SlideShare a Scribd company logo
1 of 23
CORPORATE ACCOUNT TAKEOVER (CATO)
Protecting your accounts from Cyber Criminals
CORPORATE ACCOUNT TAKEOVER (CATO)
• Preparing for CATO (What this presentation
covers)
– What is CATO?
– How does it work?
– Where do the attacks come from?
– How do you know if your computer is compromised?
– How should you respond?
– How do you protect yourself from cyber attacks?
CORPORATE ACCOUNT TAKEOVER (CATO)
• What is CATO?
– An evolving electronic crime
– Typically exploits businesses of all sizes
– Companies with limited to no computer safeguards
– Companies with minimal or no disbursement for
controls with online banking accounts
CORPORATE ACCOUNT TAKEOVER (CATO)
• How does it work?
– Criminals are after money
– Emails with infected links (phishing) or infected
websites
– Victim clicks on the infected website or a link in the
email
– Criminals will monitor infected computers for days,
weeks, and even months
CORPORATE ACCOUNT TAKEOVER (CATO)
• How does it work?
– Criminals watch victims log on to Online Banking
– When the time is right, the criminals hijack the
computer
• Most attacks occur before a holiday
• After hours
• After a token is used, hijack the session, and return a
message
CORPORATE ACCOUNT TAKEOVER (CATO)
• Where do the attacks come from?
– Top 3 Countries accounted for 71% of attacks
1. China – 43%
2. Indonesia – 15%
3. United States – 13%
– Rest of the world accounted for 29% of attacks
*Source: Daily Mail (http://www.dailymail.co.uk/sciencetech/article-2779734/China-internet-attack-capital-world-Almost-
HALF-hacks-viruses-originate-country.html)
CORPORATE ACCOUNT TAKEOVER (CATO)
*Source: Daily Mail (http://www.dailymail.co.uk/sciencetech/article-2779734/China-internet-attack-capital-world-
Almost-HALF-hacks-viruses-originate-country.html)
CORPORATE ACCOUNT TAKEOVER (CATO)
• Which industries are most targeted? Q1 2015
1. Gaming – 35%
2. Software and technology – 25%
3. Internet and telecom – 14%
4. Financial services – 8.4%
5. Media and entertainment – 7.5%
6. Education – 5%
7. Retail and consumer goods – 2.3%
8. Public sector – 2%
*Source: Akami Technologies. "The State of the Internet"
CORPORATE ACCOUNT TAKEOVER (CATO)
0.0% 5.0% 10.0% 15.0% 20.0% 25.0% 30.0% 35.0% 40.0%
Gaming
Software and Technology
Internet and Telecom
Financial Services
Media and Entertainment
Education
Retail and Consumer Goods
Public Sector
Percentage Attacks
Target Industries
Attacks
*Source: Akami Technologies. "The State of the Internet"
CORPORATE ACCOUNT TAKEOVER (CATO)
• What forms do attacks come in?
– Malware
– Phishing
– Malicious websites (this includes social networks)
– P2P Downloads
– Ads from popular websites
CORPORATE ACCOUNT TAKEOVER (CATO)
Examples of Malware
CORPORATE ACCOUNT TAKEOVER (CATO)
Examples of Phishing
• Suspicious emails containing
infected attachments
CORPORATE ACCOUNT TAKEOVER (CATO)
• How do you know if your computer is
compromised?
1. Inability to log into online banking (thieves could be blocking access
so that you would not see the theft until the criminal has control of
the money).
2. Sudden and dramatic loss of computer speed.
3. Changes in the way things appear on the screen.
4. Computer locks up so the user is unable to perform any functions.
5. Unexpected rebooting or restarting of computer.
CORPORATE ACCOUNT TAKEOVER (CATO)
• How do you know if your computer is
compromised?
6. Unexpected request for a one-time password (or token) in the
middle of an online session.
7. Unusual pop-up messages, especially a message in the middle of a
session that says the connection to the bank system is not working
(system unavailable, down for maintenance, etc.).
8. New or unexpected toolbars and/or icons.
9. Inability to shut down or restart the computer.
CORPORATE ACCOUNT TAKEOVER (CATO)
• How do you protect yourself from cyber attacks?
• Preparation and education are key
• Train your employees
• Secure computers and networks
• Limit administrative rights
• Enable spam filters
• Be careful on the Internet
CORPORATE ACCOUNT TAKEOVER (CATO)
• How do you protect yourself from cyber attacks?
• Allow security patches
– Adobe, Java, etc.
• Prevent pop-ups
• Do not open attachments from suspicious emails
• Reconcile accounts daily
• Note changes in computer performance
CORPORATE ACCOUNT TAKEOVER (CATO)
• How do you protect yourself from cyber attacks?
• Develop an incidence response plan
– Know who to involve
– Create a central point of contact or leadership team
» Must have authority to act
» Should be at the highest level in executive management (or
have full backing of executive management)
CORPORATE ACCOUNT TAKEOVER (CATO)
• How do you protect yourself from cyber attacks?
• Develop an incidence response plan (continued)
– Create a central point of contact or leadership team
» Have pre-established contacts for:
• financial institutions, law enforcement, third-party technical
support, and legal support
» Control physical access to computers and network components
» Log and report the sequence of events or incidents
» Preserve all evidence and maintain a chain-of-custody
CORPORATE ACCOUNT TAKEOVER (CATO)
• How do you protect yourself from cyber attacks?
• Trace evidence provides help to forensic teams
– Install a strong log-management program
• Prevention
– Firewalls
– Data-loss prevention systems
– Intrusion detection systems
– Access control lists
– Anti-virus and malware protection
CORPORATE ACCOUNT TAKEOVER (CATO)
• How should you respond?
– Immediate Steps to limit further unauthorized transactions
1. Initiate incidence response plan
2. Contact financial institution (FI) immediately
a) Have a prepared list of key FI employees to contact
3. Change password(s)
4. Disconnect computers used for Internet banking
5. Request temporary hold on all other transactions
6. Contact local law enforcement
a) Specifically the Cyber Crime units of local law enforcement
7. Contact state and federal agencies if necessary
CORPORATE ACCOUNT TAKEOVER (CATO)
• How should you respond?
– Secondary Steps
1. Contact your insurance carrier
2. Contact legal counsel
3. Hire a third-party forensic company
CORPORATE ACCOUNT TAKEOVER (CATO)
• Final thoughts
– Stay up to date with the latest best-practices
– Be cautious of emails from unknown senders,
pop-ups, etc.
– Invest in cyber security
– Ask questions
CORPORATE ACCOUNT TAKEOVER (CATO)
Questions?

More Related Content

What's hot

Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threatsourav newatia
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing AttacksJagan Mohan
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation AniketPandit18
 
The Quiet Rise of Account Takeover
The Quiet Rise of Account TakeoverThe Quiet Rise of Account Takeover
The Quiet Rise of Account TakeoverIMMUNIO
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking pptKrishma Sandesra
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
Risks of E-commerce
Risks of E-commerceRisks of E-commerce
Risks of E-commerceanshutomar6
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniquesSushil Kumar
 

What's hot (20)

Phishing Incident Response Playbook
Phishing Incident Response PlaybookPhishing Incident Response Playbook
Phishing Incident Response Playbook
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Phishing
PhishingPhishing
Phishing
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Phishing
PhishingPhishing
Phishing
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
 
The Quiet Rise of Account Takeover
The Quiet Rise of Account TakeoverThe Quiet Rise of Account Takeover
The Quiet Rise of Account Takeover
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Ransomware
RansomwareRansomware
Ransomware
 
Phishing
PhishingPhishing
Phishing
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Risks of E-commerce
Risks of E-commerceRisks of E-commerce
Risks of E-commerce
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 

Similar to Corporate Account Takeover (CATO)

IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical HackingIRJET Journal
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
CyberSecurity Series Malware slides
CyberSecurity Series Malware slidesCyberSecurity Series Malware slides
CyberSecurity Series Malware slidesJim Kaplan CIA CFE
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Chinatu Uzuegbu
 
Cybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected AgeCybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected Agedlblumen
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From CybercrimeDavid J Rosenthal
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessGreg Wartes, MCP
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4TEKMONKS
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4Rohit Kapoor
 
INFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityINFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityJoel Cardella
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftCase IQ
 
Topic #17 IT Security ITSecurityIncidentsA.docx
Topic #17   IT Security ITSecurityIncidentsA.docxTopic #17   IT Security ITSecurityIncidentsA.docx
Topic #17 IT Security ITSecurityIncidentsA.docxjuliennehar
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxprtabal_25
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessImran Khan
 
InformationSecurity.ppt
InformationSecurity.pptInformationSecurity.ppt
InformationSecurity.pptAnshikaGoel42
 

Similar to Corporate Account Takeover (CATO) (20)

Under thehood
Under thehoodUnder thehood
Under thehood
 
ProjectReport_Finalversion
ProjectReport_FinalversionProjectReport_Finalversion
ProjectReport_Finalversion
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
 
File000119
File000119File000119
File000119
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
CyberSecurity Series Malware slides
CyberSecurity Series Malware slidesCyberSecurity Series Malware slides
CyberSecurity Series Malware slides
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Cybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected AgeCybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected Age
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
 
INFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityINFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics security
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data Theft
 
Topic #17 IT Security ITSecurityIncidentsA.docx
Topic #17   IT Security ITSecurityIncidentsA.docxTopic #17   IT Security ITSecurityIncidentsA.docx
Topic #17 IT Security ITSecurityIncidentsA.docx
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
 
InformationSecurity.ppt
InformationSecurity.pptInformationSecurity.ppt
InformationSecurity.ppt
 

Recently uploaded

The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfGale Pooley
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdfAdnet Communications
 
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyInterimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyTyöeläkeyhtiö Elo
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...Suhani Kapoor
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfAdnet Communications
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Delhi Call girls
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex
 
Quarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingQuarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingMaristelaRamos12
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130Suhani Kapoor
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesMarketing847413
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...ssifa0344
 
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | ₹,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free DeliveryPooja Nehwal
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designsegoetzinger
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...Call Girls in Nagpur High Profile
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Pooja Nehwal
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdf
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf
 
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyInterimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdf
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024
 
Quarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingQuarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of Marketing
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast Slides
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
 
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | ₹,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designs
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
 

Corporate Account Takeover (CATO)

  • 1. CORPORATE ACCOUNT TAKEOVER (CATO) Protecting your accounts from Cyber Criminals
  • 2. CORPORATE ACCOUNT TAKEOVER (CATO) • Preparing for CATO (What this presentation covers) – What is CATO? – How does it work? – Where do the attacks come from? – How do you know if your computer is compromised? – How should you respond? – How do you protect yourself from cyber attacks?
  • 3. CORPORATE ACCOUNT TAKEOVER (CATO) • What is CATO? – An evolving electronic crime – Typically exploits businesses of all sizes – Companies with limited to no computer safeguards – Companies with minimal or no disbursement for controls with online banking accounts
  • 4. CORPORATE ACCOUNT TAKEOVER (CATO) • How does it work? – Criminals are after money – Emails with infected links (phishing) or infected websites – Victim clicks on the infected website or a link in the email – Criminals will monitor infected computers for days, weeks, and even months
  • 5. CORPORATE ACCOUNT TAKEOVER (CATO) • How does it work? – Criminals watch victims log on to Online Banking – When the time is right, the criminals hijack the computer • Most attacks occur before a holiday • After hours • After a token is used, hijack the session, and return a message
  • 6. CORPORATE ACCOUNT TAKEOVER (CATO) • Where do the attacks come from? – Top 3 Countries accounted for 71% of attacks 1. China – 43% 2. Indonesia – 15% 3. United States – 13% – Rest of the world accounted for 29% of attacks *Source: Daily Mail (http://www.dailymail.co.uk/sciencetech/article-2779734/China-internet-attack-capital-world-Almost- HALF-hacks-viruses-originate-country.html)
  • 7. CORPORATE ACCOUNT TAKEOVER (CATO) *Source: Daily Mail (http://www.dailymail.co.uk/sciencetech/article-2779734/China-internet-attack-capital-world- Almost-HALF-hacks-viruses-originate-country.html)
  • 8. CORPORATE ACCOUNT TAKEOVER (CATO) • Which industries are most targeted? Q1 2015 1. Gaming – 35% 2. Software and technology – 25% 3. Internet and telecom – 14% 4. Financial services – 8.4% 5. Media and entertainment – 7.5% 6. Education – 5% 7. Retail and consumer goods – 2.3% 8. Public sector – 2% *Source: Akami Technologies. "The State of the Internet"
  • 9. CORPORATE ACCOUNT TAKEOVER (CATO) 0.0% 5.0% 10.0% 15.0% 20.0% 25.0% 30.0% 35.0% 40.0% Gaming Software and Technology Internet and Telecom Financial Services Media and Entertainment Education Retail and Consumer Goods Public Sector Percentage Attacks Target Industries Attacks *Source: Akami Technologies. "The State of the Internet"
  • 10. CORPORATE ACCOUNT TAKEOVER (CATO) • What forms do attacks come in? – Malware – Phishing – Malicious websites (this includes social networks) – P2P Downloads – Ads from popular websites
  • 11. CORPORATE ACCOUNT TAKEOVER (CATO) Examples of Malware
  • 12. CORPORATE ACCOUNT TAKEOVER (CATO) Examples of Phishing • Suspicious emails containing infected attachments
  • 13. CORPORATE ACCOUNT TAKEOVER (CATO) • How do you know if your computer is compromised? 1. Inability to log into online banking (thieves could be blocking access so that you would not see the theft until the criminal has control of the money). 2. Sudden and dramatic loss of computer speed. 3. Changes in the way things appear on the screen. 4. Computer locks up so the user is unable to perform any functions. 5. Unexpected rebooting or restarting of computer.
  • 14. CORPORATE ACCOUNT TAKEOVER (CATO) • How do you know if your computer is compromised? 6. Unexpected request for a one-time password (or token) in the middle of an online session. 7. Unusual pop-up messages, especially a message in the middle of a session that says the connection to the bank system is not working (system unavailable, down for maintenance, etc.). 8. New or unexpected toolbars and/or icons. 9. Inability to shut down or restart the computer.
  • 15. CORPORATE ACCOUNT TAKEOVER (CATO) • How do you protect yourself from cyber attacks? • Preparation and education are key • Train your employees • Secure computers and networks • Limit administrative rights • Enable spam filters • Be careful on the Internet
  • 16. CORPORATE ACCOUNT TAKEOVER (CATO) • How do you protect yourself from cyber attacks? • Allow security patches – Adobe, Java, etc. • Prevent pop-ups • Do not open attachments from suspicious emails • Reconcile accounts daily • Note changes in computer performance
  • 17. CORPORATE ACCOUNT TAKEOVER (CATO) • How do you protect yourself from cyber attacks? • Develop an incidence response plan – Know who to involve – Create a central point of contact or leadership team » Must have authority to act » Should be at the highest level in executive management (or have full backing of executive management)
  • 18. CORPORATE ACCOUNT TAKEOVER (CATO) • How do you protect yourself from cyber attacks? • Develop an incidence response plan (continued) – Create a central point of contact or leadership team » Have pre-established contacts for: • financial institutions, law enforcement, third-party technical support, and legal support » Control physical access to computers and network components » Log and report the sequence of events or incidents » Preserve all evidence and maintain a chain-of-custody
  • 19. CORPORATE ACCOUNT TAKEOVER (CATO) • How do you protect yourself from cyber attacks? • Trace evidence provides help to forensic teams – Install a strong log-management program • Prevention – Firewalls – Data-loss prevention systems – Intrusion detection systems – Access control lists – Anti-virus and malware protection
  • 20. CORPORATE ACCOUNT TAKEOVER (CATO) • How should you respond? – Immediate Steps to limit further unauthorized transactions 1. Initiate incidence response plan 2. Contact financial institution (FI) immediately a) Have a prepared list of key FI employees to contact 3. Change password(s) 4. Disconnect computers used for Internet banking 5. Request temporary hold on all other transactions 6. Contact local law enforcement a) Specifically the Cyber Crime units of local law enforcement 7. Contact state and federal agencies if necessary
  • 21. CORPORATE ACCOUNT TAKEOVER (CATO) • How should you respond? – Secondary Steps 1. Contact your insurance carrier 2. Contact legal counsel 3. Hire a third-party forensic company
  • 22. CORPORATE ACCOUNT TAKEOVER (CATO) • Final thoughts – Stay up to date with the latest best-practices – Be cautious of emails from unknown senders, pop-ups, etc. – Invest in cyber security – Ask questions
  • 23. CORPORATE ACCOUNT TAKEOVER (CATO) Questions?