Online Banking Fraud Prevention Recommendations and Best

Online Banking Fraud Prevention Recommendations and Best

Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know in order to educate our Online Banking users. User ID and Password Guidelines Your Logo

User ID and Password Guidelines 1 Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special characters [email protected]#$%^&*(){}<>. 2 Change your password frequently preferably each 60 days. 3

Never share username and password information with anybody. 4 Do not use account numbers, your social security number, or other personal information when create user name and password. 5 Avoid using an automatic login feature that saves usernames and passwords, such as the one below: Online Banking General Guidelines

Your Logo Online Banking General Guidelines 1 Do not use public or other unsecured computers for logging into Online Banking or for financial transactions (for example, one at a library or coffee shop). 2 Review account balances and detail transactions regularly (preferably daily) to confirm payment and other transaction data and immediately report any suspicious transactions to your financial institution.

3 View transfer history available through viewing account activity information. 4 Whenever possible, use Bill Pay instead of checks to limit account number dissemination exposure and to obtain better electronic record keeping 5 Do not use account numbers, your social security number, or other account or personal information when

creating account nicknames or other titles. 6 Review historical reporting features of your online banking application on a regular basis to confirm payment and other transaction data. 7 Never leave a computer unattended while using Online Banking. 8

Never conduct banking transactions while multiple browsers are open on your computer. 9 An FBI recommended best practice is to suggest that company users dedicate a PC solely for financial transactions (e.g., no web browsing, emails, or social media). Online Banking General Guidelines 10 Whenever possible, register the computer you use specifically for Online Banking in order to avoid having to resend a security code and other authentication information with each login. Online Banking General Guidelines

11 Take advantage of and regularly view system alerts; examples include: Balance alerts Transfer alerts

Password change alerts ACH Alerts (for cash management users) Wire Alerts (for cash management users) Tips to Protect Online Transfers, Payments & Account Data

Your Logo Tips to Protect Online Transfers, Payments & Account Data 1 Take advantage of transaction limits. Establish limits for monetary transactions at multiple levels: per transaction, daily, weekly, or monthly limits. (for cash management users) 2 When you have completed a transaction, ensure you log off to close the connection with the financial organization's computer.

Tips to Avoid Phishing, Virus, Spyware and Malware Your Logo Tips to Avoid Phishing, Virus, Spyware and Malware 1 Do not open e-mail from unknown sources. Be suspicious of e-mails purporting to be from a financial institution, government department, or other agency requesting account information, account verification, or banking access credentials such as usernames, passwords, PIN codes, and similar information. Opening file attachments or clicking on web links in suspicious e-mails could expose your system to

malicious code that could hijack your computer. 2 Never respond to a suspicious e-mail or click on any hyperlink embedded in a suspicious e-mail. Call the purported source if you are unsure who sent an e-mail 3 If an e-mail claiming to be from your financial organization seems suspicious, checking with your financial organization may be appropriate. Tips to Avoid Phishing, Virus, Spyware and Malware

4 Install anti-virus and spyware detection software on all computer systems. Free software may not provide protection against the latest threats compared with an industry standard product. 5 Update your computers regularly with the latest versions and patches of both anti-virus and anti-spyware software. Tips to Avoid Phishing, Virus, Spyware and Malware 6

Ensure computers are patched regularly, particularly operating system and key application with security patches. Tips to Avoid Phishing, Virus, Spyware and Malware 8 Install a dedicated, actively managed firewall, especially if using a broadband or dedicated connection to the Internet, such as DSL or cable. A firewall limits the potential for unauthorized access to your network and computers 9 Check your settings and select, at least, a medium level of security for your browsers.

Tips to Avoid Phishing, Virus, Spyware and Malware 10 Clear the browser cache before starting an online banking session in order to eliminate copies of Web pages that have been stored on the hard drive. How the cache is cleared depends on the browser and version you are using. Tips for Wireless Network Management Your Logo

Tips for Wireless Network Management Wireless networks can provide an unintended open door to your business network. Unless a valid reason exists for wireless network use, it is recommended that all wireless networks be disabled. If a wireless network is to be used for legitimate business purposes, it is recommended that wireless networks be secured as follows: 1 Change the wireless network hardware (router /access point) administrative password from the factory default to a complex password. Save the password in a secure location as it will be needed to make future changes to the device. 2

Disable remote administration of the wireless network hardware (router / access point). 3 If possible, disable broadcasting the network SSID. 4 If your device offers WPA encryption, secure your wireless network by enabling WPA encryption of the wireless network. If your device does not support WPA encryption, enable WEP encryption. 5

If only known computers will access the wireless network, consider enabling MAC filtering on the network hardware. Every computer network card is assigned a unique MAC address. MAC filtering will only allow computers with permitted MAC addresses access to the wireless network. THANK YOU!

Recently Viewed Presentations

  • Women&#x27;s 1

    Women's 1

    At Payless shoe stores for $19.99. Women's Shoes Class 1. Kara has an interview next week. She already has her outfit picked out but she needs to buy some heels to match her black blazer. Kara has just graduated college...
  • Chapter 28: The Labor Market: Demand, Supply and Outsourcing

    Chapter 28: The Labor Market: Demand, Supply and Outsourcing

    The price elasticity of demand for labor will be smaller, the smaller is the price elasticity of demand for the final product. easier it is to employ substitute inputs in production. larger is the proportion of wage costs in the...
  • Chapter 19 the placenta and umbilical cord Holdorf

    Chapter 19 the placenta and umbilical cord Holdorf

    Chorioangioma. Considered the most common primary tumor of the placenta. Usually occurs near the insertion of the umbilical cord and protrudes into the amniotic cavity. Vascular shunting may cause fetal high-output cardiac failure and hydrops fetalis.
  • PowerPoint bemutató

    PowerPoint bemutató

    • „At the center of the symbolic system were the interpenetrating cones, or 'gyres,' that represented the movement through major cycles of history and across antitheses of human personality…in poems of the 1920's and 1930's, winding stairs, spinning tops, „gyres,"...
  • Science SCOPE Units 2014-2015 - Pontiac High School

    Science SCOPE Units 2014-2015 - Pontiac High School

    Using a Science Notebook with the Oakland School Science Units. It is recommended that science notebooks be used to support student learning. The goal of the notebook is for students to develop the ability to collect data, make sense of...
  • Solid Waste Program Update

    Solid Waste Program Update

    Solid Waste Program Update. Underground Storage Tanks and Solid Waste Disposal Control Board. May 14, 2019. Nick Lytle, Solid Waste Permits Manager
  • Beyond Mendel - Welcome to Ms. Ferrari&#x27;s Classroom

    Beyond Mendel - Welcome to Ms. Ferrari's Classroom

    Test your Understanding…Problem 1: A plant that produces white flowers is crossed with a plant that produces purple flowers. If the pattern of inheritance is incomplete dominance what would the phenotype(s) of the F1 and F2 offspring be? Use a...
  • Topic 5.3 - Mr. Anderson&#x27;s Science Class

    Topic 5.3 - Mr. Anderson's Science Class

    Topic 5.3 Classification of Biodiversity What are those?? Binomial Nomenclature Universal system for naming organisms Developed by Carolus Linneaus 1707-1778 2 names system (Genus & species) Written in Latin (dead language) Earliest published names for species Plants 1753 Animals 1758...