Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.

Slides:



Advertisements
Similar presentations
Installation & User Guide
Advertisements

Account HIGHJACKING & IDENTITY THEFT GPCE Credit Union has prepared a slide show presentation to examine the most prevalent financial crimes at work today.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Payment Card Industry (PCI) Data Security Standard
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Scams Stevie's Scam School videos
Banking Safely. PIN and Password Selection and Protection Select unique digits (number and letter combinations DO NOT SELECT your birthdate, telephone.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Commercial eSecurity Training and Awareness. Common Online Threats Most electronic fraud falls into one of three categories:  PHISHING – Fraudulent s.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Learning In A Techno World How Safe is Your Cyberspace?
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
1.1 System Performance Security Module 1 Version 5.
Staying Safe Online Keep your Information Secure.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Protecting Your Information Assets
IT security By Tilly Gerlack.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
What is Spam? d min.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Cybersecurity Test Review Introduction to Digital Technology.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Policies and Security for Internet Access
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Corporate Account Takeover & Information Security Awareness.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Managing Money Workshop The National Autistic Society AGM
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Network System Security - Task 2. Russell Johnston.
TECHNOLOGY GUIDE THREE
Protect Your Computer Against Harmful Attacks!
Robert Leonard Information Security Manager Hamilton
Fun gym Cambridge Nationals R001.
Information Security Awareness
HOW DO I KEEP MY COMPUTER SAFE?
Top Ten Cyber Security Hygiene Tips
Chapter 3: Protecting Your Data and Privacy
Presentation transcript:

Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know in order to educate our Online Banking users.

User ID and Password Guidelines Your Logo

Create a “strong” password with at least 8 characters that includes a combination of mixed case letters, numbers, and special characters User ID and Password Guidelines 1 2 Change your password frequently preferably each 60 days. 3 Never share username and password information with anybody. 4 Do not use account numbers, your social security number, or other personal information when create user name and password. 5 Avoid using an automatic login feature that saves usernames and passwords, such as the one below:

Online Banking General Guidelines Your Logo

Do not use public or other unsecured computers for logging into Online Banking or for financial transactions (for example, one at a library or coffee shop). Online Banking General Guidelines 1 2 Review account balances and detail transactions regularly (preferably daily) to confirm payment and other transaction data and immediately report any suspicious transactions to your financial institution. 3 View transfer history available through viewing account activity information. 4 Whenever possible, use Bill Pay instead of checks to limit account number dissemination exposure and to obtain better electronic record keeping 5 Do not use account numbers, your social security number, or other account or personal information when creating account nicknames or other titles. 6 Review historical reporting features of your online banking application on a regular basis to confirm payment and other transaction data. 7 Never leave a computer unattended while using Online Banking. 8 Never conduct banking transactions while multiple browsers are open on your computer. 9 An FBI recommended best practice is to suggest that company users dedicate a PC solely for financial transactions (e.g., no web browsing, s, or social media).

Whenever possible, register the computer you use specifically for Online Banking in order to avoid having to re- send a security code and other authentication information with each login. Online Banking General Guidelines 10

Take advantage of and regularly view system alerts; examples include: −Balance alerts −Transfer alerts −Password change alerts −ACH Alerts (for cash management users) −Wire Alerts (for cash management users) Online Banking General Guidelines 11

Tips to Protect Online Transfers, Payments & Account Data Your Logo

Take advantage of transaction limits. Establish limits for monetary transactions at multiple levels: per transaction, daily, weekly, or monthly limits. (for cash management users) Tips to Protect Online Transfers, Payments & Account Data 1 When you have completed a transaction, ensure you log off to close the connection with the financial organization's computer. 2

Tips to Avoid Phishing, Virus, Spyware and Malware Your Logo

Do not open from unknown sources. Be suspicious of s purporting to be from a financial institution, government department, or other agency requesting account information, account verification, or banking access credentials such as usernames, passwords, PIN codes, and similar information. Opening file attachments or clicking on web links in suspicious s could expose your system to malicious code that could hijack your computer. Tips to Avoid Phishing, Virus, Spyware and Malware 1 Never respond to a suspicious or click on any hyperlink embedded in a suspicious . Call the purported source if you are unsure who sent an 2 If an claiming to be from your financial organization seems suspicious, checking with your financial organization may be appropriate. 3

Install anti-virus and spyware detection software on all computer systems. Free software may not provide protection against the latest threats compared with an industry standard product. Tips to Avoid Phishing, Virus, Spyware and Malware 4 Update your computers regularly with the latest versions and patches of both anti-virus and anti-spyware software. 5

Ensure computers are patched regularly, particularly operating system and key application with security patches. Tips to Avoid Phishing, Virus, Spyware and Malware 6

Install a dedicated, actively managed firewall, especially if using a broadband or dedicated connection to the Internet, such as DSL or cable. A firewall limits the potential for unauthorized access to your network and computers Tips to Avoid Phishing, Virus, Spyware and Malware 8 Check your settings and select, at least, a medium level of security for your browsers. 9

Clear the browser cache before starting an online banking session in order to eliminate copies of Web pages that have been stored on the hard drive. How the cache is cleared depends on the browser and version you are using. Tips to Avoid Phishing, Virus, Spyware and Malware 10

Tips for Wireless Network Management Your Logo

Wireless networks can provide an unintended open door to your business network. Unless a valid reason exists for wireless network use, it is recommended that all wireless networks be disabled. If a wireless network is to be used for legitimate business purposes, it is recommended that wireless networks be secured as follows: Tips for Wireless Network Management 1 Change the wireless network hardware (router /access point) administrative password from the factory default to a complex password. Save the password in a secure location as it will be needed to make future changes to the device. 2 Disable remote administration of the wireless network hardware (router / access point). 3 If possible, disable broadcasting the network SSID. 4 If your device offers WPA encryption, secure your wireless network by enabling WPA encryption of the wireless network. If your device does not support WPA encryption, enable WEP encryption. 5 If only known computers will access the wireless network, consider enabling MAC filtering on the network hardware. Every computer network card is assigned a unique MAC address. MAC filtering will only allow computers with permitted MAC addresses access to the wireless network.

THANK YOU!