evolving Payments Environment. April 10, 2014"

Transcription

1 Safeguard Your Assets ABCs to Mitigate Fraud in an Evolving Payments Environment April 10, 2014

2 Speakers Milton Santiago, Portal and Treasury echannel Executive, Bank of America Merrill Lynch (Moderator) Larry Brennan, Vice President, PCI Compliance and Data Compromise, Bank of America Merchant Services Mary O Toole, Director, Senior ACH Product Manager, Bank of America Merrill Lynch

3 Milton Santiago Bank of America Merrill Lynch Milton Santiago Portal and Treasury echannel Executive Establishes global strategy for client-facing channels, including primary Treasury Management portal and mobile banking, for business banking, commercial, large corporate and financial institution clients Directs ecommerce solutions, i.e., data transmissions, file transfer, data enrichment through EDI processes Developed CashPro Online, a web-based Treasury solution More than 20 years of extensive banking experience Bachelor s degree in Computer Information Systems from DeVry University 3

4 Larry Brennan Bank of America Merchant Services Larry Brennan Vice President, PCI Compliance and Data Compromise Manages Merchant Data Security Program Aids merchants in meeting their PCI requirements to card organizations and is responsible for overseeing management of merchant data compromise incidents Previously was Site Leader for Bank of America Merchant Services Inside Sales Team responsible for more than 100 merchant services telesales representatives supporting two lines of business. Also directed staffing /development in products and services sold to small business customers via the telephone Has 15 years of financial services industry experience with an emphasis in merchant services Prior Bank of America Merchant Services, retired from U.S. Navy after 22 years of service 4

5 Mary O Toole Bank of America Merrill Lynch Mary O Toole Director, Senior ACH Product Manager Team lead of ACH Product Management Team, Global Treasury Solutions where responsible for executing business strategy to grow electronic payments through product development, promotion, market expansion Manages financial performance of product, and drives end-to-end delivery of ACH services to clients in Large Corporate and Commercial markets Joined company in 2002, through its predecessor, FleetBoston Financial Previously, was ACH Product Manager at JPMorgan Chase. Began her career at MetLife Insurance Company in Treasury and Bank Operations, leading Treasurer s Planning Board tasked with developing/implementing paper-to-electronic payments strategy Worked in payments field for over twenty years, and is active in many industry groups and initiatives Attended Fordham University, holds a Bachelor of Arts degree in Political Science and Master of Business Administration degree in Financial Management 5

6 Agenda Fraud Landscape Payments data compromise (Merchant) ACH Fraud

7 Fraud Landscape Milton Santiago

8 ATM ATM/ Card skimming employment scams real estate fraud money orders counterfeit and remote deposit PayPal scams charity fraud viruses trojans online Global Fraud Landscape Fraud has many faces phone fraud - social engineering ponzi schemes pyramid schemes Keyloggers Fraud Phone fraud - social engineering Internet ticket fraud dating fraud reverse mortgage scams counterfeit cashier checks mobile funeral and cemetery fraud cash checking fraud phishing identity theft telemarketing fraud real mail fraud money orders counterfeit and remote deposit health care and estate fraud health insurance fraud mail Internet investment scams wire and ACH fraud fraud Internet auction fraud 8

9 Client Attack Malware Threats User Targeted & Malware Installed Phishing & SMishing: Infected files/malicious links sent through or SMS message Drive by Downloads: Clicking on a document, ad, or video, posted on legitimate website initiates malware download Using infected flash drive Attack is Launched and Fraud Committed: Credential theft and/or HTML injection Transaction manipulation 9

10 Phishing Looks like a legitimate correspondence from the company Wording does not have the level of refinement expected from an authentic company message Has an attention getter High dollar amount of a cell bill in this example Embedded links activate Malware download on your device Often works whether or not you have a relationship with the company CallMe.org Support mycallme Account Your wireless bill is ready to view Dear Customer, Your monthly wireless bill for you account is now available online. Total Balance Due: $ Log in to mycallme to view your bill and make a payment. Or register now to manage your account online. By dialing *PAY (*729) from your wireless phone, you can check your balance or make a payment it s free. Smartphone users: download the free app to manage your account anywhere, anytime. Thank you CallMe Online Services callme.org Contact Us CallMe Support quick & easy support is available 24/7. Get Piece of Mind Set up secure AutoPay from your checking account. Learn more Go Paperless Save time, money and the environment. Learn more Online Deals! Shop the Best Deals in your area for Phone, TV, Internet and Wireless. Learn more Device Tutorials Information specific about your phone Smart Controls Block calls, set mobile purchase limits, manage usage, and more Payment Arrangements Explore your options for arranging a payment plan PLEASE DO NOT REPLY TO THIS MESSAGE 2012 CallMe Intellectual Property, All rights reserved. CallMe, The CallMe logo and marks contained herein are trademarks of CallMe Intellectual Property. CallMe Inc. provides products and services under the CallMe brand. Privacy Policy 10

11 Employee Phishing Be alert for phishing campaigns against employees that appear to be internal Employees are sent s in the form of Phishing attempts Company employee s internal address has been compromised Has an attention getter High dollar amount of a cell bill in this example s attempt to drive action such as payment or profile change Be able to recognize requests that are not consistent with their usual behavior Follow your Authentication procedures From: qualityfurniture@aol.com Sent: Thursday, March 28, :35am To: Pfeiffer, Margaret Subject: Good morning Account #: From: qualityfurniture@aol.com Sent: Thursday, March 28, :16am To: Pfeiffer, Margaret Subject: Good morning I am in my nephew s funeral service at the moment but I have an urgent outstanding transaction which I ll need you to complete today. Firstly, I will need you to update me with the available balance in my account. Secondly, am in the middle of a meeting now and will not be able to make or receive calls kindly me information you will require to initiate an ongoing domestic wire transfer. I will be very busy but will frequently check my for your response. We can schedule your furniture delivery for Monday next week if I hear from you. Please acknowledge the receipt of this . From: qualityfurniture@aol.com Sent: Thursday, March 28, :59am To: Pfeiffer, Margaret Subject: Good morning Hi are you going to be at the office today? I have an urgent outstanding transaction that I would like you to complete for me today. Thanks. 11

12 Spoofing Once fraudsters have Malware or Spyware on your computer system they can: Harvest your access credentials; internal systems, financial systems, , etc. Read your business contacts and collect their information Initiate to accounts payable pretending to be you Ask the recipient to process a payment to pay an invoice Await receipt of payment or as in this example, they follow up to check on payment If you receive an such as this: Contact the sender by an alternate method to validate the instruction Follow your authentication procedures Employ dual controls prior to making payment changes or processing payments Validate that presented invoices are legitimate From: Treasurer@mycompany.com Sent: Monday, July 8, :17am To: rebecca.dumornay@mycompany.com Subject: FW: Wire Transfer This is the third one. We are pulling the confirmation now and will send to you. From: Treasurer@mycompany.com Sent: Thursday, June 11, :30am To: rebecca.dumornay@mycompany.com Subject: FW: Wire Transfer FYI, this needs to get processed today. I checked with?? to get your help processing it along. I will assume we take care of any vendor forms after the fact. I can send am directly to??? or let you drive from here. Let me know. From: Treasurer@mycompany.com Sent: Tuesday, June 11, :59am To: rebecca.dumornay@mycompany.com Subject: FW: Wire Transfer Process a wire of $73, to the attached account information. Code it to admin expense. Let me know when this has been completed. Thanks Forwarded message From: CEO@mycompany.com Sent: Tuesday, June 11, :45am To: Treasurer@mycompany.com Subject: Wire Transfer Nick, Per our conversation, I have attached the wiring instructions for the wire. Let me know when done. Thanks. Charlie 12

13 Recognizing Fake URLs and Websites Understanding a few simple rules can help you spot a fraudster Good General Rule Type the Web site address in your address bar directly, rather than use a link in an message, especially if you are going to a financial site Check the URL or Fake sign in middle of address By simply hovering over the link with your mouse. The URL will appear in your browser or status bar (the bar that is usually at the bottom of your screen) and you can see what the name of the site is before you actually click on it For examples, if you go to a website that is you are not going to the Bank of America site at all Legitimate site and companies use a domain name as part of their name rather than sign Fake URLS spelling mistakes Some URLs look very much like the name of a well-known company but there may be letters transposed or left out An example might be mircosoft.com instead of microsoft.com These slight difference can be easy to miss and what phishers are counting on 13

14 Payments data compromise and technologies to help secure your business Larry Brennan

15 Data Compromises Are Constantly in the News 15

16 Typical data breach/fraud cycle Merchant/Agent fails to comply with payment industry security standards. 1 7 Hackers search for merchants or agents with weak controls or known security vulnerabilities. 2 3 Issuer fraud mitigation activities begin. Issuer contacts cardholder to investigate suspicious transactions. Or, cardholder contacts issuer to report a lost or stolen card or a suspicious transaction. Issuer conducts a fraud investigation. If fraud is confirmed, the issuer blocks the card and lists it on the network exception file. Issuer sends the cardholder a new card. Network fraud mitigation activities Compromise investigation/forensics Distribution of compromised accounts Development of fraud fighting technologies Dispute resolution and loss recovery processes Execution of fraud and data security compliance programs 6 Hackers identify target and steal sensitive information by: Breaching the system/network Compromising point-of-sale (POS) software Tampering with POS devices and ATMs (PIN theft) Skimming Fraudulent transactions are identified by issuer risk detection systems or by cardholders monitoring their account activity. 4 5 Criminals manufacture counterfeit cards for use at retail stores or at ATMs. Fraudsters may also use subsequent phishing attacks to steal additional information to conduct identity theft or card-notpresent (CNP) fraud. Fraudulent transactions are conducted at merchant locations (retail, CNP or ATMs). Criminals often target products that can be quickly converted to cash. 16 Source: Visa Franchise Data Compromise Trends and Cardholder, Security Best Practices (October 26, 2010, Visa, Inc.). 16

17 Common Causes of a Breach or Compromise Not Changing the Vendor-Supplied Password Upon Installation Trivial and Common Passwords for POS Systems Outdated Antivirus Software Definitions Improper Firewall Configuration Remote Access to Systems by Third-Party Providers Use of Vulnerable or Non-Compliant Software Having Remote Access Turned On at All Times

18 Looking For the Path of Least Resistance 2,164 data compromise incidents reported in 2013 exposing 822 million records globally (1) 73% of the cyber-attacks on large merchants in 2012 weren t specifically targeted at a single merchant. The business simply exhibited a weakness that the attacker knew how to exploit, as cybercriminals look for the path of least resistance (2) 2012 Data breaches by industry (3) 50% 45% 40% 30% 24% 20% 10% 9% 7% 3% 12% 0% Retail Food & Beverage Hospitality Financial services Nonprofit All others 18 (1) Data Breach Quick View - Risk Based Security & Open Security Foundation, February (2) Verizon, 2013 Data BREACH Investigations Report, April (3) Trustwave 2013 Global Security Report.

19 The Costs of a Data Compromise Are Significant The average cost of a data breach to a U.S. based company in 2013 was $188 per stolen record. Globally, the average cost was $277 per stolen record (1) Financial impacts: (2) Card organization fines and assessments passed through to merchant PCI Compliance fines for not properly protecting card account information Fraudulent transactions conducted with compromised cards Reimbursements for forensics and card replacement costs by issuer Insurance claims Government fines and penalties Lawsuits Potentially more damaging than any hard dollar financial impacts is the loss of public trust and confidence in a corporate brand caused by news of a data security breach Companies who are struggling financially jeopardize the very existence of the company if they are breached due to lost revenue from reduced customer confidence 19 (1) Ponemon Institute 2013 Cost of Data Breach Study: Global Analysis, May (2) PCI Security Standards Council: Why comply with PCI Security Standards?

20 Enhancing Payment Data Security with a Multi-Layered Approach There is no magic bullet that protects your business from all security threats all the time and across the entire enterprise. However, businesses can significantly improve their security posture with a layered solution that includes three elements like: Point-to-Point Encryption (P2PE) Encryption is designed to protect cardholder data from the point of data entry Uses a key management feature making cardholder data unreadable to anyone who does not have the encryption key Protects cardholder data in transit If properly implemented, P2PE can reduce your scope of PCI DSS validation 20

21 Multi-Layered Approach Tokenization Technology Tokenization Technology Replaces cardholder data (PAN) with surrogate values (token) Designed to work in concert with encryption to eliminate storage of cardholder data Allows merchant to limit the storage of cardholder data with the tokenization system If properly implemented, tokenization can reduce your scope of PCI DSS validation 21

22 Tokenization Overview What is a Token? Tokenization is the process of substituting a sensitive data element with a proxy. The proxy will have limited to no value outside of its intended use. Tokenization of Card Number: A proxy value is used as the payment token during the transaction so that true card number is never exposed to merchant. Why is it Important? Enhanced Security - By securing token provisioning through strong detection capabilities, and continuing to push for stronger authentication practices, we can count on tokenized transactions being more secure potential to reduce card alerts. Reduce Physical Card Issuance (expense impact) Opportunity to Impact Non-Approval Rate Risks? Card Not Present (request token) becoming Card Present (Contactless) Fraud Token Issuance (from increase in Account Takeover, PHISHing, and plastic card number compromises). 22

23 Multi-Layered Approach EMV Chip Technology EMV Chip Technology Protects against counterfeit cards by replacing static data with dynamic Works with card-present transaction only Requires a dual processing terminal (mag strip and chip) 23

24 ACH Fraud Mary O Toole

25 Quick Facts About ACH Payments After a decade of growth, check conversion applications are in decline. Volume growth is now driven by native electronic payments ACH Payments by Number and Type (1) (In Billions) Native Electronic Converted Checks Consumer bill payment applications dominate, and the majority of ACH transactions are debits How ACH is Used (2) ACH Transaction Split (2) 1% 1% 14% 31% 42% 58% 53% 25 (1) The 2013 Federal Reserve Payments Study (2) NACHA. B2B Direct Deposit Other Consumer Bill Pay International Credits Debits

26 Quick Facts About ACH Payments (Cont.) Rate of Third-Party Fraud in 2012 (1) By Frequency in Basis Points 3.60 By Value in Basis Points Cards ACH Check An unauthorized transaction (third-party fraud) is a transaction made or attempted by an individual who is not authorized by the accountholder or cardholder to use a payment instrument. Cards ACH Check Although third-party fraud attempts were higher for ACH than check, check fraud is greater in terms of dollar value. 26 (1) The 2013 Federal Reserve Payments Study

27 Fraud in the ACH Example Scenarios Fraud risk occurs when a payment transaction is initiated or altered in an attempt to misdirect or misappropriate funds by any party to the transaction(s) with fraudulent intent. (1) Fraud can occur on ACH credits An employee receives an that leads him to an infected site, which installs malware to access authentication information and initiate credit transfers. Since 2011, cybercriminals have been using NACHA s name, logo, contact information and product names, such as Direct Deposit via ACH, through phishing communications and social engineering tactics to gain access to consumer and business computer devices. (NACHA Website) Example of a Fraudulent Subject: ACH Transfer Review ACH Transfer (ID: ) is going to be reviewed because of the incorrectly input data when sending the payment. Important: Please fill in the application form attached attentively and send it to us. After that your transfer will be processed. If you have any questions or comments contact us at info@nacha.org. Thank you for using Employee Name Risk Management Services 27 (1) ACH Risk Management Handbook (NACHA).

28 Fraud in the ACH (Cont.) Example Scenarios Fraud can occur on ACH credits A bookkeeper creates ghost employee records to originate fictitious payroll payments June 19, 2013 (Reuters) Three women pleaded guilty on Wednesday to criminal charges arising out of what prosecutors say was a corrupt payroll project that cost more than $600 million. The average instance of payroll fraud lasts about 36 months. That s three years of paying ghost employees or overpaying existing ones. (Forbes 9/10/13) Under ACH Rules, the time limit for attempting to reverse an erroneous credit is 5 days 28 (1) ACH Risk Management Handbook (NACHA).

29 Fraud in the ACH Example Scenarios Or, on ACH debits A fraudster uses the account information taken from the MICR line of a company s check to initiate an unauthorized debit to the company s account A business prints its account information on invoices to encourage electronic payments, but the information is intercepted by fraudsters who use it to debit the account Despite the continued decline in their use, paper checks remain dominant payment method The typical organization makes 50% of its B2B payments by check. (AFP 2013 Electronic payments Survey) A consumer provides stolen or erroneous bank account information to pay bills or make purchases via ACH debit Nationwide Utility Payment Scam Hurts Thousands USA Today 7/12/12 Victims are told that all they have to do is provide their personal information. In exchange, they are given a bank routing number and checking account number to provide their utility company when making a payment Under ACH rules, the timeframe for returning unauthorized corporate transactions is one day after the settlement of the entry. The time-frame for returning consumer entries is 60 days after settlement. 29

30 Utility Industry Focused Phishing Phishing Scam: Federal Government to pay your utility bills Utility Bill Payment Scam Scam: Fraudsters claim a government grant will pay your utility bill in full for one month. Example: [Collected via , May 2012] My friend just informed me that President Obama is paying her electric bill this month. That supposedly you call and use your SS# as the bank account, then give them the routing number of and that's it, it pays for your electric bill but only once a year. My daughter called me a couple of days ago asking me if I had already paid my Florida Power & Light (FPL) bill, I told her that I hadn t and she proceeded to tell me that the accounts were being funded by some entity for this month only for Florida residents. I have her my account information, including SS#. I received a confirmation # from FPL. Today she calls me to tell me that she had found out this was a scam. She has no idea of how this was distributed, of friend of hers is the one who provided all of the information. 30

31 ACH Fraud Prevention Steps Businesses Can Take to Minimize Fraud Risk Monitor and reconcile your accounts daily Consolidate your ACH debit activity to one account (or a limited number) to facilitate this monitoring Use ACH fraud prevention services Debit Blocks Debit Authorizations ACH Positive Pay Remove account numbers from websites and correspondence Consider UPIC to mask the account where you receive ACH credits Convert more payments from check to electronic Notify your bank promptly about any discrepancy in your account Return unauthorized transactions within the NACHA time-frames 31

32 ACH Fraud Prevention Steps Businesses Can Take to Minimize Fraud Risk If you originate ACH payments 1 Segregate duties and set dollar limits appropriate for users and payment types Leverage your bank s reporting tools to validate files and totals Deactivate entitlements of employees who have left the company immediately If you are a biller using ACH debit Consider establishing limits on ACH debits (e.g. dollar amount, customer type, etc.) Always obtain proper authorization from the Receiver Use prenotes when possible Address returns promptly and monitor return rates If you use WEB, you must employ commercially reasonable systems to detect fraud 32 (1) Please refer to for complete information about the obligations of ACH Origination

33 How the Industry Addresses Fraud and Risk Examples of NACHA Rules (1) Network Enforcement Rule (11/8/07) Allows NACHA to request data from ODFIs about any Originator that appears to exceed a threshold of 1% for debits returned as unauthorized Company Name Identification (6/20/08) Expands the description of the Company Name Field to require that it contain a name of the Originator that is known and readily recognized by the Receiver Corporate Account Takeover (1/1/12) Provides an RDFI that reasonably suspects that a credit is unauthorized with an exemption to the funds availability requirement under Reg CC ACH Security Framework (9/20/13) Establishes minimum data security obligations for ACH Network participants to protect data within their purview Stop Payments (9/20/13) Expands rule language governing effective period for stop payment orders on debit Entries to non-consumer accounts ODFI Return Rate Reporting (3/15/13) Reduces the ODFI Return Rate Reporting period from 60 to 30 days for reducing return rates below the return rate threshold Data Passing (3/15/13) Prohibits sharing of certain customer information for the purpose of initiating debits not covered by the original authorization Proof of Authorization for Non-Consumer Entries (9/19/14) Permits an RDFI to request proof of a non-consumer Receiver s authorization for a debit 33 (1) For the complete NACHA Rules, please refer to

34 Unauthorized ACH Debit Returns (Millions) How the Industry Addresses Fraud and Risk Unauthorized ACH Debits A Key Indicator How the Industry Addresses Fraud and Risk The rate of unauthorized debit returns has declined to 0.03%, but the volume of unauthorized entries is increasing as the use of the ACH for debit transactions grows. Unauthorized ACH Debits and Return Rates (1) % 0.12% 0.10% 0.08% 0.06% 0.04% Unauthorized Return Rate % % Unauthorized Debit Returns Unauthorized Return Rate Returns for authorization issues are due to a problem with authorization, including unauthorized, revoked authorization, stopped payments or customer disputes. The authorization-related return rate for ACH entries is lower than reported fraud rates for credit cards (0.07 %) and signature debit cards (0.06%) (NACHA) 34 (1) NACHA.

35 How the Industry Addresses Fraud and Risk NACHA Requests for Comment on Additional Rules to Address Risk and Quality the ACH (1) Risk and Network Enforcement Improve ability to identify and enforce Rules against those responsible for highest, and most disproportionate, levels of exceptions Reduce number of exceptions caused by these outliers ACH Quality Fees Establish economic incentives for ODFIs to improve origination quality Reduce number of exceptions across the entire ACH Network Provide partial cost-recovery to RDFIs for exception handling (1) Request for Comment period closed on January 13, 2014

36 Q&A Have a question? Please click on the question box, type your question, and send.

37 Best Practices for Protecting Against Fraud Online checklist Be attentive during online session: are login prompts occurring where they should? Do your online screens look correct? Educate all users to recognize phishing scams and know to not open file attachments or click links in suspicious s. Always be on lookout for: Any requests for personal information Urgent appeals claiming your account will be closed if you fail to respond Messages about system/security updates Use caution when visiting Internet sites, avoiding social networking & unknown sites that are not trusted and used for business purposes Consider the use of dedicated, hardened computer Keep your anti-virus software/system patches up to date. Consider antimalware software that specifically protects your Internet Browser Implement duty segregation/dual administration Prohibit shared user names/passwords and avoid using automatic login features that save usernames/passwords Never access online banking via Internet cafes, public libraries or open Wi-Fi hotspots Report suspicious transaction activity to bank/authorities immediately 37

38 Resources Milton Santiago Larry Brennan O: F: Mary O Toole mary.s.o toole@baml.com 38

39 Safeguard Your Assets ABCs to Mitigate Fraud in an Evolving Payments Environment

40 Disclaimer Bank of America Merrill Lynch is the marketing name for the global banking and global markets businesses of Bank of America Corporation. Lending, derivatives, and other commercial banking activities are performed globally by banking affiliates of Bank of America Corporation, including Bank of America, N.A., member FDIC. Securities, strategic advisory, and other investment banking activities are performed globally by investment banking affiliates of Bank of America Corporation ( Investment Banking Affiliates ), including, in the United States, Merrill Lynch, Pierce, Fenner & Smith Incorporated and Merrill Lynch Professional Clearing Corp., both of which are registered broker-dealers and members of SIPC, and, in other jurisdictions, by locally registered entities. Merrill Lynch, Pierce, Fenner & Smith Incorporated and Merrill Lynch Professional Clearing Corp. are registered as futures commission merchants with the CFTC and are members of the NFA. This document is intended for information purposes only and does not constitute a binding commitment to enter into any type of transaction or business relationship as a consequence of any information contained herein. These materials have been prepared by one or more subsidiaries of Bank of America Corporation solely for the client or potential client to whom such materials are directly addressed and delivered (the Company ) in connection with an actual or potential business relationship and may not be used or relied upon for any purpose other than as specifically contemplated by a written agreement with us. We assume no obligation to update or otherwise revise these materials, which speak as of the date of this presentation (or another date, if so noted) and are subject to change without notice. Under no circumstances may a copy of this presentation be shown, copied, transmitted or otherwise given to any person other than your authorized representatives. Products and services that may be referenced in the accompanying materials may be provided through one or more affiliates of Bank of America, N.A. We are required to obtain, verify and record certain information that identifies our clients, which information includes the name and address of the client and other information that will allow us to identify the client in accordance with the USA Patriot Act (Title III of Pub. L , as amended (signed into law October 26, 2001)) and such other laws, rules and regulations. We do not provide legal, compliance, tax or accounting advice. Accordingly, any statements contained herein as to tax matters were neither written nor intended by us to be used and cannot be used by any taxpayer for the purpose of avoiding tax penalties that may be imposed on such taxpayer. For more information, including terms and conditions that apply to the service(s), please contact your Bank of America Merrill Lynch representative. Investment Banking Affiliates are not banks. The securities and financial instruments sold, offered or recommended by Investment Banking Affiliates, including without limitation money market mutual funds, are not bank deposits, are not guaranteed by, and are not otherwise obligations of, any bank, thrift or other subsidiary of Bank of America Corporation (unless explicitly stated otherwise), and are not insured by the Federal Deposit Insurance Corporation ( FDIC ) or any other governmental agency (unless explicitly stated otherwise). This document is intended for information purposes only and does not constitute investment advice or a recommendation or an offer or solicitation, and is not the basis for any contract to purchase or sell any security or other instrument, or for Investment Banking Affiliates or banking affiliates to enter into or arrange any type of transaction as a consequent of any information contained herein. With respect to investments in money market mutual funds, you should carefully consider a fund s investment objectives, risks, charges, and expenses before investing. Although money market mutual funds seek to preserve the value of your investment at $1.00 per share, it is possible to lose money by investing in money market mutual funds. The value of investments and the income derived from them may go down as well as up and you may not get back your original investment. The level of yield may be subject to fluctuation and is not guaranteed. Changes in rates of exchange between currencies may cause the value of investments to decrease or increase. We have adopted policies and guidelines designed to preserve the independence of our research analysts. These policies prohibit employees from offering research coverage, a favorable research rating or a specific price target or offering to change a research rating or price target as consideration for or an inducement to obtain business or other compensation. Copyright 2014 Bank of America Corporation. Bank of America N.A., Member FDIC, Equal Housing Lender.. 40

Fighting Fraud: Safeguarding Your Business. November 5th, 2015

Fighting Fraud: Safeguarding Your Business. November 5th, 2015 Fighting Fraud: Safeguarding Your Business November 5th, 2015 Duane Bunn, SVP, Dealer Financial Services Treasury Management Sales Manager Duane Bunn Bank of America Merrill Lynch Duane Bunn Dealer Financial

More information

Will You be the Next Headline?

Will You be the Next Headline? Will You be the Next Headline? Payments fraud awareness & prevention FOCUS Spring 2017 Conference On the agenda What s Driving the Security Landscape Terminology to know Planning ahead and best practices

More information

Tools, Tips and Techniques to Mitigate Fraud. September 2017

Tools, Tips and Techniques to Mitigate Fraud. September 2017 Tools, Tips and Techniques to Mitigate Fraud September 2017 1 Agenda Email Threats Establish Controls Fraud Invoice Schemes Reducing Risk 2 Email Threats 3 What it all Means PHISHING Infected files/malicious

More information

Wholesale Lockbox Standards and Options. US Sites Atlanta, Boston, Chicago, Dallas, Los Angeles, St. Louis

Wholesale Lockbox Standards and Options. US Sites Atlanta, Boston, Chicago, Dallas, Los Angeles, St. Louis Wholesale Lockbox Standards and Options US Sites Atlanta, Boston, Chicago, Dallas, Los Angeles, St. Louis November 2017 Introduction As a wholesale lockbox client, we want to provide you with upfront processing

More information

The BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO

The BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO The BUSINESS of Fraud. Don t let it put you out of business. Veenindra J. Singh, First Vice President, Treasury Management Consultant California Bank & Trust 300 Lakeside Drive, Suite 800 Oakland, Ca 94612

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

9/11/ FALL CONFERENCE & TRAINING SEMINAR 2014 FALL CONFERENCE & TRAINING SEMINAR

9/11/ FALL CONFERENCE & TRAINING SEMINAR 2014 FALL CONFERENCE & TRAINING SEMINAR 1 2 1 Agenda: Types of Fraud Things you can do internally Things that companies can do Services Provided by the Bank 3 Because that is where the money is. 4 2 Checks Credit Cards ACH (Debits / Credits)

More information

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name. security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name. Security for Your Business Mitigating risk is a daily reality for business owners, but you don t have

More information

You are signing up to use the Middlesex Savings Bank Person to Person Service powered by Acculynk that allows you to send funds to another person.

You are signing up to use the Middlesex Savings Bank Person to Person Service powered by Acculynk that allows you to send funds to another person. Middlesex Bank Person to Person Service You are signing up to use the Middlesex Savings Bank Person to Person Service powered by Acculynk that allows you to send funds to another person. This Agreement

More information

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN? WHAT IS CORPORATE ACCOUNT TAKEOVER? Corporate Account Takeover (also referred to as CATO) is a type of fraud where criminals gain access to a business financial accounts to make unauthorized transactions.

More information

Business Online Banking & Bill Pay Guide to Getting Started

Business Online Banking & Bill Pay Guide to Getting Started Business Online Banking & Bill Pay Guide to Getting Started What s Inside Contents Security at Vectra Bank... 4 Getting Started Online... 5 Welcome to Vectra Bank Business Online Banking. Whether you re

More information

CYBER SECURITY RESOURCE GUIDE. Cyber Fraud Overview. Best Practices and Resources. Quick Reference Guide for Employees. Cyber Security Checklist

CYBER SECURITY RESOURCE GUIDE. Cyber Fraud Overview. Best Practices and Resources. Quick Reference Guide for Employees. Cyber Security Checklist CORPORATE & INSTITUTIONAL BANKING CYBER SECURITY RESOURCE GUIDE Cyber Fraud Overview Best Practices and Resources Quick Reference Guide for Employees Cyber Security Checklist 2 5 7 9 AWARENESS OF CYBER

More information

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies Fraud Overview and Mitigation Strategies SUNTRUST TEAM: DOUG HICKMAN SENIOR VICE PRESIDENT FOUNDATIONS AND ENDOWMENTS SPECIALTY PRACTICE JAMES BERNAL ASSISTANT VICE PRESIDENT FOUNDATIONS AND ENDOWMENTS

More information

Section 3.9 PCI DSS Information Security Policy Issued: November 2017 Replaces: June 2016

Section 3.9 PCI DSS Information Security Policy Issued: November 2017 Replaces: June 2016 Section 3.9 PCI DSS Information Security Policy Issued: vember 2017 Replaces: June 2016 I. PURPOSE The purpose of this policy is to establish guidelines for processing charges on Payment Cards to protect

More information

QNB Bank-ONLINE AGREEMENT

QNB Bank-ONLINE AGREEMENT This is an Agreement between you and QNB Bank ("QNB"). It explains the rules of your electronic access to your accounts through QNB Online. By using QNB-Online, you accept all the terms and conditions

More information

Web Cash Fraud Prevention Best Practices

Web Cash Fraud Prevention Best Practices Web Cash Fraud Prevention Best Practices Tips on what you can do to prevent Online fraud. This document provides best practices to avoid or reduce exposure to fraud. You can use it to educate your Web

More information

1 of 11 10/1/ :26 AM

1 of 11 10/1/ :26 AM 1 of 11 10/1/2010 12:26 AM About Us Careers Calculators Contact Us Search Home Your Money HQ ID Theft & Fraud FRAUD ALERT E-mail Scams ID Theft and Fraud Avoid Becoming a Victim What To Do If You Are a

More information

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS? FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit

More information

Guide to Getting Started. Personal Online Banking & Bill Pay

Guide to Getting Started. Personal Online Banking & Bill Pay Guide to Getting Started Personal Online Banking & Bill Pay What s Inside Welcome to National Bank of Arizona s Online Banking. Whether you re at home, at work, or on the road, our online services are

More information

Cyber Insurance: What is your bank doing to manage risk? presented by

Cyber Insurance: What is your bank doing to manage risk? presented by Cyber Insurance: What is your bank doing to manage risk? David Kitchen presented by Lisa Micciche Today s Agenda Claims Statistics Common Types of Cyber Attacks Typical Costs Incurred to Respond to an

More information

Target Breach Overview

Target Breach Overview Target Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more specifics? A: Yes, Target has confirmed that it experienced unauthorized access to its systems

More information

Mobile Cash Management

Mobile Cash Management Mobile Cash Management Best Practices Presented by: Ed Hiddleson Date: April 19/20, 2018 Agenda I. Current Mobile Banking Landscape II. Benefits of Mobile Banking III. Mobile Security IV. The Future of

More information

huntington Business security suite user guide

huntington Business security suite user guide huntington Business security suite user guide Contents Welcome 3 Section 1: Getting Started Logging In 5 Section 2: ACH Positive Pay Overview 7 Filters 8 managing exceptions 11 warehouse 14 approvals 15

More information

COMPLETING THE PAYMENT SECURITY PUZZLE

COMPLETING THE PAYMENT SECURITY PUZZLE COMPLETING THE PAYMENT SECURITY PUZZLE An NCR white paper INTRODUCTION With the threat of credit card breaches and the overwhelming options of new payment technology, finding the right payment gateway

More information

PCI COMPLIANCE IS NO LONGER OPTIONAL

PCI COMPLIANCE IS NO LONGER OPTIONAL PCI COMPLIANCE IS NO LONGER OPTIONAL YOUR PARTICIPATION IS MANDATORY To protect the data security of your business and your customers, the credit card industry introduced uniform Payment Card Industry

More information

Personal Online Banking & Bill Pay. Guide to Getting Started

Personal Online Banking & Bill Pay. Guide to Getting Started Personal Online Banking & Bill Pay Guide to Getting Started What s Inside Contents Security at Vectra Bank... 4 Getting Started Online... 5 Welcome to Vectra Bank Online Banking. Whether you re at home,

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

What are PCI DSS? PCI DSS = Payment Card Industry Data Security Standards

What are PCI DSS? PCI DSS = Payment Card Industry Data Security Standards PCI DSS What are PCI DSS? PCI DSS = Payment Card Industry Data Security Standards Definition: A multifaceted security standard that includes requirements for security management, policies, procedures,

More information

University of North Texas System Administration Identity Theft Prevention Program

University of North Texas System Administration Identity Theft Prevention Program University of North Texas System Administration Identity Theft Prevention Program I. Purpose of the Identity Theft Prevention Program The Federal Trade Commission ( FTC ) requires certain entities, including

More information

NOT-FOR- PROFIT SERVICES GROUP Client Information Bulletin

NOT-FOR- PROFIT SERVICES GROUP Client Information Bulletin NOT-FOR- PROFIT SERVICES GROUP GUARDING AGAINST CYBERTHEFT The Problem: There has been an increase in electronic funds transfer (EFT) fraud being perpetrated on small to medium-size businesses in the past

More information

Site Data Protection (SDP) Program Update

Site Data Protection (SDP) Program Update Advanced Payments October 9, 2006 Site Data Protection (SDP) Program Update Agenda Security Landscape PCI Security Standards Council SDP Program October 9, 2006 SDP Program Update 2 Security Landscape

More information

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 1. Welcome 1.1 Welcome to the Connect Transit Card Program. The Connect Card Program makes using public transit easier

More information

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

Identity Theft, Fraud & You. PrePare. Protect. Prevent. PrePare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer

More information

Agreements & Contracts: Electronic Documents User Agreement CUSTOMER SERVICE SKOWHEGAN SAVINGS

Agreements & Contracts: Electronic Documents User Agreement CUSTOMER SERVICE SKOWHEGAN SAVINGS Agreements & Contracts: Electronic Documents User Agreement CUSTOMER SERVICE SKOWHEGAN SAVINGS 800.303.9511 CUSTSERV@SKOWSAVINGS.COM TABLE OF CONTENTS ELECTRONIC DELIVERY OF DOCUMENTS...3 SYSTEM REQUIREMENTS...3

More information

Mobile Cash Management

Mobile Cash Management Mobile Cash Management Best Practices Presented by: Dawn Papadatos Date: April 24, 2017 Agenda I. Current Mobile Banking Landscape II. Benefits of Corporate Mobile Banking III. Mobile Security IV. The

More information

Donor Credit Card Security Policy

Donor Credit Card Security Policy Donor Credit Card Security Policy INTRODUCTION This document explains the Community Foundation of Northeast Alabama s credit card security requirements for donors as required by the Payment Card Industry

More information

Lusitania Savings Bank Retail Internet Banking Terms and Conditions

Lusitania Savings Bank Retail Internet Banking Terms and Conditions Retail Internet Banking Terms and Conditions Internet Banking Terms and Conditions Agreement This Agreement describes your rights and obligations as a user of the On-line Banking Service ("Service" or

More information

Keep the Door Open for Users and Closed to Hackers

Keep the Door Open for Users and Closed to Hackers Keep the Door Open for Users and Closed to Hackers A Shift in Criminal Your Web site serves as the front door to your enterprise for many customers, but it has also become a back door for fraudsters. According

More information

Regulation P & GLBA Training

Regulation P & GLBA Training Regulation P & GLBA Training Overview Regulation P governs the treatment of nonpublic personal information about consumers by the financial institution. (Gramm-Leach-Bliley Act of 1999) The GLBA is composed

More information

IDENTITY THEFT PREVENTION Policy Statement

IDENTITY THEFT PREVENTION Policy Statement Responsible University Officials: Vice President for Financial Operations and Treasurer Responsible Office: Office of Financial Operations Origination Date: October 13, 2009 IDENTITY THEFT PREVENTION Policy

More information

Small Business FRAUD PREVENTION Manual

Small Business FRAUD PREVENTION Manual Small Business FRAUD PREVENTION Manual TABLE OF CONTENTS PREFACE... ix PART 1: INTERNAL FRAUD THREATS I. INTRODUCTION TO EMPLOYEE FRAUD The Shocking Cost of Employee Theft and Fraud... 1 The Cost of Fraud

More information

Agreement Between the Per Diem Prepaid Cardholder and U.S. Bank National Association ( U.S. Bank ) (Dated January, 2014)

Agreement Between the Per Diem Prepaid Cardholder and U.S. Bank National Association ( U.S. Bank ) (Dated January, 2014) Non-Consumer Per Diem Cardholder Agreement Agreement Between the Per Diem Prepaid Cardholder and U.S. Bank National Association ( U.S. Bank ) (Dated January, 2014) IMPORTANT: The enclosed U.S. Bank Per

More information

PCI Compliance: It's Required, and It's Good for Your Business

PCI Compliance: It's Required, and It's Good for Your Business PCI Compliance: It's Required, and It's Good for Your Business INTRODUCTION As a merchant who accepts payment cards, you know better than anyone that the war against data fraud is ongoing and escalating.

More information

CERTIFIED FINANCIAL PLANNER BOARD OF STANDARDS, INC. ANONYMOUS CASE HISTORIES NUMBER 30648

CERTIFIED FINANCIAL PLANNER BOARD OF STANDARDS, INC. ANONYMOUS CASE HISTORIES NUMBER 30648 CERTIFIED FINANCIAL PLANNER BOARD OF STANDARDS, INC. ANONYMOUS CASE HISTORIES NUMBER 30648 This is a summary of a decision issued following the October 2017 hearings of the Disciplinary and Ethics Commission

More information

PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)

PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS) PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS) Table of Contents Introduction 03 Who is affected by PCI DSS? 05 Why should my organization comply 06 with PCI DSS? Email security requirements 08

More information

Mobile ACH Payments Request for Comment

Mobile ACH Payments Request for Comment Mobile ACH Payments Request for Comment Executive Summary and Rules Description September 1, 2009 REQUEST FOR COMMENT RESPONSES DUE BY FRIDAY, OCTOBER 16, 2009 NACHA requests comment on a proposal to amend

More information

Canada s Anti-Spam Law ( CASL ): It s the Law on July 1, 2014 questions for directors to ask

Canada s Anti-Spam Law ( CASL ): It s the Law on July 1, 2014 questions for directors to ask Canada s Anti-Spam Law ( CASL ): It s the Law on July 1, 2014 questions for directors to ask Author: Jennifer Babe, LL.M, ICD.D Why Should I Read This Alert? a) despite its name, this Act covers much more

More information

First Federal Savings Bank of Mascoutah, IL Agreement and Disclosures

First Federal Savings Bank of Mascoutah, IL Agreement and Disclosures Agreement and Disclosures INTERNET BANKING TERMS AND CONDITIONS AGREEMENT This Agreement describes your rights and obligations as a user of the Online Banking Service and all other services made available

More information

PCI Compliance. What is it? Who uses it? Why is it important?

PCI Compliance. What is it? Who uses it? Why is it important? PCI Compliance What is it? Who uses it? Why is it important? Definitions: PCI- Payment Card Industry DSS-Data Security Standard Merchants Anyone who takes a credit card payment 3 rd party processors companies

More information

Simple and Powerful Security for PCI DSS

Simple and Powerful Security for PCI DSS Simple and Powerful Security for PCI DSS The regulations AccessEnforcer helps check off your list. Most merchants think they are too small to be targeted by hackers. In fact, their small size makes them

More information

FAQ. Usually appear to be sent from official address

FAQ. Usually appear to be sent from official  address FAQ 1. What is Phishing Email? A form of fraud by which an attacker masquerades as a reputable entity in order to obtain your personal information. Usually appear to be sent from official email address

More information

Common Scams and Fraud. Charlottesville/Albemarle County TRIAD Group

Common Scams and Fraud. Charlottesville/Albemarle County TRIAD Group Common Scams and Fraud Charlottesville/Albemarle County TRIAD Group What We ll Cover 3 parts of a scam or fraud Common scams What can you do? Common Scams Three Parts of Any Scam or Fraud 1. Victim has

More information

Table of Contents. PCI Information Security Policy

Table of Contents. PCI Information Security Policy PCI Information Security Policy Policy Number: ECOMM-P-002 Effective Date: December, 14, 2016 Version Number: 1.0 Date Last Reviewed: December, 14, 2016 Classification: Business, Finance, and Technology

More information

Fraud Update: Why Fraudsters Love Wires and How to Stop Them. Luis Rojas, Director, Product Management WesPay 2014

Fraud Update: Why Fraudsters Love Wires and How to Stop Them. Luis Rojas, Director, Product Management WesPay 2014 Fraud Update: Why Fraudsters Love Wires and How to Stop Them Luis Rojas, Director, Product Management WesPay 2014 Competitive Pressures Drive Fraud and Operational Risk Availability Of Information Creates

More information

ASSESSMENT LAYERED SECURITY

ASSESSMENT LAYERED SECURITY FFIEC BUSINESS ACCOUNT GUIDANCE RISK & ASSESSMENT LAYERED SECURITY FOR ONLINE BUSINESS TRANSACTIONS New financial standards will assist banks and business account holders to make online banking safer and

More information

IT Audit and Risk Trends for Credit Union Internal Auditors. Blair Bautista, Director Bob Grill, Manager David Dyk, Manager

IT Audit and Risk Trends for Credit Union Internal Auditors. Blair Bautista, Director Bob Grill, Manager David Dyk, Manager IT Audit and Risk Trends for Credit Union Internal Auditors Blair Bautista, Director Bob Grill, Manager David Dyk, Manager 1 AGENDA Internet Banking Authentication ATM Security and PIN Compliance Social

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

MERCHANTS AND FARMERS BANK ONLINE BANKING AGREEMENT AND DISCLOSURE

MERCHANTS AND FARMERS BANK ONLINE BANKING AGREEMENT AND DISCLOSURE MERCHANTS AND FARMERS BANK ONLINE BANKING AGREEMENT AND DISCLOSURE Merchants and Farmers Bank has expanded its banking services to utilize the convenience and efficiency of Internet technology and parties

More information

Business ebanking User Guide May 2015

Business ebanking User Guide May 2015 Business ebanking User Guide May 2015 Contents INTRODUCTION... 5 Signing In... 6 Signing Off... 9 First Time Access... 10 Dashboard Setup Tool... 10 WELCOME... 11 Welcome Page... 12 Managing panels...

More information

OBTAINING YOUR PIN# FOR UNIVERSITY PROCUREMENT CARD

OBTAINING YOUR PIN# FOR UNIVERSITY PROCUREMENT CARD OBTAINING YOUR PIN# FOR UNIVERSITY PROCUREMENT CARD 1) www.baml.com/pincheck 2) CLICK ON Register New User 3) Card Number (whole cc number) 4) Select: I am a Cardholder. This is my corporate cc number

More information

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE COMPLIANCE ADVISOR NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE A PUBLICATION BY THE EXCESS LINE ASSOCIATION OF NEW YORK One Exchange Plaza 55 Broadway 29th Floor New York, New York 10006-3728 Telephone:

More information

Baptist Financial Services

Baptist Financial Services Baptist Financial Services BFS Visa Prepaid PayCard FREQUENTLY ASKED QUESTIONS (FAQ S) Questions for Employers 1 What is a BFS Visa Prepaid PayCard? 2 How do I get a BFS Visa Prepaid PayCard? 3 How does

More information

e-transfer means the transfer of funds to Recipients using their address or mobile number;

e-transfer means the transfer of funds to Recipients using their  address or mobile number; Royal Bank of Canada MASTER CLIENT AGREEMENT FOR BUSINESS CLIENTS INTERAC e-transfer Service Materials These are Service Materials for Royal Bank s INTERAC e-transfer Service, and form part of the Master

More information

Why you MUST protect your customer data

Why you MUST protect your customer data Why you MUST protect your customer data If you think you re exempt from compliance with customer data security and privacy laws because you re a small business, think again. Businesses of all sizes are

More information

CSBANK ONLINE ENROLLMENT FORM CITIZENS STATE BANK

CSBANK ONLINE ENROLLMENT FORM CITIZENS STATE BANK CSBANK ONLINE ENROLLMENT FORM CITIZENS STATE BANK To sign up for Citizens State Bank s Internet Banking Services, complete all information on this form. Please read the CSBank Online Internet Banking Agreement

More information

Maintaining Trust: Visa Inc. Payment Security Strategy

Maintaining Trust: Visa Inc. Payment Security Strategy Maintaining Trust: Visa Inc Payment Security Strategy Ellen Richey 2010 Payments Conference Chicago Federal Reserve Global Electronic Payments Protecting the payment system is a shared responsibility among

More information

How PayPal can help colleges and universities reduce PCI DSS compliance scope. Prepared by PayPal and Sikich LLP.

How PayPal can help colleges and universities reduce PCI DSS compliance scope. Prepared by PayPal and Sikich LLP. How PayPal can help colleges and universities reduce PCI DSS compliance scope. Prepared by PayPal and Sikich LLP. Reduce time and resources needed for PCI DSS compliance. Campus merchants want to offer

More information

PCI DSS Addressing Cyber-Security Threats. ETCAA June Gabriel Leperlier

PCI DSS Addressing Cyber-Security Threats. ETCAA June Gabriel Leperlier Welcome! PCI DSS Addressing Cyber-Security Threats ETCAA June 2017 - Gabriel Leperlier Short Bio Current Position Head of Continental Europe Advisory Services at Verizon. Managing 30+ GRC/PCI/Pentest Consultants

More information

Cybersecurity The Evolving Landscape

Cybersecurity The Evolving Landscape Cybersecurity The Evolving Landscape 1 Presenter Zach Shelton, CISA Principal DHG IT Advisory Zach.Shelton@DHG.com Raleigh, NC 14+ years of experience in IT Consulting 11+ years of experience with DHG

More information

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Quick recap on  ing  Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security

More information

SECURITY PRACTICES OVERVIEW

SECURITY PRACTICES OVERVIEW SECURITY PRACTICES OVERVIEW 2018 Helcim Inc. Copyright 2006-2018 Helcim Inc. All Rights Reserved. The Helcim name and logo are trademarks of Helcim Inc. P a g e 1 Our Security at a Glance About Helcim

More information

Teradata and Protegrity High-Value Protection for High-Value Data

Teradata and Protegrity High-Value Protection for High-Value Data Teradata and Protegrity High-Value Protection for High-Value Data 12.16 EB7178 DATA SECURITY Table of Contents 2 Data Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:

More information

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS 10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND

More information

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information

More information

Regulatory Notice 10-21

Regulatory Notice 10-21 Regulatory Notice 10-21 SEC Approves New Consolidated FINRA Rules SEC Approval and Effective Dates for New Consolidated FINRA Rules and the Repeal of Certain NASD and Incorporated NYSE Rules Effective

More information

THE SMALL BUSINESS FRAUD PREVENTION MANUAL

THE SMALL BUSINESS FRAUD PREVENTION MANUAL THE SMALL BUSINESS FRAUD PREVENTION MANUAL TABLE OF CONTENTS PART 1: INTERNAL FRAUD THREATS I. INTRODUCTION TO EMPLOYEE FRAUD The Shocking Cost of Employee Theft and Fraud... 1 The Cost of Fraud to Small

More information

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person) Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,

More information

Today s Security Threats: Emerging Issues Keeping CFOs Up at Night Understanding & Protecting Against Information Security Breaches

Today s Security Threats: Emerging Issues Keeping CFOs Up at Night Understanding & Protecting Against Information Security Breaches Today s Security Threats: Emerging Issues Keeping CFOs Up at Night Understanding & Protecting Against Information Security Breaches Chris Bucolo, PCIP, MBA Today s Speaker Chris Bucolo Sr. Manager, Sikich

More information

The Honest Advantage

The Honest Advantage The Honest Advantage READY TO CHALLENGE THE STATUS QUO GSA Security Policy and PCI Guidelines The GreenStar Alliance 2017 2017 GreenStar Alliance All Rights Reserved Table of Contents Table of Contents

More information

Fraud Risks Facing Credit Unions. ALLIED SOLUTIONS LLC SERVICE CENTER 210 East Main Street, Suite 200, Niles, MI Fax:

Fraud Risks Facing Credit Unions. ALLIED SOLUTIONS LLC SERVICE CENTER 210 East Main Street, Suite 200, Niles, MI Fax: Fraud Risks Facing Credit Unions Today s Session Global risks Share how the bad guys are getting in Focus on Cyber and Card Risk Discuss what the credit union can do to prevent the risk Open discussion

More information

Navigate our app like a pro. How-to s, guides and more. Certified by J.D. Power* for providing An Outstanding Mobile Banking Experience.

Navigate our app like a pro. How-to s, guides and more. Certified by J.D. Power* for providing An Outstanding Mobile Banking Experience. Navigate our app like a pro How-to s, guides and more Certified by J.D. Power* for providing An Outstanding Mobile Banking Experience. Smart phone. Safe banking. Secure access We make keeping your money

More information

Canadian Anti-Spam Legislation (CASL)

Canadian Anti-Spam Legislation (CASL) Canadian Anti-Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS The purpose of this document is to assist and guide U of R employees regarding their obligations under the Canadian Anti-Spam Legislation

More information

CitiManager. Registering for CitiManager, Enrolling in Paper-Free Statements, and Viewing Your Electronic Statement

CitiManager. Registering for CitiManager, Enrolling in Paper-Free Statements, and Viewing Your Electronic Statement CitiManager Registering for CitiManager, Enrolling in Paper-Free Statements, and Viewing Your Electronic Statement August 6, 2013 Table of Contents 1. Self-Registration in CitiManager (Cardholders) 3 2.

More information

Mobile Security / Mobile Payments

Mobile Security / Mobile Payments Mobile Security / Mobile Payments Leslie K. Lambert CISSP, CISM, CISA, CRISC, CIPP/US, CIPP/G VP, Chief Information Security Officer Juniper Networks Professional Techniques - Session T23 MOBILE SECURITY

More information

Will you be PCI DSS Compliant by September 2010?

Will you be PCI DSS Compliant by September 2010? Will you be PCI DSS Compliant by September 2010? Michael D Sa, Visa Canada Presentation to OWASP Toronto Chapter Toronto, ON 19 August 2009 Security Environment As PCI DSS compliance rates rise, new compromise

More information

SANTANDER TREASURY LINK TRANSITION FREQUENTLY ASKED QUESTIONS (FAQ)

SANTANDER TREASURY LINK TRANSITION FREQUENTLY ASKED QUESTIONS (FAQ) TRANSITION FREQUENTLY ASKED QUESTIONS (FAQ) INTRODUCING FOR ONLINE BANKING A NEW EXPERIENCE AHEAD We are pleased to introduce you to Santander Treasury Link and look forward to providing you with an Online

More information

Nebraska State College System Cellular Services Procedures Effective Date June 15, 2012 Updated August 13, 2015

Nebraska State College System Cellular Services Procedures Effective Date June 15, 2012 Updated August 13, 2015 Nebraska State College System Cellular Services Procedures Effective Date June 15, 2012 Updated August 13, 2015 Definitions Cellular Telephone Service For the purposes of this policy, cellular telephone

More information

2017 Annual Meeting of Members and Board of Directors Meeting

2017 Annual Meeting of Members and Board of Directors Meeting 2017 Annual Meeting of Members and Board of Directors Meeting Dan Domagala; "Cybersecurity: An 8-Point Checklist for Protecting Your Assets" Join this interactive discussion about cybersecurity trends,

More information

Security and Fraud Prevention

Security and Fraud Prevention Security and Fraud Prevention Mary Rosendahl Director, Digital Channels Bank of America Merrill Lynch December 2017 Agenda Evolving threat environment Fraud schemes and scams Security best practices The

More information

University of Sunderland Business Assurance PCI Security Policy

University of Sunderland Business Assurance PCI Security Policy University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Interim Director

More information

Terms and Conditions P2P Service E-Signature and Electronic Disclosures Agreement

Terms and Conditions P2P Service E-Signature and Electronic Disclosures Agreement You are signing up to use the P2P service powered by Acculynk ( Service ) that allows you to send funds to another person. This ( E-Sign Agreement ) applies to all communications, documents, disclosures

More information

Retail/Consumer Client Internet Banking Awareness and Education Program

Retail/Consumer Client Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 1) E-mail Risk... 3 2) Internet Risks... 4 3) Telephone

More information

Integrated Access Management Solutions. Access Televentures

Integrated Access Management Solutions. Access Televentures Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1

More information

An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule

An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule Legal Disclaimer: This overview is not intended as legal advice and should not be taken as such. We recommend that you consult legal

More information

BCU Pay Anyone Terms and Conditions Credit Union Pay Anyone Service Agreement and Terms of Use ("Terms of Use") 1. Description of Service and Consent

BCU Pay Anyone Terms and Conditions Credit Union Pay Anyone Service Agreement and Terms of Use (Terms of Use) 1. Description of Service and Consent BCU Pay Anyone Terms and Conditions Credit Union Pay Anyone Service Agreement and Terms of Use ("Terms of Use") 1. Description of Service and Consent You may use your debit card information to send funds

More information

AGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS

AGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS EXHIBIT C AGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS 21. NYSE DATA PRODUCTS (a) SCOPE This Exhibit C applies insofar as Customer receives, uses and redistributes NYSE Data Products

More information

Document Cloud (including Adobe Sign) Additional Terms of Use. Last updated June 5, Replaces all prior versions.

Document Cloud (including Adobe Sign) Additional Terms of Use. Last updated June 5, Replaces all prior versions. Document Cloud (including Adobe Sign) Additional Terms of Use Last updated June 5, 2018. Replaces all prior versions. These Additional Terms govern your use of Document Cloud (including Adobe Sign) and

More information

Preventing fraud in public sector entities

Preventing fraud in public sector entities Preventing fraud in public sector entities Fraud is a serious problem that can affect anyone, from individuals to large companies and associations. For public sector entities, fraud both external and internal

More information

Employee Security Awareness Training

Employee Security Awareness Training Employee Security Awareness Training September 2016 Purpose Employees have access to sensitive data through the work they perform for York. Examples of sensitive data include social security numbers, medical

More information

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam Frauds & Scams Why is the Internet so attractive to scam artists? Anonymity Low cost Rapid growth Easy to adapt Be Cyber Savvy with C-SAFE 118 2006 Internet Fraud Trends Average Loss Online Auctions 34%

More information