Corporate Account Takeover & Information Security Awareness.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Corporate Account Takeover & Information Security Awareness
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Corporate Account Takeover & Information Security Awareness PRESENTATION FOR BANK CUSTOMERS.
Computer Viruses.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Threats To A Computer Network
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Quiz Review.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Security Issues: Phishing, Pharming, and Spam
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Commercial eSecurity Training and Awareness. Common Online Threats Most electronic fraud falls into one of three categories:  PHISHING – Fraudulent s.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
Hacker Zombie Computer Reflectors Target.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.

About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
What is Spam? d min.
Internet safety By Suman Nazir
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Cybersecurity Test Review Introduction to Digital Technology.
Policies and Security for Internet Access
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Cyber security. Malicious Code Social Engineering Detect and prevent.
Managing Windows Security
Lesson 3 Safe Computing.
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Corporate Account Takeover & Information Security Awareness

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only. Before acting on any ideas presented in this session; security, legal, technical, and reputational risks should be independently evaluated considering the unique factual circumstances surrounding each institution. No computer system can provide absolute security under all conditions. Any views or opinions presented do not necessarily state or reflect those of Martha's Vineyard Savings Bank or any other entity.

What will be covered? What is Corporate Account Takeover? How does it work? Statistics Current Trend Examples What can we do to Protect? What can Businesses do to Protect?

What is Corporate Account Takeover? A fast growing electronic crime where thieves typically use some form of malware to obtain login credentials to Corporate Online Banking accounts and fraudulently transfer funds from the account(s). Short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent. Malware includes computer viruses, worms, trojan horses, spyware, dishonest adware, crimeware, most rootkits, and other malicious and unwanted software. Malware Domestic and International Wire Transfers, Business-to-Business ACH payments, Online Bill Pay and electronic payroll payments have all been used to commit this crime.

How does it work? Criminals target victims by scams Victim unknowingly installs software by clicking on a link or visiting an infected Internet site. Fraudsters began monitoring the accounts Victim logs on to their Online Banking Fraudsters Collect Login Credentials Fraudsters wait for the right time and then depending on your controls – they login after hours or if you are utilizing a token they wait until you enter your code and then they hijack the session and send you a message that Online Banking is temporarily unavailable.

Statistics Where does it come from? – Malicious websites (including Social Networking sites) – – P2P Downloads (e.g. LimeWire) – Ads from popular web sites Web-borne infections: According to researchers in the first quarter of 2011, 76% of web resources used to spread malicious programs were found in 5 countries worldwide ~ United States, Russian Federation, Netherlands, China, & Ukraine.

Current Trend Examples Rogue Software/Scammers Phishing

Rogue Software/Scamware Form of malware that deceives or misleads users into paying for the fake or simulated removal of malware. Has become a growing and serious security threat in desktop computing. Mainly relies on social engineering in order to defeat the security software. Most have a Trojan Horse component, which users are misled into installing. Browser plug-in (typically toolbar). Image, screensaver or ZIP file attached to an . Multimedia codec required to play a video clip. Software shared on peer-to-peer networks A free online malware scanning service

Rogue Software Continued…

Phishing Criminally fraudulent process of attempting to acquire sensitive information (usernames, passwords, credit card details) by masquerading as a trustworthy entity in an electronic communication. Commonly used means: Social web sites Auction sites Online payment processors IT administrators

Phishing

Phishing Authentic

Phishing

Use CAUTION ! What may be relied upon today as an indication that an is authentic may become unreliable as electronic crimes evolve. This is why it is important to stay abreast of changing security trends.

Use

Some experts feel is the biggest security threat of all. The fastest, most-effective method of spreading malicious code to the largest number of users. Also a large source of wasted technology resources Examples of corporate waste: Electronic Greeting Cards Chain Letters Jokes and graphics Spam and junk

What can the Bank do to protect? Provide Security Awareness Training for Our Employees & Customers Review our Contracts and make sure that both parties understand their roles & responsibilities Make sure our Customers are Aware of Basic Online Security Standards Stay Informed and Attend webinars/seminars & other user group meetings Develop a layered security approach

Layered Security Monitoring of IP Addresses New User Controls – Administrator can create a new user. Bank must activate user. Calendar File – Frequencies, and Limits Dual Control Processing of files on separate devices – recommended Fax or Out of Band Confirmation Secure Browser Key Pattern Recognition Software

What Can Businesses do to protect? Education is Key – Train your employees Secure your computer and networks Limit Administrative Rights -Do not allow employees to install any software without receiving prior approval. Install and Maintain Spam Filters Surf the Internet carefully Install & maintain real-time anti-virus & anti-spyware desktop firewall & malware detection & removal software. Use these tools regularly to scan your computer. Allow for automatic updates and scheduled scans. Install routers and firewalls to prevent unauthorized access to your computer or network. Change default passwords on network devices. Install security updates to operating systems and all applications as they become available. Block Pop-Ups

What Can Businesses do to protect? Do not open attachments from Be on the alert for suspicious s Do not use public Internet access points Reconcile Accounts Daily Note any changes in the performance of your computer Dramatic loss of speed, computer locks up, unexpected rebooting, unusual popups, etc. Make sure that your employees know how and to whom to report suspicious activity to at your Company & the Bank Contact the Bank if you: Suspect a Fraudulent Transaction If you are trying to process an Online Wire or ACH Batch & you receive a maintenance page. If you receive an claiming to be from the Bank and it is requesting personal/company information.