SlideShare una empresa de Scribd logo
1 de 20
Corporate
Customer
Awareness and
Education
What can you do to protect yourself?
 • Dual Control
   o Assign one user with the authority to create a transaction and
   choose a different user to actually submit / approve the transaction.
What can you do to protect yourself?
 • Tokens
   o An additional security feature is in the form of a small, hand held
   device that provides a unique password with each touch of the button.
   1st Mariner Bank utilizes tokens provided by VASCO (DigiPass 260
   Whitesheet.pdf).
What can you do to protect yourself?
 • Multi-Factor Authentication
   o Some online applications require more than one layer of
   authentication before allowing the user access. For example, entering
   a user name and password is one layer of authentication. A second
   layer would be the requirement that you register your computer during
   the initial log-in. If you sign-on from a different computer, you will be
   asked challenge questions before being allowed to continue.

             Challenge Questions:

             In what city were you born?
             What is your favorite color?
What can you do to protect yourself?
 • Multi-Factor Authentication
   o Another example is the image and phrase that shows up on the
   password screen once you enter your user name. If the image and
   phrase match, you have landed on the page that you intended. If
   not, you should not enter your password. Multi-factor authentication
   – Wikipedia, the free encyclopedia.mht.




                             My Pet Name
What can you do to protect yourself?
 • Dedicated Workstation
   o Designate a specific workstation as the “Banking Workstation” and
   limit its use to only banking business. This workstation should not be
   used for web browsing.
What can you do to protect yourself?
 • Monitor and Balance Your Account Daily
   o You are the first line of defense against fraudulent activity on your
   accounts. Make it a practice to log onto your bank’s website daily
   and review your accounts. Pay special attention to suspicious or
   unexplained transactions.
What can you do to protect yourself?
 • Always Update Workstations w/ Latest
 Anti-Virus Software
   o Advances in technology happen at lightning speed as do the number
   of ways someone can wreak havoc on your accounts and computers.
   Make sure your anti-virus software and patches are up to date.
Who can you call to report an issue or
ask a question?
 Heather Adams hsadams@1stmarinerbank.com 410-558-4223

 Elizabeth Sherman esherman@1stmarinerbank.com 410-558-3341

 Cash Management Service Line CashManagement@1stmarinerbank.com
 410-735-2003
What are some ways you can mitigate
your own risk for cyber attacks?
• Positive Pay: Ensure that only the checks YOU write are being cashed.
o Positive Pay was created to help prevent fraud on business checking
accounts. As checks are issued, the payee name, check number, date and
amount are entered in an online banking application. As those checks clear
through the bank, they are matched up against information entered by the
customer. If there are any discrepancies between the actual check and the
information entered, the check is considered as an “exception item” and the
customer is notified through the online banking application. This notification
allows the customer to decide whether to pay or return the potentially
fraudulent item.
What are some ways you can mitigate your
own risk for cyber attacks?
• Do Not Share Your Passwords
 o Never share your password with anyone! Anything that happens
 under your log-in is automatically your responsibility.
 o If one employee leaves and another is hired, be sure to terminate the
 departing employee’s access and assign a new user ID for the new
 employee.
 o Always contact Cash Management when an employee, who had
 access to 1st Online, leaves your employ. The Cash Management
 Department has the ability to block, delete and add users at your
 discretion.
What are some ways you can mitigate your
own risk for cyber attacks?
• Change Passwords

  o Institute the practice of changing passwords every 30 – 90 days.
What are some ways you can mitigate your
own risk for cyber attacks?
• Require Minimum Length and Complexity of
Passwords
 o You should require passwords be a minimum length of 6
 characters and should be alpha-numeric.


            Example Password = Ay3bcSe!


 o Don’t write down your password and leave it in your unlocked desk
 drawer.
What are some ways you can mitigate your
own risk for cyber attacks?
• Always lock workstations if leaving them attended.
 o Locking workstations will prohibit unauthorized users from gaining access to
 programs on YOUR workstation when you are not around.



         ALT                   CTRL                   Delete




      Press Alt Ctrl Del and then press ENTER to lock your workstation.
What are some ways you can mitigate your
own risk for cyber attacks?
• Always log out of internet sites that you visit.
  o Don’t just “X” out of the web browser screen when leaving an internet site.
  In most instances, the site will still “show” you as logged in, leaving the
  possibility for a non-authorized user accessing the information.
What are some ways you can mitigate your
own risk for cyber attacks?
• Never download unauthorized shareware
programs or files without authorization.
 o Never download programs without first verifying the validity of the
 information.
What are some ways you can mitigate your
own risk for cyber attacks?
• E-mails are like postcards. ANYONE CAN READ THEM!!!
 o Do not e-mail proprietary information without encrypting software.
When will the Bank contact you requesting log-
in or account information?
• NEVER!!!!!!
 o 1st Mariner Bank will NEVER call you requesting your online banking
 log-in information or your account numbers. If you receive unsolicited
 calls requesting this information, hang-up and contact the Bank
 immediately.
When is it a good time to perform a “risk-
assessment” of your company’s security?

 o Why not right now?? The link below is a simple questionnaire, containing
 10 questions to help determine the adequacy of your company’s security. Risk
 Assessment – WHAT ARE YOU DOING TO MITIGATE THE RISKS TO YOUR
 BUSINESS.docx
If you have any questions or concerns, please
contact _________________

Más contenido relacionado

Destacado

Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
Symantec
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
Arrow ECS UK
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
IAEME Publication
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Symantec
 

Destacado (8)

Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Security Metrics
Security MetricsSecurity Metrics
Security Metrics
 
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
 

Similar a Ffiec presentation

Similar a Ffiec presentation (20)

Internet Banking by Chethan Raju
Internet Banking by Chethan RajuInternet Banking by Chethan Raju
Internet Banking by Chethan Raju
 
Internet banking - College Project
Internet banking - College ProjectInternet banking - College Project
Internet banking - College Project
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Online banking
Online bankingOnline banking
Online banking
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
internet banking
internet banking internet banking
internet banking
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentation
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & Safety
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
Chris bowser reviews about protecting e commerce store against fraudulent act...
Chris bowser reviews about protecting e commerce store against fraudulent act...Chris bowser reviews about protecting e commerce store against fraudulent act...
Chris bowser reviews about protecting e commerce store against fraudulent act...
 
Internet banking
Internet bankingInternet banking
Internet banking
 
E-banking FOR CLASS 10 students
E-banking FOR CLASS 10 studentsE-banking FOR CLASS 10 students
E-banking FOR CLASS 10 students
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
Internet Phishing
Internet PhishingInternet Phishing
Internet Phishing
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 

Último

Call Girls in Yamuna Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Yamuna Vihar  (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Yamuna Vihar  (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Yamuna Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

Technology industry / Finnish economic outlook
Technology industry / Finnish economic outlookTechnology industry / Finnish economic outlook
Technology industry / Finnish economic outlook
 
Significant AI Trends for the Financial Industry in 2024 and How to Utilize Them
Significant AI Trends for the Financial Industry in 2024 and How to Utilize ThemSignificant AI Trends for the Financial Industry in 2024 and How to Utilize Them
Significant AI Trends for the Financial Industry in 2024 and How to Utilize Them
 
Seeman_Fiintouch_LLP_Newsletter_May-2024.pdf
Seeman_Fiintouch_LLP_Newsletter_May-2024.pdfSeeman_Fiintouch_LLP_Newsletter_May-2024.pdf
Seeman_Fiintouch_LLP_Newsletter_May-2024.pdf
 
Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech Belgium
 
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
 
CBD Belapur((Thane)) Charming Call Girls📞❤9833754194 Kamothe Beautiful Call G...
CBD Belapur((Thane)) Charming Call Girls📞❤9833754194 Kamothe Beautiful Call G...CBD Belapur((Thane)) Charming Call Girls📞❤9833754194 Kamothe Beautiful Call G...
CBD Belapur((Thane)) Charming Call Girls📞❤9833754194 Kamothe Beautiful Call G...
 
Fixed exchange rate and flexible exchange rate.pptx
Fixed exchange rate and flexible exchange rate.pptxFixed exchange rate and flexible exchange rate.pptx
Fixed exchange rate and flexible exchange rate.pptx
 
7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options
 
In Sharjah ௵(+971)558539980 *_௵abortion pills now available.
In Sharjah ௵(+971)558539980 *_௵abortion pills now available.In Sharjah ௵(+971)558539980 *_௵abortion pills now available.
In Sharjah ௵(+971)558539980 *_௵abortion pills now available.
 
Strategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate PresentationStrategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate Presentation
 
Toronto dominion bank investor presentation.pdf
Toronto dominion bank investor presentation.pdfToronto dominion bank investor presentation.pdf
Toronto dominion bank investor presentation.pdf
 
Virar Best Sex Call Girls Number-📞📞9833754194-Poorbi Nalasopara Housewife Cal...
Virar Best Sex Call Girls Number-📞📞9833754194-Poorbi Nalasopara Housewife Cal...Virar Best Sex Call Girls Number-📞📞9833754194-Poorbi Nalasopara Housewife Cal...
Virar Best Sex Call Girls Number-📞📞9833754194-Poorbi Nalasopara Housewife Cal...
 
Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
logistics industry development power point ppt.pdf
logistics industry development power point ppt.pdflogistics industry development power point ppt.pdf
logistics industry development power point ppt.pdf
 
Pension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdfPension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdf
 
Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...
Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...
Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...
 
Benefits & Risk Of Stock Loans
Benefits & Risk Of Stock LoansBenefits & Risk Of Stock Loans
Benefits & Risk Of Stock Loans
 
Call Girls in Yamuna Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Yamuna Vihar  (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Yamuna Vihar  (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Yamuna Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
 
Q1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdfQ1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdf
 

Ffiec presentation

  • 2. What can you do to protect yourself? • Dual Control o Assign one user with the authority to create a transaction and choose a different user to actually submit / approve the transaction.
  • 3. What can you do to protect yourself? • Tokens o An additional security feature is in the form of a small, hand held device that provides a unique password with each touch of the button. 1st Mariner Bank utilizes tokens provided by VASCO (DigiPass 260 Whitesheet.pdf).
  • 4. What can you do to protect yourself? • Multi-Factor Authentication o Some online applications require more than one layer of authentication before allowing the user access. For example, entering a user name and password is one layer of authentication. A second layer would be the requirement that you register your computer during the initial log-in. If you sign-on from a different computer, you will be asked challenge questions before being allowed to continue. Challenge Questions: In what city were you born? What is your favorite color?
  • 5. What can you do to protect yourself? • Multi-Factor Authentication o Another example is the image and phrase that shows up on the password screen once you enter your user name. If the image and phrase match, you have landed on the page that you intended. If not, you should not enter your password. Multi-factor authentication – Wikipedia, the free encyclopedia.mht. My Pet Name
  • 6. What can you do to protect yourself? • Dedicated Workstation o Designate a specific workstation as the “Banking Workstation” and limit its use to only banking business. This workstation should not be used for web browsing.
  • 7. What can you do to protect yourself? • Monitor and Balance Your Account Daily o You are the first line of defense against fraudulent activity on your accounts. Make it a practice to log onto your bank’s website daily and review your accounts. Pay special attention to suspicious or unexplained transactions.
  • 8. What can you do to protect yourself? • Always Update Workstations w/ Latest Anti-Virus Software o Advances in technology happen at lightning speed as do the number of ways someone can wreak havoc on your accounts and computers. Make sure your anti-virus software and patches are up to date.
  • 9. Who can you call to report an issue or ask a question? Heather Adams hsadams@1stmarinerbank.com 410-558-4223 Elizabeth Sherman esherman@1stmarinerbank.com 410-558-3341 Cash Management Service Line CashManagement@1stmarinerbank.com 410-735-2003
  • 10. What are some ways you can mitigate your own risk for cyber attacks? • Positive Pay: Ensure that only the checks YOU write are being cashed. o Positive Pay was created to help prevent fraud on business checking accounts. As checks are issued, the payee name, check number, date and amount are entered in an online banking application. As those checks clear through the bank, they are matched up against information entered by the customer. If there are any discrepancies between the actual check and the information entered, the check is considered as an “exception item” and the customer is notified through the online banking application. This notification allows the customer to decide whether to pay or return the potentially fraudulent item.
  • 11. What are some ways you can mitigate your own risk for cyber attacks? • Do Not Share Your Passwords o Never share your password with anyone! Anything that happens under your log-in is automatically your responsibility. o If one employee leaves and another is hired, be sure to terminate the departing employee’s access and assign a new user ID for the new employee. o Always contact Cash Management when an employee, who had access to 1st Online, leaves your employ. The Cash Management Department has the ability to block, delete and add users at your discretion.
  • 12. What are some ways you can mitigate your own risk for cyber attacks? • Change Passwords o Institute the practice of changing passwords every 30 – 90 days.
  • 13. What are some ways you can mitigate your own risk for cyber attacks? • Require Minimum Length and Complexity of Passwords o You should require passwords be a minimum length of 6 characters and should be alpha-numeric. Example Password = Ay3bcSe! o Don’t write down your password and leave it in your unlocked desk drawer.
  • 14. What are some ways you can mitigate your own risk for cyber attacks? • Always lock workstations if leaving them attended. o Locking workstations will prohibit unauthorized users from gaining access to programs on YOUR workstation when you are not around. ALT CTRL Delete Press Alt Ctrl Del and then press ENTER to lock your workstation.
  • 15. What are some ways you can mitigate your own risk for cyber attacks? • Always log out of internet sites that you visit. o Don’t just “X” out of the web browser screen when leaving an internet site. In most instances, the site will still “show” you as logged in, leaving the possibility for a non-authorized user accessing the information.
  • 16. What are some ways you can mitigate your own risk for cyber attacks? • Never download unauthorized shareware programs or files without authorization. o Never download programs without first verifying the validity of the information.
  • 17. What are some ways you can mitigate your own risk for cyber attacks? • E-mails are like postcards. ANYONE CAN READ THEM!!! o Do not e-mail proprietary information without encrypting software.
  • 18. When will the Bank contact you requesting log- in or account information? • NEVER!!!!!! o 1st Mariner Bank will NEVER call you requesting your online banking log-in information or your account numbers. If you receive unsolicited calls requesting this information, hang-up and contact the Bank immediately.
  • 19. When is it a good time to perform a “risk- assessment” of your company’s security? o Why not right now?? The link below is a simple questionnaire, containing 10 questions to help determine the adequacy of your company’s security. Risk Assessment – WHAT ARE YOU DOING TO MITIGATE THE RISKS TO YOUR BUSINESS.docx
  • 20. If you have any questions or concerns, please contact _________________