Transcript Slide 1

Financial Data Protection
Financial Data Protection





Financial Data is an Asset??!!
The Compromise
Your Bank’s Security
The Weakest Link
Solutions for Safety
Our Most Valuable Asset…….
Before the Internet
Today’s Valuable Assets
Personal Financial Data =
What is Financial Data?







SSN# and DOB
Address
Mother’s Maiden name
Credit / Debit card and Account numbers
User Name and Passwords
Drivers license or identification numbers
Check Information
How is Data Compromised?
POS / ATM Skimming
How is Data Compromised?
POS / ATM Skimming
How is Data Compromised?
Data Breach - Headlines
TJX - Between 47 and 200 Million Cards
Compromised
• Weak encryption on TJX’s wireless network
allowed the theft of card information.
26.5 Million Veteran’s personal records
exposed
• An employee’s computer was stolen containing
unencrypted information on 26.5 million
people. The information included names, social
security numbers, date of birth and other
personally identifiable information
How is Data Compromised?
Internet Usage
• Viruses, Malware & Keyloggers
• Man in the Middle
• Man in the browser
• Social Networking


Games
Video link
The Reality of Computer Security


22.7 million computers scanned
48.35% compromised
A micro study of 10,000 computers
• 55% of computers equipped with up to
date antivirus and security software, were
not able to detect and remove the Zeus
virus
• 14% had antivirus that was not up to date
• 31% did not have antivirus at all
Source: APWG Q3, 2009 Report
How is Data Compromised?
Email and Phone
• Phishing / Vishing
• Data Leakage
• Clicking on links in text messages or
email
• Nigerian fraud / money mules
What do they do with it?




Account Take Over
Check Fraud
Credit / Debit Fraud
Identity Theft
• Take out loans
• Open deposit accounts
• Apply for credit cards
Account Takeover





Fraudster hacks into your PC
Downloads malware such as a keylogger
to gain your online log on credentials
Logs on with complete access to your
account information and features
Sets up a new payee and initiates a
transfer of funds via ACH or Wire
The money is sent to the money mule and
is then emptied and abandoned
Online banking “just makes life
simpler”
Internet Usage in 2010 was 36%
Internet Usage in 2011 was 62%
Your Bank’s Security Obligations


Gramm Leach Bliley
Act “GLBA”
(Customer) 1999
FFIEC Internet
Authentication
Guidance
2005 & 2011

MA 201 CMR 17.00
Mass Residents - 2010
Minimum Standards of Protection
GLBA & MA 201 CMR 17











Anti Virus Software
Anti Spam Software
Patching
Software Upgrades
Penetration Testing
Vulnerability Testing
Auditing
Firewalls
Web Filters
Annual Training
Vendor Management









Secured Storage
Password
Requirements
Encryption
Policies & Procedures
Provide Encrypted
Removable Media
Computer Logs
Document shredding
Secured trash disposal
Secure Email
FFIEC Internet Authentication Guidance

Current Security
• Reverse Phishing
• Multi Factor Authentication (device ID - cookie)
• Challenge Questions at Log In

New security
• Complex Device Identification
• Complex Challenge Questions
• Layered security for high risk transactions


Detect and respond to anomalous/suspicious
activity at log in and transaction level
Out of band authentication
• Dual Control, Isolated PC for Online Banking
What makes us the weakest link?
Convenience
Security
There is an inverse
relationship between
convenience (ease-ofuse) and security.
As you increase
security, you lose
convenience.
What Makes Us the Weakest Link?

Easily guessed passwords
• Too short, too simple, common words

Not keeping secrets
• Writing passwords down, sending
confidential data in e-mails

Trusting things we get from others
• Opening email attachments, clicking on
links
Social Engineering
Is the art of
manipulating
people into
performing
actions or
divulging
confidential
information
What do you have that they want?






Money
Customer Information
Employee Information
Business Information
Access to Systems
Why do they want access to
Systems?
Social Networking Danger

http://www.youtube.com/watch?v=A
SV25lLoROg&feature=related
Social Networking Danger
Phone profile and friend request (phishing attempt)







43%
72%
84%
87%
78%
23%
26%
accepted the friend request
gave email address
gave full DOB
gave details about workplace or education
listed current address or location
listed current phone number
provided their IM screen name
In most cases, access to photos, likes, dislikes, hobbies, employer
detail and other personal information was also accessed.
Source: Sophos YouTube video – Identity theft made easy
The Risk of Convenience

Analysis of 32 million passwords stolen
• 20% or 6.4 million used only 5000 different
passwords!
#1 123456 (used 290,731 times)
#2 12345
#3 123456789
#4 password
#5 iloveyou
Source: Imperva
Strong Passwords
Long passwords, mixing letters, numbers,
and symbols are tough to crack. Best
passwords are memorable but hard to
type!
• 8 Characters long
• Contains Upper and Lower case letters
• Contain at least one number or special
character
• Is not a dictionary word in any language
• Cannot be easily guessed
• Changed every 90 days
• Don’t tell anyone your password
• Don’t write your password down anywhere
Mnemonics Made Easy


“Water, water everywhere and not a
drop to drink” (Rhyme of the Ancient
Mariner) converts to Wwe&nadtd.
“We Three Kings from Orient Are”
converts to w3KfOr3691.
Strong Passwords

http://www.youtube.com/watch?v=a
p6QnMv0fBo&feature=related
Security Measures







Review accounts frequently
Be suspicious of emails and links
Sign up for alerts
Never register a foreign computer
Note the https
Note the banks web address
Save any shortcuts under a fake
name
Online Banking Security

http://www.youtube.com/watch?v=
mWNEoBIxhSs
Identity Theft Red Flags




You order new checks or a debit card
and never receive them
You see unauthorized activity on
your account or credit report
You receive a change of address
notice from your bank
You begin to receive calls for debt
collection
Additional Security Measures





Guard SSN, DOB, Mother’s Maiden Name
Guard your mailbox
Sign up for electronic statements
Take your receipts (ATM, Debit, Credit)
Order your credit report annually
• Equifax, Experian, TransUnion
• www.annualcreditreport.com

Shred, Shred, Shred
Identify Theft Prevention

http://www.youtube.com/watch?v=H
35DASgwPZc&feature=related
Online Security
Convenience
Security
There is an inverse
relationship between
convenience (ease-ofuse) and security.
As you increase
security, you lose
convenience.
In order to WIN, we need
to be perfect. For the
malicious party to win,
they need only to exploit
one mistake.
Resources

Identify Theft information – ESB
• http://www.bankesb-idtheft.com/home.htm

Fraud Advisory for Businesses: Corporate Account Take
Over (FBI, USSS, IC3, FS-SIAC)
• http://www.ic3.gov/media/2010/corporateaccounttakeover.pdf

Fighting back against Identify Theft (FTC)
• http://www.ftc.gov/bcp/edu/microsites/idtheft/

FBI Scams and Safety
• http://www.fbi.gov/scams-safety/

Better Business Bureau –Data Security made simpler
• http://www.bbb.org/data-security/Data-Security-MadeSimpler.pdf

Onguard Online – Consumer protection (FTC)
• http://onguardonline.gov/

Bureau of Consumer Protection – Business

http://business.ftc.gov/