Ffiec presentation


Published on

Published in: Economy & Finance, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Ffiec presentation

  1. 1. CorporateCustomerAwareness andEducation
  2. 2. What can you do to protect yourself? • Dual Control o Assign one user with the authority to create a transaction and choose a different user to actually submit / approve the transaction.
  3. 3. What can you do to protect yourself? • Tokens o An additional security feature is in the form of a small, hand held device that provides a unique password with each touch of the button. 1st Mariner Bank utilizes tokens provided by VASCO (DigiPass 260 Whitesheet.pdf).
  4. 4. What can you do to protect yourself? • Multi-Factor Authentication o Some online applications require more than one layer of authentication before allowing the user access. For example, entering a user name and password is one layer of authentication. A second layer would be the requirement that you register your computer during the initial log-in. If you sign-on from a different computer, you will be asked challenge questions before being allowed to continue. Challenge Questions: In what city were you born? What is your favorite color?
  5. 5. What can you do to protect yourself? • Multi-Factor Authentication o Another example is the image and phrase that shows up on the password screen once you enter your user name. If the image and phrase match, you have landed on the page that you intended. If not, you should not enter your password. Multi-factor authentication – Wikipedia, the free encyclopedia.mht. My Pet Name
  6. 6. What can you do to protect yourself? • Dedicated Workstation o Designate a specific workstation as the “Banking Workstation” and limit its use to only banking business. This workstation should not be used for web browsing.
  7. 7. What can you do to protect yourself? • Monitor and Balance Your Account Daily o You are the first line of defense against fraudulent activity on your accounts. Make it a practice to log onto your bank’s website daily and review your accounts. Pay special attention to suspicious or unexplained transactions.
  8. 8. What can you do to protect yourself? • Always Update Workstations w/ Latest Anti-Virus Software o Advances in technology happen at lightning speed as do the number of ways someone can wreak havoc on your accounts and computers. Make sure your anti-virus software and patches are up to date.
  9. 9. Who can you call to report an issue orask a question? Heather Adams hsadams@1stmarinerbank.com 410-558-4223 Elizabeth Sherman esherman@1stmarinerbank.com 410-558-3341 Cash Management Service Line CashManagement@1stmarinerbank.com 410-735-2003
  10. 10. What are some ways you can mitigateyour own risk for cyber attacks?• Positive Pay: Ensure that only the checks YOU write are being cashed.o Positive Pay was created to help prevent fraud on business checkingaccounts. As checks are issued, the payee name, check number, date andamount are entered in an online banking application. As those checks clearthrough the bank, they are matched up against information entered by thecustomer. If there are any discrepancies between the actual check and theinformation entered, the check is considered as an “exception item” and thecustomer is notified through the online banking application. This notificationallows the customer to decide whether to pay or return the potentiallyfraudulent item.
  11. 11. What are some ways you can mitigate yourown risk for cyber attacks?• Do Not Share Your Passwords o Never share your password with anyone! Anything that happens under your log-in is automatically your responsibility. o If one employee leaves and another is hired, be sure to terminate the departing employee’s access and assign a new user ID for the new employee. o Always contact Cash Management when an employee, who had access to 1st Online, leaves your employ. The Cash Management Department has the ability to block, delete and add users at your discretion.
  12. 12. What are some ways you can mitigate yourown risk for cyber attacks?• Change Passwords o Institute the practice of changing passwords every 30 – 90 days.
  13. 13. What are some ways you can mitigate yourown risk for cyber attacks?• Require Minimum Length and Complexity ofPasswords o You should require passwords be a minimum length of 6 characters and should be alpha-numeric. Example Password = Ay3bcSe! o Don’t write down your password and leave it in your unlocked desk drawer.
  14. 14. What are some ways you can mitigate yourown risk for cyber attacks?• Always lock workstations if leaving them attended. o Locking workstations will prohibit unauthorized users from gaining access to programs on YOUR workstation when you are not around. ALT CTRL Delete Press Alt Ctrl Del and then press ENTER to lock your workstation.
  15. 15. What are some ways you can mitigate yourown risk for cyber attacks?• Always log out of internet sites that you visit. o Don’t just “X” out of the web browser screen when leaving an internet site. In most instances, the site will still “show” you as logged in, leaving the possibility for a non-authorized user accessing the information.
  16. 16. What are some ways you can mitigate yourown risk for cyber attacks?• Never download unauthorized sharewareprograms or files without authorization. o Never download programs without first verifying the validity of the information.
  17. 17. What are some ways you can mitigate yourown risk for cyber attacks?• E-mails are like postcards. ANYONE CAN READ THEM!!! o Do not e-mail proprietary information without encrypting software.
  18. 18. When will the Bank contact you requesting log-in or account information?• NEVER!!!!!! o 1st Mariner Bank will NEVER call you requesting your online banking log-in information or your account numbers. If you receive unsolicited calls requesting this information, hang-up and contact the Bank immediately.
  19. 19. When is it a good time to perform a “risk-assessment” of your company’s security? o Why not right now?? The link below is a simple questionnaire, containing 10 questions to help determine the adequacy of your company’s security. Risk Assessment – WHAT ARE YOU DOING TO MITIGATE THE RISKS TO YOUR BUSINESS.docx
  20. 20. If you have any questions or concerns, pleasecontact _________________