First Community Bank www.fcbnm.com Prevx Safe Online Rollout & Best Practice Presentation.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Account HIGHJACKING & IDENTITY THEFT GPCE Credit Union has prepared a slide show presentation to examine the most prevalent financial crimes at work today.
Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Corporate Account Takeover & Information Security Awareness PRESENTATION FOR BANK CUSTOMERS.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Threats To A Computer Network
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Free Software Alternatives: Avast! Anti-virus
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Norman Endpoint Protection Advanced security made easy.
Quiz Review.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
Commercial eSecurity Training and Awareness. Common Online Threats Most electronic fraud falls into one of three categories:  PHISHING – Fraudulent s.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Supplied on \web site. on January 10 th, 2008 Reducing Risk Through Incremental Malware Detection January 2008.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
What is Spam? d min.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Internet safety By Suman Nazir
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Corporate Account Takeover & Information Security Awareness.
Mobile Money 1/37 Fiserv Mobile Money Staff Education © 2010 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. All trademarks.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Managing Windows Security
    Customer Profile: If you have tech savvy customers, having your site secured for mobile users is recommended. Business Needs: With the growing number.
Unit 4 IT Security.
ISYM 540 Current Topics in Information System Management
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Information Security Session October 24, 2005
Staying safe on the internet
HOW DO I KEEP MY COMPUTER SAFE?
Security in mobile technologies
Wireless Spoofing Attacks on Mobile Devices
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Presentation transcript:

First Community Bank Prevx Safe Online Rollout & Best Practice Presentation

Given the increasing cyber threats and Trojans that specifically target business on-line bank accounts, we at First Community Bank looked for some options to offer customers to help protect their on-line banking sessions. In the recent past, we've had a few customers infected with the Zeus or related Trojans, which led to some attempted ACH fraud. We found a vendor that offered a product that helps protect users when they log into a web site such as on-line banking. The vendor is Prevx. The product we are offering is Prevx 'SafeOnline'. We went live 2/22/2010 with this offering. This software is offered for free to our customers. It provides protection of the on-line sessions as well as some anti-virus like scanning. It protects from the key board thru the browser to the website. The vendor advertises it as still protecting the on-line banking sessions even if the PC is infected. Note - The free version will scan for viruses, but will not remove the viruses. A user can upgrade to a full version that removes the infections for a nominal annual fee. This software is compatible with other security products and anti- virus software

Internet Fraud – What is it?  Viruses, Trojans, malicious software growing and spreading rapidly  Allows unauthorized electronic access to customer accounts - Able to defeat two factor authentication  Scams – Phishing, Spoofing  Impact to date – estimated at $40 million transferred out of US in 2009, primarily to Eastern Europe  Impacts ACH, Wire Transfer, Auto transfers, Bill Pay, and check fraud

Can we stop Internet Fraud? Education of customers Customer security procedures – Dual control – Prohibit password sharing – Policy regarding internet access and unauthorized – Confirm communications with the bank via or phone – Communicate personal changes to bank immediately Verify account balances daily Immediately report unusual activity Dedicated PC for on-line activity

Is there risk for an individual as well? Yes, phishing and spoofing scams are not limited to businesses. These criminals are attempting to move as many dollars as possible and in many cases individuals are an easy target Do not open s from unknown sources Keep your PC’s operating system up-to-date with all of the current patches from Microsoft Install and keep current your virus protection software Set-up multiple users on your personal computer that do not have complete administrative rights. All of the current viruses require a software program to be downloaded and installed on your computer, without administrative rights the user cannot complete the task and the software cannot be activated.

Customer Experience - Start Step 1: Customer views the First Community Bank information webpage, accesses the Prevx landing page for more information and downloads Prevx SafeOnline First Community Bank information webpage

Customer Experience – plus 15secs All HTTPS websites First Community bank HTTP websites All social networking websites Step 2: Customer accepts EULA and they are instantly protected

MI Reporting – 7 days plus Step 3: Prevx provide detailed reports on First Community Bank customers using Prevx SafeOnline Downloads Infected PCs PC state Existing security software Blocked websites 7

Summary Report: This was provided to the Bank over 2 week period after rollout: 21 downloads to date 19 PCs seen since launch No support requests to date 7 PCs have been seen that were infected 4 PCs now clean were infected with: Adware Malicious software Cloaked malware Fraudulent security program (Vundo, typically used to deliver fraudulent AV software) Spyware 3 PCs still infected No access to blocked URLs 3 PCs upgraded to Prevx 3.0

Customer Experience – 7 days plus Step 4: Security review advises customer of recommended actions 7+

Prevx SafeOnline Protecting the Customer

Blocking Online Scams Prevx SafeOnline identifying and blocking a phishing attack. 1) 2)

Hijacked Internet Connectivity Prevx SafeOnline blocks any attempt to direct a user to an unauthorised IP address:

Visit thewww.fcbnm.com First Community Bank Website  Current linkage to the our Fraud information  PrevX link:

Questions- Call Prevx Garry Scott-Savage Work: (630) Cell: (630)