Web Cash Fraud Prevention Best Practices

Similar documents
Best Practices Guide to Electronic Banking

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

The BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO

Cyber security tips and self-assessment for business

9/11/ FALL CONFERENCE & TRAINING SEMINAR 2014 FALL CONFERENCE & TRAINING SEMINAR

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

Octopus Online Service Safety Guide

1) Are employees required to sign an Acceptable Use Policy (AUP)?

Business Online Banking & Bill Pay Guide to Getting Started

FFIEC CONSUMER GUIDANCE

ASSESSMENT LAYERED SECURITY

Education Network Security

FFIEC CONSUMER GUIDANCE

Guide to Getting Started. Personal Online Banking & Bill Pay

South Central Power Stop Scams

Security We keep your security a priority

Point ipos Implementation Guide. Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core

Personal Online Banking & Bill Pay. Guide to Getting Started

Capital Bank Express User Guide. The Tech Behind the Money

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Payment Card Industry (PCI) Data Security Standard

Introduction to Information Security Dr. Rick Jerz

NOT-FOR- PROFIT SERVICES GROUP Client Information Bulletin

Business ebanking User Guide May 2015

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

ECDL / ICDL IT Security. Syllabus Version 2.0

huntington Business security suite user guide

First Republic Bank Corporate Online User Guide

User guide Handelsbanken s card reader

Easthampton Savings Bank Online Business Banking User Guide

The University of Texas at El Paso. Information Security Office Minimum Security Standards for Systems

FREQUENTLY ASKED QUESTIONS

Online Security and Safety Protect Your Computer - and Yourself!

CYBER SECURITY RESOURCE GUIDE. Cyber Fraud Overview. Best Practices and Resources. Quick Reference Guide for Employees. Cyber Security Checklist

7. How do I obtain a Temporary ID? You will need to visit HL Bank or mail us the econnect form to apply for a Temporary ID.

Firstrust s Internet Banking System

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

January 23, Online Banking Risk Management: A Multifaceted Approach for Commercial Customers

FAQ. Usually appear to be sent from official address

ACM Retreat - Today s Topics:

Chapter 16: Advanced Security

Retail/Consumer Client Internet Banking Awareness and Education Program

Employee Security Awareness Training

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley

Children s Health System. Remote User Policy

SECURE USE OF IT Syllabus Version 2.0

ELECTRONIC BANKING & ONLINE AUTHENTICATION

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

Identity Theft Prevention Policy

Total Security Management PCI DSS Compliance Guide

FAQ: Privacy, Security, and Data Protection at Libraries

CYBERSECURITY RISK LOWERING CHECKLIST

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Regulator s Perspective of Best Practices in Combatting Cybercrime Executive Fraud Forum October 30, 2013

Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

(1) Top Page. Before Using GCMS Plus. Chapter3. Top Page. Top Page is the initial screen displayed after you log in. My Menu

Checklist: Credit Union Information Security and Privacy Policies

What are PCI DSS? PCI DSS = Payment Card Industry Data Security Standards

Cash Management Administration Users Guide

SANTANDER TREASURY LINK TRANSITION FREQUENTLY ASKED QUESTIONS (FAQ)

Course Outline (version 2)

Mobile Banking Online Banking Features Dashboard Pending Transactions Account Export Bill Pay Online Bill Pay

/ 1. Online Banking User Guide SouthStateBank.com / (800)

ONLINE BANKING Frequently Asked Questions

VERIFICATION METHOD. Deskside User Guide

Commercial Online Banking. Quick Reference

Red Flags/Identity Theft Prevention Policy: Purpose

/ 1. Online Banking User Guide SouthStateBank.com / (800)

Wireless Printing Updated 10/30/2008 POLICY. The use of Wireless Networking is not permitted at any site for full client/server networking of Taxwise.

Simply e C A S H M A N A G E M E N T U S E R G U I D E

PTS Customer Protection Agreement

BEST PRACTICES FOR PERSONAL Security

Fiserv, Inc. or its affiliates. All rights reserved. This work is confidential and its use is strictly limited. Use is permitted only in

Business Online Banking

Simple and Powerful Security for PCI DSS

Enforcing PCI Data Security Standard Compliance Marco Misitano, CISSP, CISA, CISM Business Development Manager Security Cisco Italy

Century Bank Mobile. Android and iphone Application Guide

5 Tips to Fortify your Wireless Network

Business ebanking Guide Administration

Payment Card Industry Internal Security Assessor: Quick Reference V1.0

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Explanation of Data Element Data Element Potentially Legitimate purposes for Collection/Retention

The Bank of East Asia, Limited, Macau Branch BEA Macau iphone Application FAQs for Mobile Banking Service (for iphone, ipod touch, and ipad users)

Business ebanking User Guide

Keep the Door Open for Users and Closed to Hackers

University of North Texas System Administration Identity Theft Prevention Program

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents

Ready Theatre Systems RTS POS

FORUM Business Online Banking

Internet Banking. Getting Started Guide New Zealand

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Mobile Banking Guidelines

PCI PA - DSS. Point Vx Implementation Guide. Version For VeriFone Vx520, Vx680, Vx820 terminals using the Point Vx Payment Core (Point VxPC)

BUSINESS ADVANTAGE USER GUIDE

PNC Prepaid Card Programs Cardholder Website How-To Manual

Frequently Asked Questions (FAQ)

Financial scams. What to look for and how to avoid them.

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE

Transcription:

Web Cash Fraud Prevention Best Practices Tips on what you can do to prevent Online fraud. This document provides best practices to avoid or reduce exposure to fraud. You can use it to educate your Web Cash Manager users. The use of this guide will help us to work together to prevent possible fraud events. Failure to follow these recommendations could represent a risk to your company and to Banco Popular. User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special characters. Change your password frequently. Never share username and password information with third-party providers. Avoid using an automatic login feature that saves usernames and passwords. General Guidelines Do not use public or other unsecured computers for logging into Web Cash Manager. Users should check the last login date/time every time they log in. Review account balances and detail transactions regularly on a daily basis to confirm payment and other transaction data and immediately report any suspicious transactions to your financial institution. View transfer history available through viewing account activity information. Page 1 of 6

Whenever possible, use Bill Pay instead of checks to limit account number dissemination exposure and to obtain better electronic record keeping. Take advantage of and regularly view system alerts; examples include: ACH Alerts Wire Alerts Password change alerts Do not use account numbers, your social security number, or other account or personal information when creating account nicknames or other titles. Whenever possible, register your computer to avoid having to re-enter challenge questions and other authentication information with each login. Review historical reporting features of Web Cash Manager on a regular basis to confirm payment and other transaction data. Never leave a computer unattended while using Web Cash Manager. Never conduct banking transactions while multiple browsers are open on your computer. Administrative Users Prohibit the use of shared usernames and passwords for Web Cash Manager. Limit administrative rights on users' workstations to help prevent the inadvertent downloading of malware or other viruses. Dedicate and limit the number of computers used to complete Web Cash Manager transactions; do not allow Internet browsing or e-mail exchange and ensure these computers are equipped with latest versions and patches of both anti-virus and anti-spyware software. Delete online user IDs as part of the exit procedure when employees leave your company. Assign dual system administrators for online cash management services. Use multiple approvals for monetary transactions and require separate entry and approval users. Establish transaction dollar limits for employees who initiate and approve online payments such as ACH batches, wire transfers, and account transfers. Page 2 of 6

Tips to Protect Online Payments & Account Data Take advantage of transaction limits. Establish limits for monetary transactions at multiple levels: per transaction, per batch, daily and per user.. (These may vary by application) When you have completed a transaction, ensure you log off to close the connection with the financial organization's computer. Use separate accounts for electronic and paper transactions to simplify monitoring and tracking any discrepancies. Reconcile by carefully monitoring account activity and reviewing all transactions initiated by your company on a daily basis. ACH (Automated Clearing House) Batches Use pre-notification transactions to verify that account numbers within your ACH payments are correct. Use limits for monetary transactions at multiple levels: per batch, daily and per user. Review transaction reporting regularly to confirm transaction activity. Wire Transfer Use limits provided for monetary transactions at multiple levels: per transaction, daily and user. Review historical and audit reports regularly to confirm transaction activity. Account Transfer Use limits provided for monetary transactions at multiple levels: per transaction, daily, weekly, or monthly. Review historical and audit reports regularly to confirm transaction activity. Page 3 of 6

Tips to Avoid Phishing, Spyware and Malware Do not open e-mail from unknown sources. Be suspicious of e-mails purporting to be from a financial institution, government department, or other agency requesting account information, account verification, or banking access credentials such as usernames, passwords, PIN codes, and similar information. Opening file attachments or clicking on web links in suspicious e-mails could expose your system to malicious code that could hijack your computer. Never respond to a suspicious e-mail or click on any hyperlink embedded in a suspicious e-mail. Call the purported source if you are unsure who sent an e- mail. If an e-mail claiming to be from your financial organization seems suspicious, checking with your financial organization may be appropriate. Install anti-virus and spyware detection software on all computer systems. Free software may not provide protection against the latest threats compared with an industry standard product. Update all of your computers regularly with the latest versions and patches of both anti-virus and anti-spyware software. Ensure computers are patched regularly, particularly operating system and key application with security patches. Install a dedicated, actively managed firewall, especially if using a broadband or dedicated connection to the Internet, such as DSL or cable. A firewall limits the potential for unauthorized access to your network and computers. Check your settings and select, at least, a medium level of security for your browsers. Clear the browser cache before starting any Web Cash Manager session to eliminate copies of web pages that have been stored on the hard drive. How the cache is cleared depends on the browser and version you are using. This function is generally found in the browser's preferences menu. Web Cash Manager error messages never include a period of time to wait before trying to login again. Be advised that repeatedly being asked to enter your password/token code are signs of potentially harmful activity. Being asked challenge questions if your computer was previously registered is a sign of potentially harmful activity. Page 4 of 6

Tips for Wireless Network Management Wireless networks can provide an unintended open door to your business network. Unless a valid business reason exists for wireless network use, it is recommended that all wireless networks be disabled. If a wireless network is to be used for legitimate business purposes, it is recommended that wireless networks be secured as follows: Change the wireless network hardware (router / access point) administrative password from the factory default to a complex password. Save the password in a secure location as it will be needed to make future changes to the device. Disable remote administration of the wireless network hardware (router / access point). If possible, disable broadcasting the network SSID. If your device offers WPA encryption, secure your wireless network by enabling WPA encryption of the wireless network. If your device does not support WPA encryption, enable WEP encryption. If only known computers will access the wireless network, consider enabling MAC filtering on the network hardware. Every computer network card is assigned a unique MAC address. MAC filtering will only allow computers with permitted MAC addresses access to the wireless network. Risk assessment and Controls Banco Popular performs risk assessments of its systems to identify and strengthen controls to detect and prevent fraud attempts. However, we recommend that periodically you conduct risk assessments of your information systems and internal processes so you may identify whether it is necessary to establish additional controls or strengthen existing controls. Banco Popular Calls Banco Popular will not call requesting sensitive information about your commercial or personal account. Be alert if you receive any calls in which someone requests sensitive information such as your account number, user id, password or PIN. If you receive such a call, you must immediately contact our Business Support Group to report the event. Banco Popular has fraud detection systems. If we understand that there might be a suspicious transaction, then we will contact you and the phone call will be Page 5 of 6

originated from our Business Support Group. The purpose of the call is to validate the authenticity of the transaction. Contacts In Case You Need To Report Suspicious Activity In case you do not recognize a transaction, you must contact our customer Support Group. Telephone: (787) 756-3939 Page 6 of 6