© John Wallace 2013 1 Mobile and Online Banking Security John Wallace Consultant, Resources Global Professionals.

Slides:



Advertisements
Similar presentations
TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
Advertisements

Our Social Media Why and how to compose a social media release.
You have been given a mission and a code. Use the code to complete the mission and you will save the world from obliteration…
Lecture 2 - Revenue Models
Advanced Piloting Cruise Plot.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 5 Author: Julia Richards and R. Scott Hawley.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 38.
1 Chapter 40 - Physiology and Pathophysiology of Diuretic Action Copyright © 2013 Elsevier Inc. All rights reserved.
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
Chapter 1 Image Slides Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
CREATE & SUBMIT eEEMPR USING DEP ONLINE PORTAL
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
Setting up a Gmail Account & Safety
Facebook Part I Building Your Profile Patrick Therrien Technology & Education Training Specialist.
My Alphabet Book abcdefghijklm nopqrstuvwxyz.
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
ADDING INTEGERS 1. POS. + POS. = POS. 2. NEG. + NEG. = NEG. 3. POS. + NEG. OR NEG. + POS. SUBTRACT TAKE SIGN OF BIGGER ABSOLUTE VALUE.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
1 Learning Touchmath *Graphics taken from
Year 6 mental test 5 second questions
ZMQS ZMQS
Copyright, 2011 WowWe® VERS ONLINE 2 3.
BT Wholesale October Creating your own telephone network WHOLESALE CALLS LINE ASSOCIATED.
The ABCs of Credit Card Finance Essential Facts for Students 2007 Carol A. Carolan, Ph.D.
Using Family Connection Online Resource for Planning & Advising.
Marketing University Technologies : Linking University Research and Industry Interests Heidjer Staecker, J.D., LLM TreMonti Consulting LLC
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Table 22.1 Stakeholder summary for the Odd Shoe Company
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
ABC Technology Project
© S Haughton more than 3?
© Charles van Marrewijk, An Introduction to Geographical Economics Brakman, Garretsen, and Van Marrewijk.
© Charles van Marrewijk, An Introduction to Geographical Economics Brakman, Garretsen, and Van Marrewijk.
BIOLOGY AUGUST 2013 OPENING ASSIGNMENTS. AUGUST 7, 2013  Question goes here!
Squares and Square Root WALK. Solve each problem REVIEW:
We are learning how to read the 24 hour clock
© 2012 National Heart Foundation of Australia. Slide 2.
Lets play bingo!!. Calculate: MEAN Calculate: MEDIAN
Services Course Windows Live SkyDrive Participant Guide.
Past Tense Probe. Past Tense Probe Past Tense Probe – Practice 1.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
Chapter 5 Test Review Sections 5-1 through 5-4.
SIMOCODE-DP Software.
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
1 First EMRAS II Technical Meeting IAEA Headquarters, Vienna, 19–23 January 2009.
Addition 1’s to 20.
25 seconds left…...
Test B, 100 Subtraction Facts
Services Course Windows Live SkyDrive Participant Guide.
Week 1.
1 If You Are Me, Then Who Am I? Beating Identity Theft Office of the California Attorney General.
We will resume in: 25 Minutes.
A SMALL TRUTH TO MAKE LIFE 100%
1 Unit 1 Kinematics Chapter 1 Day
1 PC Online Advertising Menu October 2014 IT and Mobile Device Information Site for Businesspeople Please review the following document for more.
How Cells Obtain Energy from Food
IT security By Tilly Gerlack.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Presentation transcript:

© John Wallace Mobile and Online Banking Security John Wallace Consultant, Resources Global Professionals

Mobile and Online Banking Security Do you love the convenience of Online/Mobile Banking? 2 © John Wallace 2013

Mobile and Online Banking Security You are not alone: 50% of consumers use Online Banking (computer) 20% of consumers use Mobile Banking (phone or other mobile devices) 3 © John Wallace 2013

Mobile and Online Banking Security Caution! 4 © John Wallace 2013

Mobile and Online Banking Security Your banking credentials are in danger of being stolen The online banking credentials of your company are also at risk How? 5 © John Wallace 2013

Mobile and Online Banking Security Organized criminal gangs: Paying smart programmers to create malware Paying others to get the malware on your computer Targeting the bank accounts of you and your company 6 © John Wallace 2013

Mobile and Online Banking Security How do they get the malware on your computer? 7 © John Wallace 2013

Mobile and Online Banking Security This is how they do it: Infected legit web sites (80% of infected sites are legit) Phishing s (clicking on links, photos, etc.) Rogue web sites (faked web sites, porn, etc.) 8 © John Wallace 2013

Mobile and Online Banking Security They also use: Social Networks Public WiFi Hotspots Social engineering (free games or copyright bypass) 9 © John Wallace 2013

Mobile and Online Banking Security How do they get the malware on your phone? 10 © John Wallace 2013

Mobile and Online Banking Security This is how they do it: Downloading free games with malware QR Codes (pasted over legit ones) WiFi Hotspots 11 © John Wallace 2013

Mobile and Online Banking Security They also use: Phishing s (with links or photos of interest to you) Smishing links Social Networks Femtocells 12 © John Wallace 2013

Mobile and Online Banking Security What if I have current anti-virus software? Sorry, but it wont protect you from these guys! (zero day malware) 13 © John Wallace 2013

Mobile and Online Banking Security How can I protect myself? 14 © John Wallace 2013

Mobile and Online Banking Security PROTECT your computer: Dedicate a computer to use for ONLY online banking Dont surf the web with your online banking computer (ever) Dont use it for Dont use it for downloading anything except banking 15 © John Wallace 2013

Mobile and Online Banking Security PROTECT your companys computer: Dedicate a computer to use for ONLY online banking Dont surf the web with the online banking computer (ever) Dont use it for downloading anything except banking 16 © John Wallace 2013

Mobile and Online Banking Security PROTECT your smart phone or other mobile device: Dont do banking from your smart phone or other mobile device (for now). Do banking from your dedicated home computer 17 © John Wallace 2013

Mobile and Online Banking Security Contact your bank and plead for help Contact law enforcement Most important: Dont let it happen to you…. What do I do if it happens to me? © John Wallace 2013

Mobile and Online Banking Security PROTECT yourself: 19 © John Wallace 2013

Mobile and Online Banking Security PROTECT your computer: Dedicate a computer to use for ONLY online banking Dont surf the web with your online banking computer (ever) Dont use it for Dont use it for downloading anything except banking 20 © John Wallace 2013

Mobile and Online Banking Security PROTECT your companys computer: Dedicate a computer to use for ONLY online banking Dont surf the web with the online banking computer (ever) Dont use it for downloading anything except banking 21 © John Wallace 2013

Mobile and Online Banking Security PROTECT your smart phone or other mobile device: Dont do banking from your smart phone or other mobile device (for now). Do banking from your dedicated home computer 22 © John Wallace 2013

Questions 23 © John Wallace 2013

Contact Information For a copy of this presentation Or any further information: Please Contact: John Wallace (210) or Susan Hough (210)