ASSESSMENT LAYERED SECURITY

Similar documents
FFIEC CONSUMER GUIDANCE

FFIEC CONSUMER GUIDANCE

ELECTRONIC BANKING & ONLINE AUTHENTICATION

Web Cash Fraud Prevention Best Practices

January 23, Online Banking Risk Management: A Multifaceted Approach for Commercial Customers

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

Regulator s Perspective of Best Practices in Combatting Cybercrime Executive Fraud Forum October 30, 2013

Texas Department of Banking United States Secret Service January 25, 2012

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

Best Practices Guide to Electronic Banking

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

Fraud Update: Why Fraudsters Love Wires and How to Stop Them. Luis Rojas, Director, Product Management WesPay 2014

Keep the Door Open for Users and Closed to Hackers

Retail/Consumer Client Internet Banking Awareness and Education Program

NOT-FOR- PROFIT SERVICES GROUP Client Information Bulletin

Federal Deposit Insurance Corporation th Street NW Washington, DC

IT Audit and Risk Trends for Credit Union Internal Auditors. Blair Bautista, Director Bob Grill, Manager David Dyk, Manager

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

White Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security

Red Flag Policy and Identity Theft Prevention Program

Cyber Insurance: What is your bank doing to manage risk? presented by

Commercial Online Banking. Quick Reference

SWIFT Customer Security Programme

Cybersecurity in Higher Ed

SECURITY & PRIVACY DOCUMENTATION

Identity Theft Policies and Procedures

Regulation P & GLBA Training

Business/Commercial Client Internet Banking Awareness and Education Program

VERIFICATION METHOD. Deskside User Guide

IDENTITY THEFT PREVENTION Policy Statement

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

COMMENTARY. Federal Banking Agencies Propose Enhanced Cyber Risk Management Standards

9/11/ FALL CONFERENCE & TRAINING SEMINAR 2014 FALL CONFERENCE & TRAINING SEMINAR

Business ebanking User Guide May 2015

Your security on click Jobs

Smart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security

Ouachita Baptist University. Identity Theft Policy and Program

Your guide to the Payment Card Industry Data Security Standard (PCI DSS) banksa.com.au

Endpoint Security for Wholesale Payments

Centrix Payments I.Q. System

REGULATORY COMPLIANCE REGULATORY COMPLIANCE SERVICES. Dynamic Solutions. Superior Results.

Authentication and Fraud Detection Buyer s Guide

Emerging Issues: Cybersecurity. Directors College 2015

Seattle University Identity Theft Prevention Program. Purpose. Definitions

Cybersecurity The Evolving Landscape

Payment Systems Department

Regulatory Notice 09-64

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Elevation of Privilege

Customer Security Programme (CSP)

Guidelines. on the security measures for operational and security risks of payment services under Directive (EU) 2015/2366 (PSD2) EBA/GL/2017/17

Red Flags/Identity Theft Prevention Policy: Purpose

Fraud Risks Facing Credit Unions. ALLIED SOLUTIONS LLC SERVICE CENTER 210 East Main Street, Suite 200, Niles, MI Fax:

Shareholder Authentication

2010 Online Banking Security Survey:

Cybersecurity and Hospitals: A Board Perspective

Cybersecurity and Data Protection Developments

FFIEC Guidance: Mobile Financial Services

Securing today s identity and transaction systems:! What you need to know! about two-factor authentication!

Keys to a more secure data environment

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE

[Utility Name] Identity Theft Prevention Program

FREQUENTLY ASKED QUESTIONS

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Policy 24 Identity Theft Prevention Program IDENTITY THEFT PREVENTION PROGRAM OF WEBB CREEK UTILITY DISTRICT

What is Penetration Testing?

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

The Double Edged Sword of Mobile Banking

Incident Policy Version 01, April 2, 2008 Provided by: CSRSI

7. How do I obtain a Temporary ID? You will need to visit HL Bank or mail us the econnect form to apply for a Temporary ID.

Universal Representation of a Consumer's Identity Is it Possible? Presenter: Rob Harris, VP of Product Strategy, FIS

Incident Response Guidelines

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Unauthorized Access

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

Mobile Financial Services: Can the Underbanked Bank on It? Rob Levy - Manager, Innovation and Research, CFSI Center for Financial Services Innovation

Payment Card Industry - Data Security Standard (PCI-DSS)

Best Practices for Detecting Banking Fraud. White Paper

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Post-Secondary Institution Data-Security Overview and Requirements

We will divide the many telecom fraud schemes into three broad categories, based on who the fraudsters are targeting. These categories are:

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

IJESRT. (I2OR), Publication Impact Factor: (ISRA), Impact Factor: 2.114

IMPORTANT SECURITY CHANGES LOGGING ON. We are replacing the existing enhanced authentication.

PCI Compliance: It's Required, and It's Good for Your Business

Online Banking Commercial User s Guide UUX/Treasury Release 4.11

Cybersecurity, safety and resilience - Airline perspective

Checklist: Credit Union Information Security and Privacy Policies

QNB Bank-ONLINE AGREEMENT

Table of Contents. PCI Information Security Policy

An improved security model for identity authentication against cheque payment fraud in Tanzanian banks

Demonstrating Compliance in the Financial Services Industry with Veriato

NYDFS Cybersecurity Regulations

Red Flags Program. Purpose

The CISO s Guide to Deploying True Password-less Security. by Bojan Simic and Ed Amoroso

CYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response

FAQ. Usually appear to be sent from official address

Credit Card Data Compromise: Incident Response Plan

Transcription:

FFIEC BUSINESS ACCOUNT GUIDANCE RISK & ASSESSMENT LAYERED SECURITY FOR ONLINE BUSINESS TRANSACTIONS New financial standards will assist banks and business account holders to make online banking safer and more secure from account hijacking and unauthorized funds transfers.

Banks and Businesses Team Up for Security A As someone responsible for a business bank account, you will want to know that new supervisory guidance from the Federal Financial Institutions Examination Council (FFIEC) are helping banks strengthen their vigilance and assure that your business accounts are properly secured during money transfers of all kinds. FFIEC is the coordinating group that sets standards for the major financial industry regulators and examiners. UNDERSTANDING THE RISKS FFIEC studies have shown that there have been significant changes in the threat landscape in recent years. Fraudsters many from organized criminal groups have continued to deploy more sophisticated methods to compromise authentication mechanisms and gain unauthorized access to customers online accounts. For example, hacking tools have been developed and automated into downloadable kits, increasing their availability to less experienced fraudsters. As a result, online account takeovers and unauthorized funds transfers have risen substantially each year since 2005, particularly with respect to commercial accounts, representing losses of hundreds of millions of dollars. ENHANCED CONTROLS PROTECT HIGHER RISKS The FFIEC supervisory guidance addresses the fact that not every online transaction poses the same level of risk, recommending that financial

SUMMARY OF RECOMMENDATIONS FOR BUSINESS ACCOUNTS Banks to urge business account holders to conduct periodic assessment of their internal controls Use layered security for system administrators Initiate enhanced controls for high-dollar transactions Provide increased levels of security as transaction risks increase Offer customers multi-factor authentication institutions implement more robust controls as the risk level of the transaction increases. Online business transactions generally involve ACH file origination and frequent interbank wire transfers. Since the frequency and dollar amounts of these transactions are generally higher than consumer transactions, they pose a comparatively increased level of risk to the institution and its customer, according to FFIEC. Thus banks are advised to implement security plans utilizing controls consistent with the increased level of risk for covered business transactions. These enhanced controls are designed to exceed the controls applicable to routine customer users. For example, a preventive control could include requiring an additional authentication routine prior to final implementation of the access or application changes. A detective control might include a transaction verification notice immedi ately following implementation of the submitted access or application changes. Based upon the incidents the Agencies have reviewed, enhanced

controls over administrative access and functions can effectively reduce money transfer fraud. LAYERED SECURITY FOR INCREASED SAFETY Your bank uses both single and multi-factor authentication, as well as additional layered security measures when appropriate. Layered security is characterized by the use of different controls at different points in a transaction process so that a weakness in one control is generally compensated for by the strength of a different control. This allows your bank to authenticate customers and respond to suspicious activity related to initial login and then later to reconfirm this authentication when further transactions involve the transfer of funds. For business accounts, layered security might often include enhanced controls for system administrators who are granted privileges to set up or change system configurations, such as setting access privileges and application configurations and/or limitations. INTERNAL ASSESSMENTS AT YOUR BANK The new supervisory guidance offers ways your bank can look for anomalies that could indicate fraud. The goal is to ensure that the level of authentication called for in a particular transaction is appropriate to the level of risk in that application. Accordingly, your bank has concluded a comprehensive risk-assessment of its current methods as recommended in the FFIEC guidelines. These risk assessments consider, for example:

EXAMPLES OF LAYERED SECURITY FOR BUSINESS ACCOUNTS Whenever increased risk to your transaction security might warrant it, your bank will have available additional verifi cation procedures, or layers of control, such as: Fraud detection and monitoring systems that include consideration of customer history and behavior; Dual customer authorization through different access devices; Out-of-band verification for transactions; Positive pay, debit blocks, and other techniques to appropriately limit the transactional use of the account; Transaction value thresholds, number of transactions allowed per day, and allowable payment windows (e.g., days and times); Internet protocol (IP) reputation-based tools to block connection to banking servers from IP addresses known or suspected to be associated with fraudulent activities; Policies and practices for addressing customer devices identifi ed as potentially compromised and customers who may be facilitating fraud; Account maintenance controls over activities performed by customers either online or through customer service channels. Changes in the internal and external threat environment Changes in the customer base adopting electronic banking Changes in the customer functionality offered through electronic banking; and Actual incidents of security breaches, identity theft, or fraud experienced by the institution or industry. Your bank joins FFIEC and the financial regulatory agencies in strongly urging businesses account holders to conduct similar internal assessments to ensure the highest level of security possible for your transactions.

YOUR PROTECTIONS UNDER REG E Banks follow specific rules for electronic transactions issued by the Federal Reserve Board known as Regulation E. Under the protections provided under Reg E, consumers can recover internet banking losses according to how soon they are reported. In general, these protections are extended to consumers and consumer accounts. IF YOU HAVE SUSPICIONS If you notice suspicious activity within your account or experience security-related events you can contact anyone at your bank and you will be quickly and courteously guided to the person responsible for handling such issues. Century Bank and Trust P.O. Box 768 Milledgeville, GA 31059-0768 (478) 453-3571 www.centurybankonline.com FINANCIAL EDUCATION CORPORATION