FFIEC CONSUMER GUIDANCE

Similar documents
FFIEC CONSUMER GUIDANCE

ASSESSMENT LAYERED SECURITY

ELECTRONIC BANKING & ONLINE AUTHENTICATION

Web Cash Fraud Prevention Best Practices

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

Best Practices Guide to Electronic Banking

Keep the Door Open for Users and Closed to Hackers

Cyber security tips and self-assessment for business

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

White Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security

Authentication and Fraud Detection Buyer s Guide

9/11/ FALL CONFERENCE & TRAINING SEMINAR 2014 FALL CONFERENCE & TRAINING SEMINAR

Your security on click Jobs

Securing today s identity and transaction systems:! What you need to know! about two-factor authentication!

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

A STUDY OF TWO-FACTOR AUTHENTICATION AGAINST ON-LINE IDENTITY THEFT

Regulation P & GLBA Training

Retail/Consumer Client Internet Banking Awareness and Education Program

IDENTITY THEFT PREVENTION Policy Statement

Texas Department of Banking United States Secret Service January 25, 2012

Regulator s Perspective of Best Practices in Combatting Cybercrime Executive Fraud Forum October 30, 2013

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

Page 1 of 6 Bank card and cheque fraud

NYDFS Cybersecurity Regulations

201 CMR COMPLIANCE CHECKLIST Yes No Reason If No Description

Online Security and Safety Protect Your Computer - and Yourself!

Federal Deposit Insurance Corporation th Street NW Washington, DC

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

January 23, Online Banking Risk Management: A Multifaceted Approach for Commercial Customers

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

CYBER SECURITY RESOURCE GUIDE. Cyber Fraud Overview. Best Practices and Resources. Quick Reference Guide for Employees. Cyber Security Checklist

External Supplier Control Obligations. Cyber Security

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

It s still very important that you take some steps to help keep up security when you re online:

Octopus Online Service Safety Guide

Business Online Banking & Bill Pay Guide to Getting Started

Business/Commercial Client Internet Banking Awareness and Education Program

Payment Systems Department

Smart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security

Accelerating growth and digital adoption with seamless identity trust

Information Technology General Control Review

Policy 24 Identity Theft Prevention Program IDENTITY THEFT PREVENTION PROGRAM OF WEBB CREEK UTILITY DISTRICT

Merchant Guide to PCI DSS

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

It pays to stop and think

Your guide to the Payment Card Industry Data Security Standard (PCI DSS) banksa.com.au

PCI Compliance. What is it? Who uses it? Why is it important?

Remote Access (Supporting Document)

Information Security Controls Policy

Personal Online Banking & Bill Pay. Guide to Getting Started

Electronic Signature Policy

Identity Theft Prevention Policy

Guide to Getting Started. Personal Online Banking & Bill Pay

Education Network Security

STATE OF NEW JERSEY. ASSEMBLY, No th LEGISLATURE. Sponsored by: Assemblywoman ANNETTE QUIJANO District 20 (Union)

Sage Data Security Services Directory

Data Classification, Security, and Privacy

Maria Hishikawa MSIX Technical Lead Sarah Storms MSIX Contractor Security

FAQ. Usually appear to be sent from official address

Identity Theft Policies and Procedures

Carbon Black PCI Compliance Mapping Checklist

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

3 rd Party Certification of Compliance with MA: 201 CMR 17.00

Take Risks in Life, Not with Your Security

How Cyber-Criminals Steal and Profit from your Data

DETAILED POLICY STATEMENT

Cyber Insurance: What is your bank doing to manage risk? presented by

Service Provider View of Cyber Security. July 2017

Jordan Levesque Making sure your business is PCI compliant

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak

COMMENTARY. Federal Banking Agencies Propose Enhanced Cyber Risk Management Standards

Paystar Remittance Suite Tokenless Two-Factor Authentication

Emerging Issues: Cybersecurity. Directors College 2015

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

A Security Model for Space Based Communication. Thom Stone Computer Sciences Corporation

Red Flag Policy and Identity Theft Prevention Program

The CERT Top 10 List for Winning the Battle Against Insider Threats

A company built on security

Effective Data Security Takes More Than Just Technology

Cybersecurity The Evolving Landscape

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Business ebanking User Guide May 2015

Shareholder Authentication

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

FFIEC Guidance: Mobile Financial Services

First Federal Savings Bank of Mascoutah, IL Agreement and Disclosures

Internet of Things Toolkit for Small and Medium Businesses

Legal and Regulatory Developments for Privacy and Security

GLOBAL PAYMENTS AND CASH MANAGEMENT. Security

PIN / Password Security

ID Theft and Data Breach Mitigation

7. How do I obtain a Temporary ID? You will need to visit HL Bank or mail us the econnect form to apply for a Temporary ID.

Taking control of your finances... 5 Use these tips to manage your finances

Cybersecurity in Higher Ed

Red Flags/Identity Theft Prevention Policy: Purpose

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS

Transcription:

FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their customers.

Online Security Is Our Top Priority! I If you use online or mobile banking, you will be interested to learn that six federal financial industry regulators teamed up recently to make your accounts more secure. New supervisory guidance from the Federal Financial Institutions Examination Council (FFIEC) will help banks strengthen their vigilance and make sure that the person signing into your account is actually you. The supervisory guidance is designed to make online transactions of virtually all types safer and more secure. UNDERSTANDING THE FACTORS Online security begins with the authentication process, used to confirm that it is you, and not someone who has stolen your identity. Authentication generally involves one or more basic factors: Something the user knows (e.g., password, PIN) Something the user has (e.g., ATM card, smart card) Something the user is (e.g., biometric characteristic, such as a fingerprint). Single factor authentication uses one of these methods; multi-factor authentication uses more than one, and thus is considered a stronger fraud deterrent. When you use your ATM, for example, you are utilizing multi-factor authentication: Factor number one is something you have, your ATM card; factor number two is something you know, your PIN.

To assure your continued security online, your bank uses both single and multi-factor authentication, as well as additional layered security measures when appropriate. LAYERED SECURITY FOR INCREASED SAFETY Layered security is characterized by the use of different controls at different points in a transaction process so that a weakness in one control is generally compensated for by the strength of a different control. An example of layered security might be that you follow one process to log in (user/password), and then give additional information to authorize funds transfers. Layered security can substantially strengthen the overall security of online transactions protecting sensitive customer information, preventing identity theft, and reducing account takeovers and the resulting financial losses. The purpose of these layers is to allow your bank to authenticate customers and detect and respond to suspicious activity related to initial login and then to reconfirm this authentication when further transactions involve the transfer of funds to other parties. INTERNAL ASSESSMENTS AT YOUR BANK On the back-end, the new supervisory guidance offers ways your bank can look for anomalies that could indicate fraud. The goal is to ensure

that the level of authentication called for in a particular transaction is appropriate to the transaction s level of risk. Accordingly, your bank has concluded a comprehensive risk-assessment of its current methods as recommended in this supervisory guidance. These risk assessments consider, for example: changes in the internal and external threat environment changes in the customer base adopting electronic banking changes in the customer functionality offered through electronic banking; and actual incidents of security breaches, identity theft, or fraud experienced by the institution or industry. Whenever increased risk to your transaction security might warrant it, your bank will be able to conduct additional verification procedures, or layers of control, such as: Utilizing call-back (voice) verification, e-mail approval, or cell phone-based identification. Employing customer verification procedures, especially when opening accounts online. Analyzing banking transactions to identify suspicious patterns. For example, that could mean flagging a transaction in which a customer who normally pays $10,000 a month to five different vendors suddenly pays $100,000 to a completely new vendor. Establishing dollar limits that require manual intervention to exceed a preset limit.

YOUR PROTECTIONS UNDER REG E Banks follow specific rules for electronic transactions issued by the Federal Reserve Board. Known as Regulation E, the rules cover all kinds of situations revolving around transfers made electronically. Under the consumer protections provided under Reg E, you can recover internet banking losses according to how soon you detect and report them. Here is what the Federal rules require: If you report the losses within two days of receiving your statement, you can be liable for the first $50. After two days, the amount increases to $500. After 60 days, you could be legally liable for the full amount. These protections can be modified by state law or by policies at your bank, so be sure to ask your banker how these protections apply to your particular situation. CUSTOMER VIGILANCE: THE FIRST LINE OF DEFENSE Of course, understanding the risks and knowing how fraudsters might trick you is a critical step in protecting yourself online. You can make your computer safer by installing and updating regularly your Anti-virus software Anti-malware programs Firewalls on your computer Operating system patches and updates

You can also learn more about online safety and security at these websites: www.staysafeonline.com www.ftc.gov www.usa.gov www.idtheft.gov IF YOU HAVE SUSPICIONS If you notice suspicious activity within your account or experience security-related events (such as a Phishing email from someone purporting to be from your bank), you can contact anyone at your bank and you will be quickly and courteously guided to the person responsible for such issues. First Federal Savings Bank 648 North Jefferson Street Huntington, IN 46750 www.firstfedindiana.com FINANCIAL EDUCATION CORPORATION