Scanning the Internet for External Cloud Exposures via SSL Certs
Impact of Telecome on Financial Institites
1. Impact of Telecom on
Financial Institute
• Alok Prakash
• Ashwini Gangala
• Hrishikesh Mundhe
• Roman Rathod
• Shristi T
• Shweta
2. Financial Institutions
Reserve Bank of India
Commercial Banks in India
Securities and
Exchange Board of
India
Insurance Companies
in India
Credit Rating
Agencies in India
Specialized Financial
Institutions in India
12. • Telecom audit to eliminate waste
• Financial Institutions like banks , Insurance companies
etc can examine existing invoices and equipment
records. The gap between actual usage and payment can
be found out. Hence , reducing telecom waste within
organization and cut it for good.
13. Customized Solutions :
• Allows you to keep all your existing careers (such as
bell, telus and Allstream), but send you a single
invoice for all services.
• Enable all your telecom invoices to be sent to one
location, multiple locations or whatever needed.
• Interconnect offices with latest type of Fiber
connections for faster file and data sharing.
• Eliminate the costs associated with Long Distance
between all your locations
14. SERVICES OFFERED
Voice Services
• Business Lines
• SIP truncking
• Long Distance
• PRI
• Toll-Free & Inbound Long Distance
• E fax
• Calling cards
• Centex
• Xcell Mobile
• Phone Installation services
Internet Services
• ADSL High-Speed
• T1
Dry Loop
• E10/E100
• OC3
• Dial-up
Data Services
• Switched Ethernet Private
Lines
• SIP trunking
• MPLS
• IP VPN
• Digital Private Line
16. AGENT DRIVEN FRAUD
• Imposition of unauthorized customer charges
• Unauthorized use of customer’s transaction
code
• Unauthorized access to customers’ transaction
PINs
• Parallel money transfer on the network
• Money laundering on mobile financial service
platform
• Registration of non-existent/fake consumers
• Instant Commission Fraud
17. BUSINESS/SYSTEM DRIVEN FRAUD
• Employees and fraudsters link wrong
mobile numbers to bank accounts
• Illegal reversal of customer payments
to the business
• Abuse of passwords
• Individual users with multiple rights
• Fraud on multiple access channel