1 / 42

Entrepreneurship & Family Business - Complementary Dynamics

Entrepreneurship & Family Business - Complementary Dynamics. 1 st Families in Business Day - November 8, 2013. Fraud Prevention. Keys to Protecting Your Business. Presented by: Amy Mailloux, CTP ACI Vice President, Senior Treasury Advisor KeyBank November 8, 2013.

caron
Download Presentation

Entrepreneurship & Family Business - Complementary Dynamics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Entrepreneurship & Family Business - Complementary Dynamics 1st Families in Business Day - November 8, 2013

  2. Fraud Prevention Keys to Protecting Your Business Presented by: Amy Mailloux, CTP ACI Vice President, Senior Treasury Advisor KeyBank November 8, 2013

  3. “Armed with just a checking account number and a bank routing number, criminals can create checks at whim, experts and law enforcement authorities say.” - Bob Sullivan, a Technology Correspondent for MSNBC May, 2005

  4. Agenda 1. Welcome/Introduction 2. Payments industry fraud threats: Overview 3. Payments industry fraud: A closer look 4. Payments fraud: Knowledge is power 5. Types of fraud and how they originate 6. Types of fraud: Phishing 7. Protect against phishing 8. Types of fraud: Social engineering 9. Protect against social engineering 10. Additional cyber security concerns

  5. 11. Fraud prevention: Opportunities 12. How your bank can help 13. Additional bank resources and solutions 14. Positive Pay plan offerings: A closer look 15. Universal Payment Identification Code (UPIC) 16. Dual approvals, security alerts, and email notifications 17. Debit Blocks/Filters Agenda

  6. Today’s presenter: Amy Mailloux, CTP ACI Vice President, Senior Treasury Advisor KeyBank Amy has experience serving the small business, government, corporate and middle market customers over the past 28 years in banking. She earned the esteemed Certified Treasury Professional designation in 1997, and the Associates in Captive Insurance earlier this year. Her past experience includes relationship management, commercial lending, administration, cash management sales, administration and coaching. For the last couple of years, Amy has served as the Senior Cash Management Advisor for KeyBank working with Business Banking, Middle Markets and Private Banking clients. She is a frequent guest speaker at finance events and regular presenter at the New England conference of the Treasury Management Association on fraud and prevention. Amy and her husband, Ernie, are also the founders and owners of Amy’s Granola, a small specialty food company founded in 2003. They reside in Ferrisburgh, Vermont with their four children. Introduction

  7. Historically: Employee/Customer theft Check-related fraud Present- and future-day: Employee/Customer theft Check-related fraud Electronic transactions (ACH & wire) Cyber crime Payment industry fraud threats: Overview

  8. Norton’s 2011 Cybercrime report estimates that cybercrime costs us $388 billion annually. They claim that cybercrime is approximately $100 billion dollars larger than the global black market in marijuana, cocaine and heroin combined.

  9. Payments industry fraud: A closer look According to the 2013 AFP Payments and Fraud Control Survey: 61% experienced attempted or actual payments fraud 27% reported an increase in the number of fraudulent incidents 87% of affected businesses reported that checks were targeted 29% reported that corporate/commercial purchasing cards were targeted Average loss was $20,300 64% of respondents discussed fraud prevention/security with their bank at least once in 2012

  10. Today’s criminal: Oftentimes belongs to an organized group Stalks their victim and knows how to attack weak points Has access to very sophisticated physical and electronic tools Payments industry fraud: A closer look Fraud Origination Outside individual 80% Organized crime ring 18% Internal party 10% Third-party or outsourcer 5% Account takeover 5% Other 5% Lost or stolen laptop 1% Compromised mobile device <1% Source of Payments Fraud in 2012, as reported in the 2013 AFP Payments Fraud and Control Survey. (Percent of Organizations Subject to Attempted or Actual Payments Fraud)

  11. Payments fraud: Knowledge is power When it comes to preventing fraud, we all must take a proactive stance. In some instances, the ability to identify fraud attempts can help stop them, or mitigate the impact they have. Steps you can take include: Learning about the types of fraud and how they originate Asking questions Invest to protect yourself Educating your employees to be aware of the risks Your defensive toolkit relies on: Detection Identification Deterrence Prevention

  12. Types of fraud and how they originate Corrupt employees Phishing Pharming Fake job listings Fake sweepstakes/lotteries File sharing or Peer-to-Peer software Hacking/Malware

  13. Types of fraud and how they originate Fake job listings Shoulder surfing Janitorial services/Building maintenance Skimming Vishing Reading Radio Frequency Indentification (RFID) Please note: This list is not comprehensive. Criminals are coming up with new and more efficient methods all of the time.

  14. Types of fraud: Phishing What it is: Phishing is a type of Internet fraud that seeks to acquire a user’s credentials by deception. Oftentimes, it involves the theft of passwords, credit card numbers, bank account details, and other personal, confidential information. How it works: Fake notices that appear to be coming from banks, auction sites, e-pay systems, etc. are sent vial email or SMS text messages (Smishing) Recipient is encouraged to urgently enter or update personal data via a false link Messages usually contain threats to block accounts or lose access if request is not completed.

  15. Protect against phishing Don’t open emails from unknown individuals or organizations. Be suspicious of any email with an urgent request for personal financial information. Never click on an embedded link or attachment in an unsolicited email. Avoid filling out forms in email messages that ask for personal financial information. Ensure that your browser is up-to-date and security patches are applied. Run anti-virus software and ensure it’s always updated. If you receive a suspicious email that appears to come from your bank, do not respond to the message. Instead, forward it to your bank’s fraud prevention department then delete the message from your mailbox.

  16. “The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network.” -Kevin Mitnick

  17. Types of fraud: Social engineering What it is: Social engineering is the practice of deceiving someone either in person or via phone or computer, with the express intent of breaching some level of security or obtaining information. How it works: The fraudster, pretending to be a trusted party, may attempt via phone (SMS text message), online (email), or in person to: Secretly install malicious software on your computer Trick you into divulging your passwords or other sensitive financial or personal information Direct you to a website to download something malicious Ask for remote access to your computer

  18. Protect against social engineering Be suspicious of anyone requesting sensitive information. Never provide system credentials or any other personal information on an unsolicited inbound call. Always verify the identity of an unsolicited caller by insisting on calling him or her back at the phone number listed for that company. Remember that Caller ID is not a foolproof way to verify a caller's identity.

  19. Additional cyber security concerns Distributed Denial of Service (DDoS) attacks: Flooding a website with bad requests Attempts to make the site “unavailable” to customers Not hacking, but a way to hide fraud or gain attention for a cause Malicious Websites Visiting an infected website could expose your laptop, PC, or mobile device to malware Designed to hijack your computer According to McAfee, 2.7 million new malicious URLs are created per month

  20. “There is no doubt that the Internet brims with spamming, scamming and identity fraud. Having someone wipe out your hard drive or bank account has never been easier, and the tools for committing electronic mischief on your enemies are cheap and widely accessible.” - Evgeny Morozov

  21. Fraud prevention: Opportunities The numerous ways to help protect your business from fraud include: Deposit accounts/Security features Dual controls Cross-training employees Email encryption Document shredding/destruction Written and published policies and procedures Separation of duties Internal/External escalation process

  22. How your bank can help One key to preventing fraud is to make it difficult for criminals to make you a victim by working with your bank to help ensure you don’t become a victim. Banks offer great products to help stop or reduce fraud loss such as: Robust security controls for online and mobile banking Positive pay systems ACH and EFT filters and filtering Client educational materials on fraud prevention

  23. Your banker can help you with ways to: Always be aware! Evaluate your policies Review your payment types and methods Educate your employees Implement fraud prevention and mitigation solutions

  24. “I am thankful the most important key in history was invented. It’s not the key to your house, your car, your boat, your safety deposit box, your bike lock or your private community. It’s the key to order, sanity and peace of mind. The key is “Delete.” - Elayne Boosler

  25. Additional bank resources and solutions Positive Pay plan offerings Universal Payment Identification Code (UPIC) Transaction blocks (ACH, wire only) features

  26. Mr. Abagnale believes that punishment for fraud and recovery of stolen funds are so rare, prevention is the only viable course of action… - www.abagnale.com

  27. Positive Pay Bank match Client Match aka Reverse Positive Pay

  28. Bank match Positive Pay: Bank match Positive Pay is where the bank matches the checks presented on the client’s account against the check issue information provided by the client upon check issuance: Compare & Verify: Check serial number, Amount, Payee name Same Day Review and make a payment decision prior to check posting Prevent over-funding; for stop payment decisions, the CDA funding requirement may be reduced by the amount of the payment

  29. Bank Match How it works: Suspicious payments are reported to client usually via an on-line website, requiring a client decision to Pay or Return. At setup, you determine the default decision (Pay All or Return All). If no decision is made by the 6:00 p.m. ET deadline, the default decision is submitted. If your default decision is Pay All, and you are unable to make a decision by the 6:00 p.m. ET deadline, those items will be available to decision with Next Day Positive Pay.

  30. Positive Pay plan offerings: A closer look With Client Match Positive Pay aka Reverse Positive Pay, the client matches the information from the checks presented against their Accounts Payable system: No check issue information is presented to the bank prior to encashment Used by companies with lower check volume (less than 1,000 items or $100,000 per month) Access on-line platform to review images of your daily paid items Contact bank to initiate a return of a suspecious or fraudulent check Client must access account daily (preferable early in the day) Daily reconciliation is strongly encouraged

  31. Reverse Positive Pay – extended Bank services How it works: You can designate pre-selected features including dollar amount thresholds. Checks presented over the set dollar amount threshold will be automatically flagged for return.

  32. Check fraud is on the increase…. Use your bank’s Positive Pay or Reverse Positive Pay Maintain tight check security Examine new checks when they arrive and keep check boxes sealed until needed Destroy unused checks from closed accounts Use highly secure check stock Avoid multiple colors and sizes of checks

  33. When laser-printing checks, issue passwords Use check paper with toner anchorage When typing checks, use a type font of 12 points or larger Use a fabric, single-strike security ribbon Reconcile your checking account statement as soon as you receive it Report losses or suspicious checks to your bank immediately Separate responsibilities for handling checks Contact your bank to review your check processes

  34. Universal Payment Identification Code (UPIC) UPICs are secure bank account identifiers that allow companies to receive electronic credit payments without divulging their routing and bank account numbers. Receive more payments electronically while protecting accounts: Since a UPIC is used in place of the client’s actual bank account information, it can be openly shared to promote the receipt of electronic payments (e.g. print on invoices, websites) UPICs keep bank account information private UPICs are used for electronic credit payments only and cannot be used to initiate ACH debits

  35. Universal Payment Identification Code (UPIC) UPICs deliver additional features that: Reduce the risk of unauthorized debits, demand drafts, and fraudulent checks Look and act like bank account numbers allowing the UPIC to be used with any cash management or accounts payable system Apply to a single company bank account, however, one account can have several UPICs Stay with an organization even if they change banking relationships

  36. Dual approvals, security alerts and email notifications Clients are strongly encouraged to set up dual authorization for ACH and wire payments as they; Allow for separation of duties within your department Provide an additional layer of protection from potential external fraud by making it more difficult for fraudsters to send an unauthorized payment Enable entitlements to be customized by user, including settings for dollar thresholds, specific accounts and types of payment (i.e. international, domestic, repetitive, one time, etc.)

  37. Dual approvals, security alerts and email notifications Security alerts and email notifications are also important to set up as they: Alert you when certain activity occurs such as new users being setup, password resets, updating of security questions and changing an email address. In addition, clients can sign up for security-related email notifications for outgoing wire or ACH payments, wires pending approvals or ACH transactions pending release, or Positive Pay items available for decisioning.

  38. On-line management of ACH Debit blocks & filters On-line management gives you the ability to: Decision items online Pay or reject items Add pay authorizations for any future transactions Block all transactions against your checking accounts with a “Block-All” Allow certain transactions within tolerances to be paid (originator, amounts, date range)

  39. “There’s a way of transferring funds that is even faster than electronic banking. It’s called marriage. - author unknown

  40. Questions?

More Related