NCUCA Fraud and Risk Education April 17, 2019

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

Compliance with Federal Trade Commission’s “Red Flag Rule”
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Banking. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Protecting Your Identity: What to Know, What to Do.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Protect Yourself from Your Customer Kristin A. Stedman, AAP Senior Vice President Education Services 1 © 2014 TACHA. All Rights Reserved.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
$$$$$$$ Know your Money! Financial Institutions and Services.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
Payment Fraud Trends : What Can you do? Protect Yourself and Your Business from Financial Fraud.
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
How should I pay?. I listed these in the order I think you are most likely to encounter them.  Cash  Check  Debit card (use for a Debit or Credit transaction)
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
1 CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited © CUNA Mutual Group 2010 Alaska Credit Union League Annual Meeting.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited © CUNA Mutual Group Top Fraud Trends in 2011 Is Your Credit Union Prepared.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
SMU Dedman School of Law October 8, 2007 Glenn Wheeler – Chief Executive Officer.
Centrix Solutions Inc. Western States Users Group Centrix Solutions Inc. ACH Risk.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Protecting Your Assets By Preventing Identity Theft 1.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Opening up a Checking Account Eliseo Lugo III. 2 To choose the one that’s right for you when the time comes To take the right steps to open a bank account.
Wire Fraud Prevention Training: Setting Your Organizational Structure to Mitigate Fraud Risk and Comply with Regulatory Expectations Presented by: Terri.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
Protecting Your Assets By Preventing Identity Theft
Protecting Your Credit Identity
ELECTRONIC PAYMENT SYSTEM
The time to address enterprise mobility is now
Banking.
Personal Finance (part II)
Protecting Your Identity:
Copyright Lessons Learned Ltd 2016
How to Protect Yourself from ID Theft and Social Engineering
Mr. Roeshink – Financial Operations
Winnetka Police Department
Consumer Education Chapter 7
When you get caught for Identity Theft
Same Day ACH: How It Can Work for You
Financial Institutions and Services
Depository Institution Essentials
Credit Reports and Credit Scores
Financial Institutions Electronic Banking Checking Accounts
WHY CREDIT? Financial Unit
Cyber Security in the Mortgage Industry
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Red Flags Rule An Introduction County College of Morris
Bank On It.
Depository Institution Essentials
Chapter 5 Section 5.1.
Protecting Yourself from Fraud including Identity Theft
Identity Theft Prevention Program Training
What is BankMobile? A process to select how to receive student refunds and student payroll payments It is fast, secure, and convenient. Go to:
Chip & Pin and Apple Pay: Vulnerabilities of the Changing Payment Systems Jay Isaacson.
Protecting Your Identity
Depository Institutions
Depository Institution Essentials
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit Identity
Protecting Your Identity
Depository Institutions
Lesson 4.2 Banking Services and Fees
2019 AFP Payments Fraud & Control Survey
Identity Theft and Credit Safety
Presentation transcript:

NCUCA Fraud and Risk Education April 17, 2019

Reputation Risk: This affects a financial institution’s ability to meet its business objectives and preserve its image and reputation.

Fraud Prevention Challenges 3

WHAT KEEPS YOU AWAKE AT NIGHT…?

Top Fraud Risks in 2019 Card, ACH, A2A, P2P, mobile, online Internal Fraud Non-EMV cards and ATMs ATM jackpotting ATM Cash Out Synthetic ID theft Phishing attacks Authentication Data breaches Cyber break-ins Card, ACH, A2A, P2P, mobile, online Wire Fraud Loans – consumer, credit card, HELOC, unsecured (charge-offs) Check fraud – consumer, corporate/cashier/business Business email/phone Remote deposit capture ADA website compliance 5

How the Bad Guys are Breaking In Internal – employee within Card or card number fraud Phishing, email, text messaging or phone calls Data breaches System intrusions (includes third-parties) Identity theft – real or synthetic Authentication Social media / network New account fraud Account takeover fraud Mobile devices Call Center Third party Loan fraud and collections 6

2019 Risk

Internal Risk Exposure Embezzlements continue to be a “sleeper” and it can happen to any credit union. It’s key to continue to perform internal and external audits to help find any unusual activity. Key: Segregation of duties across all products and services Dual control for all products and services Review of all employee accounts 10

Transaction Fraud Wire Fraud Paper Check Fraud Person calls up the call center or 3rd party call center and request an internal transfer from the HELOC to their share/share draft account. Funds leave using a check , cash shared branching or an outgoing wire and the bad guy passes all of the authentication measures Mitigation: Contact the member using multiple layers of risk mitigation would have mitigated the exposure Paper Check Fraud Bad guy creates counterfeit CU official checks and the checks clear the risk mitigation measures Mitigation: Positive pay/payee positive pay would have prevented the exposure 11

Transaction Fraud Payment Card Fraud (debit and credit) ACH Fraud Bad guy obtains card information from a data breach and creates either a “card present” or “card not present” fraud Mitigation: Multiple layers of card security may have reduced the fraud exposure. Daily $ limits is a key risk mitigation measure. ACH Fraud Bad guy obtains routing and account number, breaks into the credit union, using online or bill pay systems and sends an ACH credit to the RDFI and then hires money mules to withdraw the funds. ACH debits are pulled from the RDFI and brought into the ODFI. Mitigation: Performing multiple layers of authentication by the originating depository financial institution (ODFI) prior to the ACH credit going out the door may have prevented the exposure. ACH debit payments on credit card and HELOC may increase the risk if the ACH payment is returned by the RDFI. 12

ID Theft – What Types of ID Theft Are Happening? Synthetic ID Theft A fabricated Individual who “does not exist”. A fraudster creates a “synthetic” identity that combines fabricated information with stolen consumer information, such as names, birthdays, Social Security numbers and/or addresses. Stolen ID Theft A real individual who “does exist”. A fraudster steals the real individuals information and takes over the real persons identify in the event to commit ID fraud.

Credit Reports – Free Freeze to Prevent ID Theft September 21, 2018 – Free Freeze Experian Equifax TransUnion Every consumer, young or old should place a “free freeze” with each credit bureau. Consumer is the only one that can place the “free freeze” and the consumer is the only one that can remove the “free freeze”. Employee and Member Education is Key! 14

Authentication Layers – Key Risk Measure Authentication layers are key today to validate your “new member” and your “existing member”. If a New Account and Account Takeover gets through your “authentication” layers, financial damage is ahead. Are you tracking where the new account or account takeover broke through the authentication layers? Are you tracking synthetic of stolen ID fraud as a result of: loan fraud and collections and; 1st payment is not made and insurance is not in force. Indirect lending agreement – Does it include the return of the loan if it’s the result of ID theft – stolen or authentic?

Risk Mitigation to Share with Members Closely monitor all credit accounts and loans, to catch and report any suspicious activity on any one of those accounts Immediately report any suspicious credit or loan account activity – no matter how remote the suspicion to the credit union Create a password/passcode on your account Set lower daily dollar limits on your accounts Watch your transaction activity daily Sign up for alert notifications on your card transactions and any other account transactions if available Sign up for the fraud alerting services offered by the three credit bureaus to receive notifications about potentially fraudulent activity Sign up for free credit monitoring services, to monitor and report unauthorized activity  16

Best Practice Fraud Strategies Well developed and integrated risk management Balance appetite for risk Evaluate the threat landscape to prioritize a treatment strategy Don’t buy into a “one-size fits all” approach to security Commitment to make tough choices Forward looking strategy 17

Best Practice Fraud Strategies 18

Fraud Mitigation Strategies are Key! Education, Education, Education – consumers and staff Enterprise risk management strategies – big picture view Continue to monitor all accounts across all types of activity If you suspect an attack, act fast Balance consumer service with risk appetite Authentication layers is a must Invest in technology Work together with risk-conscious vendors Don’t let your guard down, stay tuned in 19

Time for Questions Ann D. Davidson Vice President of Risk Consulting 608.250.9617 ann.davidson@alliedsolutions.net 20

We look forward to helping you grow, protect and evolve. alliedsolutions.net 800.826.9384 © 2018 Allied Solutions, LLC. This communication is proprietary and confidential and is provided for informational purposes only. You are prohibited from disclosing this communication to any third party or using it for any purpose without the express written consent of Allied Solutions, LLC.