CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited © CUNA Mutual Group Top Fraud Trends in 2011 Is Your Credit Union Prepared.

Slides:



Advertisements
Similar presentations
Weighing the Risks and Benefits of Online Financial Transactions
Advertisements

Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Understanding Commercial Card and the use of Controls Louisiana GFOA Fall Conference October 9, 2014 Rhonda C. Engel, SVP Commercial Card Sales Manager.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
Customer Payment Options Mike Connor Manager, Customer Service Bryan Texas Utilities.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
1 Telstra in Confidence Managing Security for our Mobile Technology.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 Pertemuan 6 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Controls for Information Security
Payment Fraud Trends : What Can you do? Protect Yourself and Your Business from Financial Fraud.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Commercial eSecurity Training and Awareness. Common Online Threats Most electronic fraud falls into one of three categories:  PHISHING – Fraudulent s.
Securing Information Systems
1 CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited © CUNA Mutual Group 2010 Alaska Credit Union League Annual Meeting.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
2.2.1.G2 Introduction to Depository Institutions Advanced Level.
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
E-BANKING E-banking is defined as the automated delivery of new and traditional banking products and services directly to customers through electronic,
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Information Assurance Program Manager U.S. Army Europe and Seventh Army Information Assurance in Large-Scale Practice International Scientific NATO PfP/PWP.
Onebeaconpro.com t f Cyber Liability Insurance Coverages and Trends Affecting Community Banks Craig M. Collins President,
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Computer Security By Duncan Hall.
Midsouth User Group Annual Conference
Protecting Your Assets By Preventing Identity Theft 1.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
TAKE CHARGE OF YOUR FINANCES Submitted by- Ankita Pabale WRO ONLINE BANKING.
T O S H I B AT O S H I B A Fraud & Disputes – Know Who You Are Trading With.
Combating Constantly Evolving Advanced Threats – Solution Architecture Mats Aronsson, Nordic Technical Leader Trusteer, IBM Security.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
2.2.1.G2 Introduction to Depository Institutions Advanced Level.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Protecting Your Assets By Preventing Identity Theft
Payment Card Industry (PCI) Rules and Standards
Introduction to Depository Institutions
Critical Security Controls
Introduction to Depository Institutions
Introduction to Depository Institutions
Introduction to Depository Institutions
Securing Information Systems
Introduction to Depository Institutions
Introduction to Depository Institutions
Introduction to Depository Institutions
Introduction to Depository Institutions
Introduction to Depository Institutions
Introduction to Depository Institutions
Introduction to Depository Institutions
Introduction to Depository Institutions
Chip & Pin and Apple Pay: Vulnerabilities of the Changing Payment Systems Jay Isaacson.
Introduction to Depository Institutions
Introduction to Depository Institutions
Anatomy of a Large Scale Attack
Introduction to Depository Institutions
Business Compromise and Cyber Threat
Introduction to Depository Institutions
Introduction to Depository Institutions
Introduction to Depository Institutions
Introduction to Depository Institutions
NCUCA Fraud and Risk Education April 17, 2019
Presentation transcript:

CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited © CUNA Mutual Group Top Fraud Trends in 2011 Is Your Credit Union Prepared to Prevent Today’s Top Fraud Threats? Utah Credit Union Association Volunteers Conference October 22, 2011

2 What’s on the Agenda Today! What are you experiencing or hearing? What are the criminals up to in 2011? What can we do to help minimize the fraud risk exposure? Open for questions

3 Fraud Landscape in 2011 Fraud is not going away! Criminals are organized worldwide Not a matter of “IF”, but “WHEN” you are attacked Identify, assess and measure critical risk Utilize effective controls to manage critical risk

4 What are you experiencing or hearing? Card exposure –Skimming vs breaches Wire attempts –Phone, fax or Insider dealings –Compromise of data/funds System intrusions –Hacking into a electronic device

5 What’s up with the Card Exposure? Data breaches –hackers getting into the systems to capture card information Phishing ( /phone/text) –member’s giving up their information Kiting – business card with a consumer card

6 What’s up with the Card Exposure? Skimming –capturing the magnetic stripe from the legitimate cardholder’s card Card-Not-Present – criminal capturing enough card information to perform a transaction over the phone or on the internet PIN fraud - Goal is cash!

7 Card Prevention Measures Fraud management system CVC, CVC, CV, CID Expiration date matching Daily dollar limits CVV2/CVC2/ Other tools available – must deploy…….. Review losses to see how the criminals are getting in is key!

8 What’s up with Wire Fraud? Finding an easy target Request wire over the phone/fax/ Call forwarding member’s phone number(s) Phishing for member information Large wire request (excess of $10,000.)

9 Action Steps to help Combat Wire Fraud Consider only face-to-face wire request Lower outgoing $ amount for wire request not requested in person Create a wire transfer agreement form with each member requesting a wire – signed by both the member and authorized cu employee. –Create a password/passcode with the member as one layer of verification in the agreement form –Create challenge questions with the member in the agreement form –Capture cell, home and work numbers to call back to validate with the member

10 System Intrusions The hunt for the hackers hijacking the net How to protect yourself Scans the internet for vulnerable server or host computers Breaks into the weak computers – stashes a “slave” software program and awaits instructions to begin the attack 2011 is the year of cyber vandals….. –Difficult to nab –Assaults from anywhere in the world –Uses multiple computers to cover their tracks

11 Action Steps to help Combat System Intrusions Use antivirus software and update it often Use a hard to guess password – contains a mix of numbers and letters – longer the password the harder to compromise Use different passwords for different websites and applications to keep hackers guessing Install firewall software to screen traffic Don’t open attachments unless you know the source Utilize a dedicated computer for the incoming/outgoing of funds by the credit union

12 ACH – Account Takeovers Hacker gets into the home banking/bill payment system Initiates an outgoing ACH-Credit from the cu’s account or a business member’s account ACH-Credit is sent to another Financial Institution (Receiving Depository Financial Institution) Member comes into the receiving financial institution and withdrawals the funds (this may involve 25+ RDFI’s) Member wires the funds from Western Union per the instructions and keeps a % of the funds

13 Action Steps to help Combat ACH-Credit Fraud Confirm all of the proper firewalls and system intrusion software is in place and working effectively to prevent entry Utilize multi-factor and additional sign-on layers for your members If the cu is not acting as an ODFI and not initiating ACH-credits-block this type of capability Set transaction and file dollar limits Utilize an ACH agreement form outlining the commercially reasonable security measures to be used prior to initiating the outgoing ACH- credit

14 Emerging Risk Exposures Exposure Cross-channel threats Prevention Cross-channel fraud detection –Monitor activity Online banking Bill payment Mobile payments Cards ACH Wires Loan payments Deposits –ATM –Over the counter –Remote deposit capture –Manage at a “member level”

15 Rethink Approach to Managing Fraud Risk New products New services New channels Opens the opportunity for members But also opens the opportunity for fraud –Fraud rings exploit any vulnerabilities they can find!

16 Enterprise Fraud Strategy Spot fraud early Requires solid organizational infrastructure to support efforts Coordinates fraud detection and interdiction efforts across the entire enterprise Identify all sources –Tomorrow’s threats as well as today’s

17 Enterprise Fraud Management – The Vision Establish a framework for enterprise wide deployment of fraud resources: –Gather and cross-match fraud-relevant data from all product lines, organizational units and geographic regions of the enterprise –Analyze the data……connect the dots……spot large-scale fraud attacks early in their life cycle

18 Enterprise Fraud Management – The Vision –Prioritize alerts based on the level of risk that they pose to the entire enterprise –Plan and execute focused countermeasures to combat large-scale attacks –Develop and support highly skilled and motivated fraud teams to carry out task quickly and efficiently

19 Thank you for working together in 2011 to manage risk! Questions? Ann Davidson CUNA Mutual Group Senior Consultant, Risk Management

20