SlideShare a Scribd company logo
Corporate
Customer
Awareness and
Education
What can you do to protect yourself?
 • Dual Control
   o Assign one user with the authority to create a transaction and
   choose a different user to actually submit / approve the transaction.
What can you do to protect yourself?
 • Tokens
   o An additional security feature is in the form of a small, hand held
   device that provides a unique password with each touch of the button.
   1st Mariner Bank utilizes tokens provided by VASCO (DigiPass 260
   Whitesheet.pdf).
What can you do to protect yourself?
 • Multi-Factor Authentication
   o Some online applications require more than one layer of
   authentication before allowing the user access. For example, entering
   a user name and password is one layer of authentication. A second
   layer would be the requirement that you register your computer during
   the initial log-in. If you sign-on from a different computer, you will be
   asked challenge questions before being allowed to continue.

             Challenge Questions:

             In what city were you born?
             What is your favorite color?
What can you do to protect yourself?
 • Multi-Factor Authentication
   o Another example is the image and phrase that shows up on the
   password screen once you enter your user name. If the image and
   phrase match, you have landed on the page that you intended. If
   not, you should not enter your password. Multi-factor authentication
   – Wikipedia, the free encyclopedia.mht.




                             My Pet Name
What can you do to protect yourself?
 • Dedicated Workstation
   o Designate a specific workstation as the “Banking Workstation” and
   limit its use to only banking business. This workstation should not be
   used for web browsing.
What can you do to protect yourself?
 • Monitor and Balance Your Account Daily
   o You are the first line of defense against fraudulent activity on your
   accounts. Make it a practice to log onto your bank’s website daily
   and review your accounts. Pay special attention to suspicious or
   unexplained transactions.
What can you do to protect yourself?
 • Always Update Workstations w/ Latest
 Anti-Virus Software
   o Advances in technology happen at lightning speed as do the number
   of ways someone can wreak havoc on your accounts and computers.
   Make sure your anti-virus software and patches are up to date.
Who can you call to report an issue or
ask a question?
 Heather Adams hsadams@1stmarinerbank.com 410-558-4223

 Elizabeth Sherman esherman@1stmarinerbank.com 410-558-3341

 Cash Management Service Line CashManagement@1stmarinerbank.com
 410-735-2003
What are some ways you can mitigate
your own risk for cyber attacks?
• Positive Pay: Ensure that only the checks YOU write are being cashed.
o Positive Pay was created to help prevent fraud on business checking
accounts. As checks are issued, the payee name, check number, date and
amount are entered in an online banking application. As those checks clear
through the bank, they are matched up against information entered by the
customer. If there are any discrepancies between the actual check and the
information entered, the check is considered as an “exception item” and the
customer is notified through the online banking application. This notification
allows the customer to decide whether to pay or return the potentially
fraudulent item.
What are some ways you can mitigate your
own risk for cyber attacks?
• Do Not Share Your Passwords
 o Never share your password with anyone! Anything that happens
 under your log-in is automatically your responsibility.
 o If one employee leaves and another is hired, be sure to terminate the
 departing employee’s access and assign a new user ID for the new
 employee.
 o Always contact Cash Management when an employee, who had
 access to 1st Online, leaves your employ. The Cash Management
 Department has the ability to block, delete and add users at your
 discretion.
What are some ways you can mitigate your
own risk for cyber attacks?
• Change Passwords

  o Institute the practice of changing passwords every 30 – 90 days.
What are some ways you can mitigate your
own risk for cyber attacks?
• Require Minimum Length and Complexity of
Passwords
 o You should require passwords be a minimum length of 6
 characters and should be alpha-numeric.


            Example Password = Ay3bcSe!


 o Don’t write down your password and leave it in your unlocked desk
 drawer.
What are some ways you can mitigate your
own risk for cyber attacks?
• Always lock workstations if leaving them attended.
 o Locking workstations will prohibit unauthorized users from gaining access to
 programs on YOUR workstation when you are not around.



         ALT                   CTRL                   Delete




      Press Alt Ctrl Del and then press ENTER to lock your workstation.
What are some ways you can mitigate your
own risk for cyber attacks?
• Always log out of internet sites that you visit.
  o Don’t just “X” out of the web browser screen when leaving an internet site.
  In most instances, the site will still “show” you as logged in, leaving the
  possibility for a non-authorized user accessing the information.
What are some ways you can mitigate your
own risk for cyber attacks?
• Never download unauthorized shareware
programs or files without authorization.
 o Never download programs without first verifying the validity of the
 information.
What are some ways you can mitigate your
own risk for cyber attacks?
• E-mails are like postcards. ANYONE CAN READ THEM!!!
 o Do not e-mail proprietary information without encrypting software.
When will the Bank contact you requesting log-
in or account information?
• NEVER!!!!!!
 o 1st Mariner Bank will NEVER call you requesting your online banking
 log-in information or your account numbers. If you receive unsolicited
 calls requesting this information, hang-up and contact the Bank
 immediately.
When is it a good time to perform a “risk-
assessment” of your company’s security?

 o Why not right now?? The link below is a simple questionnaire, containing
 10 questions to help determine the adequacy of your company’s security. Risk
 Assessment – WHAT ARE YOU DOING TO MITIGATE THE RISKS TO YOUR
 BUSINESS.docx
If you have any questions or concerns, please
contact _________________

More Related Content

Viewers also liked

Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...Symantec
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh WebinarArrow ECS UK
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Adv Prashant Mali
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android applicationIAEME Publication
 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Marco Morana
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Symantec
 

Viewers also liked (8)

Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Security Metrics
Security MetricsSecurity Metrics
Security Metrics
 
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
 

Similar to Ffiec presentation

Internet Banking by Chethan Raju
Internet Banking by Chethan RajuInternet Banking by Chethan Raju
Internet Banking by Chethan Rajuchethu6391
 
Internet banking - College Project
Internet banking - College ProjectInternet banking - College Project
Internet banking - College ProjectSheril Daniel
 
Internet Banking
Internet BankingInternet Banking
Internet Bankingsnehateddy
 
Internet Banking
Internet BankingInternet Banking
Internet Bankingsnehateddy
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfTechSoup
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentationYusuf Qadir
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyAnjan Mahanta
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?Entrance Exam Info
 
Chris bowser reviews about protecting e commerce store against fraudulent act...
Chris bowser reviews about protecting e commerce store against fraudulent act...Chris bowser reviews about protecting e commerce store against fraudulent act...
Chris bowser reviews about protecting e commerce store against fraudulent act...Chris Bowser
 
E-banking FOR CLASS 10 students
E-banking FOR CLASS 10 studentsE-banking FOR CLASS 10 students
E-banking FOR CLASS 10 studentsSartha Gupta
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraudWebSitePulse
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesHuman Resources & Payroll
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayMichele Chubirka
 

Similar to Ffiec presentation (20)

Internet Banking by Chethan Raju
Internet Banking by Chethan RajuInternet Banking by Chethan Raju
Internet Banking by Chethan Raju
 
Internet banking - College Project
Internet banking - College ProjectInternet banking - College Project
Internet banking - College Project
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Online banking
Online bankingOnline banking
Online banking
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
internet banking
internet banking internet banking
internet banking
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentation
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & Safety
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
Chris bowser reviews about protecting e commerce store against fraudulent act...
Chris bowser reviews about protecting e commerce store against fraudulent act...Chris bowser reviews about protecting e commerce store against fraudulent act...
Chris bowser reviews about protecting e commerce store against fraudulent act...
 
Internet banking
Internet bankingInternet banking
Internet banking
 
E-banking FOR CLASS 10 students
E-banking FOR CLASS 10 studentsE-banking FOR CLASS 10 students
E-banking FOR CLASS 10 students
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
Internet Phishing
Internet PhishingInternet Phishing
Internet Phishing
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 

Recently uploaded

Isios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdfIsios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdfHenry Tapper
 
how can i trade pi coins for Bitcoin easily.
how can i trade pi coins for Bitcoin easily.how can i trade pi coins for Bitcoin easily.
how can i trade pi coins for Bitcoin easily.DOT TECH
 
how can I sell my mined pi coins profitabily.
how can I sell my mined pi coins profitabily.how can I sell my mined pi coins profitabily.
how can I sell my mined pi coins profitabily.DOT TECH
 
Falcon Invoice Discounting: Optimizing Returns with Minimal Risk
Falcon Invoice Discounting: Optimizing Returns with Minimal RiskFalcon Invoice Discounting: Optimizing Returns with Minimal Risk
Falcon Invoice Discounting: Optimizing Returns with Minimal RiskFalcon Invoice Discounting
 
how to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchangehow to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchangeDOT TECH
 
PD ARRAY THEORY FOR INTERMEDIATE (1).pdf
PD ARRAY THEORY FOR INTERMEDIATE (1).pdfPD ARRAY THEORY FOR INTERMEDIATE (1).pdf
PD ARRAY THEORY FOR INTERMEDIATE (1).pdfJerrySMaliki
 
how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.DOT TECH
 
how can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYChow can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYCDOT TECH
 
Economics and Economic reasoning Chap. 1
Economics and Economic reasoning Chap. 1Economics and Economic reasoning Chap. 1
Economics and Economic reasoning Chap. 1Fitri Safira
 
一比一原版Adelaide毕业证阿德莱德大学毕业证成绩单如何办理
一比一原版Adelaide毕业证阿德莱德大学毕业证成绩单如何办理一比一原版Adelaide毕业证阿德莱德大学毕业证成绩单如何办理
一比一原版Adelaide毕业证阿德莱德大学毕业证成绩单如何办理zsewypy
 
一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理
一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理
一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理ydubwyt
 
Webinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont BraunWebinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont BraunFinTech Belgium
 
how can I sell my locked pi coins safety.
how can I sell my locked pi coins safety.how can I sell my locked pi coins safety.
how can I sell my locked pi coins safety.DOT TECH
 
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...Vighnesh Shashtri
 
Introduction to Economics II Chapter 25 Production and Growth.pdf
Introduction to Economics II Chapter 25 Production and Growth.pdfIntroduction to Economics II Chapter 25 Production and Growth.pdf
Introduction to Economics II Chapter 25 Production and Growth.pdfSafa444074
 
Latino Buying Power - May 2024 Presentation for Latino Caucus
Latino Buying Power - May 2024 Presentation for Latino CaucusLatino Buying Power - May 2024 Presentation for Latino Caucus
Latino Buying Power - May 2024 Presentation for Latino CaucusDanay Escanaverino
 
Introduction to Economics II Chapter 28 Unemployment (1).pdf
Introduction to Economics II Chapter 28 Unemployment (1).pdfIntroduction to Economics II Chapter 28 Unemployment (1).pdf
Introduction to Economics II Chapter 28 Unemployment (1).pdfSafa444074
 
Juspay Case study(Doubling Revenue Juspay's Success).pptx
Juspay Case study(Doubling Revenue Juspay's Success).pptxJuspay Case study(Doubling Revenue Juspay's Success).pptx
Juspay Case study(Doubling Revenue Juspay's Success).pptxaryan963438
 
where can I purchase things with pi coins online
where can I purchase things with pi coins onlinewhere can I purchase things with pi coins online
where can I purchase things with pi coins onlineDOT TECH
 
how can I sell my pi coins in China 2024.
how can I sell my pi coins in China 2024.how can I sell my pi coins in China 2024.
how can I sell my pi coins in China 2024.DOT TECH
 

Recently uploaded (20)

Isios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdfIsios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdf
 
how can i trade pi coins for Bitcoin easily.
how can i trade pi coins for Bitcoin easily.how can i trade pi coins for Bitcoin easily.
how can i trade pi coins for Bitcoin easily.
 
how can I sell my mined pi coins profitabily.
how can I sell my mined pi coins profitabily.how can I sell my mined pi coins profitabily.
how can I sell my mined pi coins profitabily.
 
Falcon Invoice Discounting: Optimizing Returns with Minimal Risk
Falcon Invoice Discounting: Optimizing Returns with Minimal RiskFalcon Invoice Discounting: Optimizing Returns with Minimal Risk
Falcon Invoice Discounting: Optimizing Returns with Minimal Risk
 
how to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchangehow to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchange
 
PD ARRAY THEORY FOR INTERMEDIATE (1).pdf
PD ARRAY THEORY FOR INTERMEDIATE (1).pdfPD ARRAY THEORY FOR INTERMEDIATE (1).pdf
PD ARRAY THEORY FOR INTERMEDIATE (1).pdf
 
how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.
 
how can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYChow can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYC
 
Economics and Economic reasoning Chap. 1
Economics and Economic reasoning Chap. 1Economics and Economic reasoning Chap. 1
Economics and Economic reasoning Chap. 1
 
一比一原版Adelaide毕业证阿德莱德大学毕业证成绩单如何办理
一比一原版Adelaide毕业证阿德莱德大学毕业证成绩单如何办理一比一原版Adelaide毕业证阿德莱德大学毕业证成绩单如何办理
一比一原版Adelaide毕业证阿德莱德大学毕业证成绩单如何办理
 
一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理
一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理
一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理
 
Webinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont BraunWebinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont Braun
 
how can I sell my locked pi coins safety.
how can I sell my locked pi coins safety.how can I sell my locked pi coins safety.
how can I sell my locked pi coins safety.
 
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...
 
Introduction to Economics II Chapter 25 Production and Growth.pdf
Introduction to Economics II Chapter 25 Production and Growth.pdfIntroduction to Economics II Chapter 25 Production and Growth.pdf
Introduction to Economics II Chapter 25 Production and Growth.pdf
 
Latino Buying Power - May 2024 Presentation for Latino Caucus
Latino Buying Power - May 2024 Presentation for Latino CaucusLatino Buying Power - May 2024 Presentation for Latino Caucus
Latino Buying Power - May 2024 Presentation for Latino Caucus
 
Introduction to Economics II Chapter 28 Unemployment (1).pdf
Introduction to Economics II Chapter 28 Unemployment (1).pdfIntroduction to Economics II Chapter 28 Unemployment (1).pdf
Introduction to Economics II Chapter 28 Unemployment (1).pdf
 
Juspay Case study(Doubling Revenue Juspay's Success).pptx
Juspay Case study(Doubling Revenue Juspay's Success).pptxJuspay Case study(Doubling Revenue Juspay's Success).pptx
Juspay Case study(Doubling Revenue Juspay's Success).pptx
 
where can I purchase things with pi coins online
where can I purchase things with pi coins onlinewhere can I purchase things with pi coins online
where can I purchase things with pi coins online
 
how can I sell my pi coins in China 2024.
how can I sell my pi coins in China 2024.how can I sell my pi coins in China 2024.
how can I sell my pi coins in China 2024.
 

Ffiec presentation

  • 2. What can you do to protect yourself? • Dual Control o Assign one user with the authority to create a transaction and choose a different user to actually submit / approve the transaction.
  • 3. What can you do to protect yourself? • Tokens o An additional security feature is in the form of a small, hand held device that provides a unique password with each touch of the button. 1st Mariner Bank utilizes tokens provided by VASCO (DigiPass 260 Whitesheet.pdf).
  • 4. What can you do to protect yourself? • Multi-Factor Authentication o Some online applications require more than one layer of authentication before allowing the user access. For example, entering a user name and password is one layer of authentication. A second layer would be the requirement that you register your computer during the initial log-in. If you sign-on from a different computer, you will be asked challenge questions before being allowed to continue. Challenge Questions: In what city were you born? What is your favorite color?
  • 5. What can you do to protect yourself? • Multi-Factor Authentication o Another example is the image and phrase that shows up on the password screen once you enter your user name. If the image and phrase match, you have landed on the page that you intended. If not, you should not enter your password. Multi-factor authentication – Wikipedia, the free encyclopedia.mht. My Pet Name
  • 6. What can you do to protect yourself? • Dedicated Workstation o Designate a specific workstation as the “Banking Workstation” and limit its use to only banking business. This workstation should not be used for web browsing.
  • 7. What can you do to protect yourself? • Monitor and Balance Your Account Daily o You are the first line of defense against fraudulent activity on your accounts. Make it a practice to log onto your bank’s website daily and review your accounts. Pay special attention to suspicious or unexplained transactions.
  • 8. What can you do to protect yourself? • Always Update Workstations w/ Latest Anti-Virus Software o Advances in technology happen at lightning speed as do the number of ways someone can wreak havoc on your accounts and computers. Make sure your anti-virus software and patches are up to date.
  • 9. Who can you call to report an issue or ask a question? Heather Adams hsadams@1stmarinerbank.com 410-558-4223 Elizabeth Sherman esherman@1stmarinerbank.com 410-558-3341 Cash Management Service Line CashManagement@1stmarinerbank.com 410-735-2003
  • 10. What are some ways you can mitigate your own risk for cyber attacks? • Positive Pay: Ensure that only the checks YOU write are being cashed. o Positive Pay was created to help prevent fraud on business checking accounts. As checks are issued, the payee name, check number, date and amount are entered in an online banking application. As those checks clear through the bank, they are matched up against information entered by the customer. If there are any discrepancies between the actual check and the information entered, the check is considered as an “exception item” and the customer is notified through the online banking application. This notification allows the customer to decide whether to pay or return the potentially fraudulent item.
  • 11. What are some ways you can mitigate your own risk for cyber attacks? • Do Not Share Your Passwords o Never share your password with anyone! Anything that happens under your log-in is automatically your responsibility. o If one employee leaves and another is hired, be sure to terminate the departing employee’s access and assign a new user ID for the new employee. o Always contact Cash Management when an employee, who had access to 1st Online, leaves your employ. The Cash Management Department has the ability to block, delete and add users at your discretion.
  • 12. What are some ways you can mitigate your own risk for cyber attacks? • Change Passwords o Institute the practice of changing passwords every 30 – 90 days.
  • 13. What are some ways you can mitigate your own risk for cyber attacks? • Require Minimum Length and Complexity of Passwords o You should require passwords be a minimum length of 6 characters and should be alpha-numeric. Example Password = Ay3bcSe! o Don’t write down your password and leave it in your unlocked desk drawer.
  • 14. What are some ways you can mitigate your own risk for cyber attacks? • Always lock workstations if leaving them attended. o Locking workstations will prohibit unauthorized users from gaining access to programs on YOUR workstation when you are not around. ALT CTRL Delete Press Alt Ctrl Del and then press ENTER to lock your workstation.
  • 15. What are some ways you can mitigate your own risk for cyber attacks? • Always log out of internet sites that you visit. o Don’t just “X” out of the web browser screen when leaving an internet site. In most instances, the site will still “show” you as logged in, leaving the possibility for a non-authorized user accessing the information.
  • 16. What are some ways you can mitigate your own risk for cyber attacks? • Never download unauthorized shareware programs or files without authorization. o Never download programs without first verifying the validity of the information.
  • 17. What are some ways you can mitigate your own risk for cyber attacks? • E-mails are like postcards. ANYONE CAN READ THEM!!! o Do not e-mail proprietary information without encrypting software.
  • 18. When will the Bank contact you requesting log- in or account information? • NEVER!!!!!! o 1st Mariner Bank will NEVER call you requesting your online banking log-in information or your account numbers. If you receive unsolicited calls requesting this information, hang-up and contact the Bank immediately.
  • 19. When is it a good time to perform a “risk- assessment” of your company’s security? o Why not right now?? The link below is a simple questionnaire, containing 10 questions to help determine the adequacy of your company’s security. Risk Assessment – WHAT ARE YOU DOING TO MITIGATE THE RISKS TO YOUR BUSINESS.docx
  • 20. If you have any questions or concerns, please contact _________________