security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

Similar documents
The BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

Web Cash Fraud Prevention Best Practices

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

Cyber security tips and self-assessment for business

huntington Business security suite user guide

Seattle University Identity Theft Prevention Program. Purpose. Definitions

P2P Instructions. 4. Select Person to Person

Ouachita Baptist University. Identity Theft Policy and Program

Red Flag Policy and Identity Theft Prevention Program

Regulation P & GLBA Training

Red Flags/Identity Theft Prevention Policy: Purpose

Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment

9/11/ FALL CONFERENCE & TRAINING SEMINAR 2014 FALL CONFERENCE & TRAINING SEMINAR

Best Practices Guide to Electronic Banking

ASSESSMENT LAYERED SECURITY

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

Identity Theft Prevention Policy

SANTANDER TREASURY LINK TRANSITION FREQUENTLY ASKED QUESTIONS (FAQ)

Why you MUST protect your customer data

Capital Bank Express User Guide. The Tech Behind the Money

Business Online Banking & Bill Pay Guide to Getting Started

Identity Theft Prevention Program. Effective beginning August 1, 2009

CYBER SECURITY RESOURCE GUIDE. Cyber Fraud Overview. Best Practices and Resources. Quick Reference Guide for Employees. Cyber Security Checklist

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS

Prevention of Identity Theft in Student Financial Transactions AP 5800

[Utility Name] Identity Theft Prevention Program

Personal Cybersecurity

Safeguarding Your Dealership from Fraud

Employee Security Awareness Training

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

ACM Retreat - Today s Topics:

University of Pittsburgh Security Assessment Questionnaire (v1.7)

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Employee Security Awareness Training Program

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide

FDIC InTREx What Documentation Are You Expected to Have?

MIS5206-Section Protecting Information Assets-Exam 1

Preventing fraud in public sector entities

Red Flags Program. Purpose

Wire Fraud Scams: How to Protect

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

Business ebanking User Guide May 2015

PBX Fraud Information

University of North Texas System Administration Identity Theft Prevention Program

Supervisor s Guide. supervisor s guide (continued) Welcome to NBT Online Banker for Business! Supervisor Functions NBT ONLINE BANKER FOR BUSINESS

Your security on click Jobs

ShelbyNext Financials: Accounts Payable Best Practices (Course #N210)

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

Business Bill Pay User Guide

You are signing up to use the Middlesex Savings Bank Person to Person Service powered by Acculynk that allows you to send funds to another person.

Information Technology General Control Review

Protecting Your Gear, Your Work & Cal Poly

IDENTITY THEFT PREVENTION Policy Statement

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

FFIEC CONSUMER GUIDANCE

Portal User Guide Member Features

Payment Card Industry - Data Security Standard (PCI-DSS)

Regulator s Perspective of Best Practices in Combatting Cybercrime Executive Fraud Forum October 30, 2013

Risky Business. How Secure is Your Dealership s Information? By Robert Gibbs

Taking control of your finances... 5 Use these tips to manage your finances

Target Breach Overview

Frequently Asked Questions (FAQ)

KSI/KAI Cyber Security Policy / Procedures For Registered Reps

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

Information Security Controls Policy

A practical guide to IT security

Personal Online Banking & Bill Pay. Guide to Getting Started

Treasury Services Group Number Treasury Management Officer

NOT-FOR- PROFIT SERVICES GROUP Client Information Bulletin

QuickBooks Online Security White Paper July 2017

A CFO s Guide to Cyber Security in the Coming Year

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Cyber fraud and its impact on the NHS: How organisations can manage the risk

An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule

Six Steps to Protect Your Clients and Protect Yourself from Identity Theft

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Our mission is you. Your New Account B A N K w w w. d a v i s o n s t a t e b a n k. c o m. switch

ACCOUNT SWITCH KIT. The Honesdale National Bank

Six Steps to Protect Your Clients and Protect Yourself from Identity Theft. Ley Mills IRS Stakeholder Liaison December 20, 2017

Client Resources. participant guide

SECURITY & PRIVACY DOCUMENTATION

Today s Security Threats: Emerging Issues Keeping CFOs Up at Night Understanding & Protecting Against Information Security Breaches

Teradata and Protegrity High-Value Protection for High-Value Data

Business/Commercial Client Internet Banking Awareness and Education Program

IS-906: Workplace Security Awareness. Visual 1 IS-906: Workplace Security Awareness

Mobile Cash Management

FFIEC CONSUMER GUIDANCE

Lakeshore Technical College Official Policy

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

What is Cybersecurity?

SYSTEM LOGIN/PASSWORD SUPPORT

QNB Bank-ONLINE AGREEMENT

Retail/Consumer Client Internet Banking Awareness and Education Program

Transcription:

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

Security for Your Business Mitigating risk is a daily reality for business owners, but you don t have to act alone. First Federal Bank offers a variety of solutions for controlling risk. reduce risk Build barriers to protect against fraud As many businesses become more reliant upon modern technology, they become more vulnerable to cybercrimes. The best way to protect your company is to educate yourself and your employees. This checklist is intended to assist our customers in safeguarding their financial data and processes. Use this list in conjunction with the tools to prevent and monitor fraud. We advise you to consult with your accountant, your computer hardware and software vendors and other resources to assist you in developing and implementing a comprehensive fraud prevention program that is appropriate for the nature and size of your business. Our Fraud Prevention Checklist is not all inclusive and does not guarantee protection against fraud. If you suspect fraud, please contact our Treasury Management Department at 419-785-3750. Procedures Controls Online

Procedures to Prevent Fraud Our partners at First Insurance Group* understand the importance of protecting your business and can provide flexible, cost-effective options to make a quick recovery. *Not FDIC Insured. Not a Deposit. May Lose Value. Not Guaranteed by the Bank. Not insured by any Government Agency. procedures Start with the basics. Employees can be your business first line of defense and your greatest risk. Establishing policies and procedures are an important first step in combating both internal and external fraud. Implement separation of duties for employees: Limit access and resources for each job role. Provide cross-training and job rotation to reduce risk of collusion. Implement dual control procedures for the following transactions: Establish procedures to review transactions before they leave the company. Ensure proper authorization of transactions. Verify any changes in payment instructions. Conduct control testing and audits Audits should be scheduled and done at random. Review financial information. Evaluate computer network and firewall protection. Ensure clean desk policy (all sensitive internal and customer information filed away). Review insurance coverage Contact your insurance agent to better understand your options. Ask about specific coverage for data breaches, system failures and intellectual property rights. Educate employees Web and Mainframe ACH Remote Deposit Capture Wires Tax Payments Establish a training program that builds employee awareness of social engineering, phishing, acceptable use, identity theft and fraud education. Make information about fraud safety easily accessible. Check Automation retirement Procedures Controls Online

Procedures Controls to Prevent Fraud controls Keep your standards high. Controls With the proper controls in place, you gain greater peace of mind knowing you are mitigating risk of fraudulent attacks. Once you have established the controls listed below, it is important to ensure they are enforced. Review access privileges. Give financial access only to employees who need it and review access privileges regularly, particularly when employees change roles. Limit authorization. Implement dual control procedures for accounts receivable and accounts payable responsibilities. Online Online Preauthorize high value checks. Approve high dollar amounts before the checks are written. Safely store sensitive material. Canceled checks, accounts receivable and payable records, payroll information and materials with bank account information should be stored securely with limited employee access. Have a Plan B. Establish and regularly test a response plan for disaster recovery, business continuation and incident response that includes notification procedures and defined responsibilities. Creating and testing plans to handle potential data breaches and fraud adds resilience and ensures continuity to your business.

Prevent Fraud While Online With First Federal Bank s Business Internet Banking, you can establish multiple users with multi-level security and individual user rights to quickly access account information without leaving your business exposed. online Safeguard your workspace. Modern technology has allowed businesses of all sizes to conduct business faster and more efficiently. It has presented a greater opportunity for cybercrime. Being vigilant is vital to ensure that fraud is kept to a minimum. Keep systems up-to-date and use a firewall. Attackers often look for faulty, outdated systems. Run vulnerability scans and monitor intrusion-detection and intrusion-prevention systems. Monitor accounts daily. Implement dual procedures for creating and approving online payments and report suspicious activity to your bank. Limit administrator password use. Do not use the administrator password to initiate or approve transactions. Administrator passwords should only be used to manage user access. Think before you click. Be cautious in clicking links and downloading attachments from unknown senders that may contain malware. Require unique usernames and strong passwords. Use unique ID s for each employee accompanied with complex passwords made up of letters, numbers, and special characters. Remind employees to log-off when leaving their work area. Control access. Limit each employee s access to only applications needed to perform his or her duties. In addition, use a dedicated computer with limited internet use for online banking to reduce risk of viruses and malware. Procedures Controls Online

Procedures Prevent Check Fraud checks Become a less attractive target. Be choosy. Only use an established, respected provider. If check orders are not received within 10 days, notify the supplier. Controls Anyone with a computer and printer can attempt to create fraudulent checks. By putting a few procedures in place, you can better protect your business from costly and time-consuming check fraud. Looks matter. Select one style of checks for each account to allow for easy recognition. Look for check designs with security features such as watermarks, chemical resistance or micro-printing. Online Store securely. Keep blank checks and check printing equipment in a secure area with controlled access. Conduct periodic inventory procedures, including accounting for the sequence of unused checks. Improve check identification. Use a unique check style for each account type. Keep in-touch with your bank. Review and update authorized signature cards annually or when staff changes occur. With Positive Pay Plus, First Federal Bank can provide daily protection against losses due to fraudulent check payments, unauthorized check cashing and ACH payments.

Procedures How First Federal Bank Helps with Fraud Prevention tools Let us do the double checking for you. Business Internet Banking: Stay connected with Business Internet Banking. Manage accounts, control cash flow and make payments in a secure, easy-to-use format. Controls When working with First Federal Bank, you not only get an experienced business specialist to help guide your business but access to the latest digital banking solutions to keep your account and transactions protected. After all, that s what makes us better together. Check Positive Pay*: Streamline your account reconciliation process using Business Internet Banking. Simply submit a list of checks that you plan to issue. When the checks are presented for payment, you are alerted of any discrepancies. Then approve, void, return or process stop payments* the same day or return suspect checks the next day. Our enhanced secured services give you peace of mind in knowing your assets are protected. Meet with your local treasury the functionality of checxchangetm: First Federal Bank has partnered with checxchange to offer a check recovery service that automatically collects your returned checks at no cost to you, reducing your staff time and expense on collection. *Additional fees may apply. management specialist to learn more. Positive Pay Plus*: Combines Check Positive Pay & ACH Positive Pay. Online ACH Positive Pay*: Conveniently monitor authorized ACH debit transactions based on originator information or transaction amount ranges through Business Internet Banking. Using ACH filters, you can block all ACH debit activity or only allow specific types of transactions to post.

First-Fed.com 1-877-367-8178 For additional resources on fraud prevention, visit First-Fed.com 11/17