ELECTRONIC BANKING & ONLINE AUTHENTICATION

Similar documents
FFIEC CONSUMER GUIDANCE

FFIEC CONSUMER GUIDANCE

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

ASSESSMENT LAYERED SECURITY

CUSTOMER TIPS: HOW TO GUARD AGAINST FRAUD WHEN USING ONLINE BANKING OR ATM s

How to recognize phishing s

Online Security and Safety Protect Your Computer - and Yourself!

FAQ. Usually appear to be sent from official address

Retail/Consumer Client Internet Banking Awareness and Education Program

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

Chapter 6 Network and Internet Security and Privacy

Your security on click Jobs

Safety and Security. April 2015

INTERNET SAFETY IS IMPORTANT

Copyright

BEST PRACTICES FOR PERSONAL Security

Payment Systems Department

Best Practices Guide to Electronic Banking

Guide to credit card security

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Web Cash Fraud Prevention Best Practices

Webomania Solutions Pvt. Ltd. 2017

>MESSAGELABS END USER IT SECURITY GUIDE >WHAT STEPS CAN YOU TAKE TO KEEP YOURSELF, YOUR COLLEAGUES AND YOUR COMPANY SAFE ONLINE?

Keep the Door Open for Users and Closed to Hackers

Protecting from Attack in Office 365

Common Scams and Fraud. Charlottesville/Albemarle County TRIAD Group

Security Awareness. Presented by OSU Institute of Technology

Phishing is Yesterday s News Get Ready for Pharming

For the purposes of this discussion, the following two attacks are key:

Safeguarding Your Dealership from Fraud

Personal Cybersecurity

Page 1 of 6 Bank card and cheque fraud

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

Securing today s identity and transaction systems:! What you need to know! about two-factor authentication!

TIPS TO AVOID PHISHING SCAMS

Target Breach Overview

BRING SPEAR PHISHING PROTECTION TO THE MASSES

Business/Commercial Client Internet Banking Awareness and Education Program

Client Resources. participant guide

Chapter 12. Information Security Management

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

Federal Deposit Insurance Corporation. National Credit Union Administration. Office of the Comptroller of the Currency. Office of Thrift Supervision

NHS South Commissioning Support Unit

CHAPTER 8 SECURING INFORMATION SYSTEMS

Security Now. Howard Verne. Is My Private Information Safe?

A STUDY OF TWO-FACTOR AUTHENTICATION AGAINST ON-LINE IDENTITY THEFT

Octopus Online Service Safety Guide

Financial scams. What to look for and how to avoid them.

FAQ: Privacy, Security, and Data Protection at Libraries

Employee Security Awareness Training

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

Layer by Layer: Protecting from Attack in Office 365

Malicious s. How to Identify Them and How to Protect Yourself

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

ECDL / ICDL IT Security. Syllabus Version 2.0

Chapter 4 Network and Internet Security

Train employees to avoid inadvertent cyber security breaches

Do not open attachments on s that you are not sure of.

Whitepaper on AuthShield Two Factor Authentication with SAP

Course Outline (version 2)

Unique Phishing Attacks (2008 vs in thousands)

Online Scams. Ready to get started? Click on the green button to continue.

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

IMPORTANT SECURITY CHANGES LOGGING ON. We are replacing the existing enhanced authentication.

Contents. What we re doing to protect your accounts. Protecting yourself from the most common scams and types of fraud

Entertaining & Effective Security Awareness Training

DoD Spear-Phishing Awareness Training. Joint Task Force - Global Network Operations

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Securing Information Systems

White Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security

SECURE USE OF IT Syllabus Version 2.0

Cyber Security Practice Questions. Varying Difficulty

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Getting over Ransomware - Plan your Strategy for more Advanced Threats

Panda Security 2010 Page 1

The Tension. Security vs. ease of use: the more security measures added, the more difficult a site is to use, and the slower it becomes

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk

RSA FRAUDACTION ANTI-PHISHING SERVICE: BENEFITS OF A COMPREHENSIVE MITIGATION STRATEGY

It pays to stop and think

Cyber Security Panel Discussion Gary Hayes, SVP & CIO Technology Operations. Arkansas Joint Committee on Energy March 16, 2016

Phishing. What do phishing s do?

Introduction to

EBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats.

OA Cyber Security Plan FY 2018 (Abridged)

Security Awareness. Chapter 2 Personal Security

FREQUENTLY ASKED QUESTIONS

Accounting Information Systems

Wire Fraud Begins to Hammer the Construction Industry

3.5 SECURITY. How can you reduce the risk of getting a virus?

Electronic Identity Theft and Basic Security

Custom Plugin A Solution to Phishing and Pharming Attacks

IT ANTI-VIRUS POLICY Version 2.5

Why was an extra step of choosing a Security Image added to the sign-in process?

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Cyber Security and Cyber Fraud

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

Transcription:

ELECTRONIC BANKING & ONLINE AUTHENTICATION How Internet fraudsters are trying to trick you What you can do to stop them How multi-factor authentication and other new techniques can help

HELPING YOU STAY SAFE ONLINE Y Your community bank, along with the banking industry, recognizes that as the electronic financial world gets more complex, online fraudsters become more sophisticated as well. In response, the banking industry has taken a comprehensive approach to meeting this growing threat. The first step involved a complete risk assessment of current electronic security measures. From this assessment came two objectives: Educate customers about the current electronic banking threats so they can understand the risks and take measures to protect themselves. Implement new authentication methods where appropriate to help assure customers online security. IDENTIFYING THE THREATS Most electronic fraud falls into one of three categories: Phishing Fraudulent e-mails, appearing to be from a trusted source such as your bank, direct you to websites. Once there, you are asked to verify personal information such as name, account and credit card numbers, passwords and the like. These sites are often designed to look exactly like the site they are imitating. The information you provide is used to hijack your accounts and your identity. E-mails that warn you, with little or no notice, that your account will be shut down unless you reconfirm certain information, are very

likely to be phishing. Delete the message and use a phone number or website address you know to be legitimate to check the source. Pharming or domain spoofing is an attack in which a user can be redirected from a legitimate site to a fraudulent site and then fooled into entering sensitive data such as a password or credit card number. The fraudulent site often looks like the legitimate site (e.g., your bank). It is different from phishing in that the attacker does not have to rely on having the user click a link in an email to deceive the user even if the user correctly enters a web address into a browser s address bar, the attacker can still redirect the user to a malicious web site. Malware is software designed to infiltrate or damage a computer system without the owner s knowledge or consent. It is a blend of the words malicious and software. It includes computer viruses, worms, trojan horses, spyware, adware, and other malicious and unwanted software. Understanding MULTI-FACTOR AUTHENTICATION New ways to verify identities should make web banking safer than ever Your bank wants to be sure that the level of authentication (i.e., the way you identify yourself and the security measures you employ) in a particular transaction is appropriate to the level of risk in that application. As a result, you might begin to experience some changes in how you identify yourself and gain access to your accounts over the internet. These authentication changes will help make you safer than ever before from account hijacking and identity theft. Today s authentication methods involve one or more basic factors : Something the user knows (e.g., password, PIN) Something the user has (e.g., ATM card, smart card) Something the user is (e.g., biometric characteristic, such as a fingerprint) Single-factor authentication uses one of these methods; multi-factor authentication uses more than one. When you log on with a password, you are using single-factor authentication; when you use your ATM, you are using multi-factor authentication: Factor number one is something you have, your ATM card; factor number two is something you know, your PIN. In addition to single and multi-factor authentication, your bank may also rely on several layers of control to assure your Internet safety. These layers might include Utilizing multiple verification procedures, especially when opening accounts online. Searching suspicious patterns in banking transactions. Establishing dollar limits that require manual intervention to exceed a preset limit. Other methods that allow your bank to establish appropriate security levels for the transactions you are conducting. Regardless of the types of authentication employed, you can be assured that your bank is working to make your online transactions safer and more convenient than ever before.

DEFENDING AGAINST FRAUD While no defense can protect against every threat, you can enhance your security online with some healthy skepticism: Don t Judge by Initial Appearances. The ready availability of software means that criminals can make their Web sites look just like a legitimate business. Safeguard Your Personal Data Online. If you receive e-mails from someone you don t know asking for personal data don t send the data without knowing more about who s asking. Watch out for Phishing. Be suspicious of any unsolicited email requesting personal information. Remember: your bank will never ask you to click on a link and go to a site to verify or enter personal information. When in doubt, log on to the official website instead of linking to it from an unsolicited email. Be Wary of unsolicited emails. An e- mail using a mail header that has no useful identifying data can be an indication that the person is hiding something. Contact the actual business that supposedly sent the email to verify that the email is genuine. RESOURCES The following links can help you find useful information and guidance: Department of Justice www.usdoj.gov/criminal/fraud/idtheft.html Learn about identity theft and other frauds.

Internet Crime Complaint Center http://www.ic3.gov Allows consumers to report Internet fraud. Federal Trade Commission www.consumer.gov/idtheft/ You can file a complaint with the FTC against a company or organization that you believe has cheated you. FirstGov www.usa.gov A centralized place to find information from local, state, and U.S. Government Agency websites. Identity Theft Resource Center www.idtheftcenter.org A non-profit organization with many resources to assist identity theft victims. Embracing Technology, Preserving Trust Presented by the American Bankers Association FINANCIAL EDUCATION CORPORATION