SlideShare a Scribd company logo
1 of 20
Corporate
Customer
Awareness and
Education
What can you do to protect yourself?
 • Dual Control
   o Assign one user with the authority to create a transaction and
   choose a different user to actually submit / approve the transaction.
What can you do to protect yourself?
 • Tokens
   o An additional security feature is in the form of a small, hand held
   device that provides a unique password with each touch of the button.
   1st Mariner Bank utilizes tokens provided by VASCO (DigiPass 260
   Whitesheet.pdf).
What can you do to protect yourself?
 • Multi-Factor Authentication
   o Some online applications require more than one layer of
   authentication before allowing the user access. For example, entering
   a user name and password is one layer of authentication. A second
   layer would be the requirement that you register your computer during
   the initial log-in. If you sign-on from a different computer, you will be
   asked challenge questions before being allowed to continue.

             Challenge Questions:

             In what city were you born?
             What is your favorite color?
What can you do to protect yourself?
 • Multi-Factor Authentication
   o Another example is the image and phrase that shows up on the
   password screen once you enter your user name. If the image and
   phrase match, you have landed on the page that you intended. If
   not, you should not enter your password. Multi-factor authentication
   – Wikipedia, the free encyclopedia.mht.




                             My Pet Name
What can you do to protect yourself?
 • Dedicated Workstation
   o Designate a specific workstation as the “Banking Workstation” and
   limit its use to only banking business. This workstation should not be
   used for web browsing.
What can you do to protect yourself?
 • Monitor and Balance Your Account Daily
   o You are the first line of defense against fraudulent activity on your
   accounts. Make it a practice to log onto your bank’s website daily
   and review your accounts. Pay special attention to suspicious or
   unexplained transactions.
What can you do to protect yourself?
 • Always Update Workstations w/ Latest
 Anti-Virus Software
   o Advances in technology happen at lightning speed as do the number
   of ways someone can wreak havoc on your accounts and computers.
   Make sure your anti-virus software and patches are up to date.
Who can you call to report an issue or
ask a question?
 Heather Adams hsadams@1stmarinerbank.com 410-558-4223

 Elizabeth Sherman esherman@1stmarinerbank.com 410-558-3341

 Cash Management Service Line CashManagement@1stmarinerbank.com
 410-735-2003
What are some ways you can mitigate
your own risk for cyber attacks?
• Positive Pay: Ensure that only the checks YOU write are being cashed.
o Positive Pay was created to help prevent fraud on business checking
accounts. As checks are issued, the payee name, check number, date and
amount are entered in an online banking application. As those checks clear
through the bank, they are matched up against information entered by the
customer. If there are any discrepancies between the actual check and the
information entered, the check is considered as an “exception item” and the
customer is notified through the online banking application. This notification
allows the customer to decide whether to pay or return the potentially
fraudulent item.
What are some ways you can mitigate your
own risk for cyber attacks?
• Do Not Share Your Passwords
 o Never share your password with anyone! Anything that happens
 under your log-in is automatically your responsibility.
 o If one employee leaves and another is hired, be sure to terminate the
 departing employee’s access and assign a new user ID for the new
 employee.
 o Always contact Cash Management when an employee, who had
 access to 1st Online, leaves your employ. The Cash Management
 Department has the ability to block, delete and add users at your
 discretion.
What are some ways you can mitigate your
own risk for cyber attacks?
• Change Passwords

  o Institute the practice of changing passwords every 30 – 90 days.
What are some ways you can mitigate your
own risk for cyber attacks?
• Require Minimum Length and Complexity of
Passwords
 o You should require passwords be a minimum length of 6
 characters and should be alpha-numeric.


            Example Password = Ay3bcSe!


 o Don’t write down your password and leave it in your unlocked desk
 drawer.
What are some ways you can mitigate your
own risk for cyber attacks?
• Always lock workstations if leaving them attended.
 o Locking workstations will prohibit unauthorized users from gaining access to
 programs on YOUR workstation when you are not around.



         ALT                   CTRL                   Delete




      Press Alt Ctrl Del and then press ENTER to lock your workstation.
What are some ways you can mitigate your
own risk for cyber attacks?
• Always log out of internet sites that you visit.
  o Don’t just “X” out of the web browser screen when leaving an internet site.
  In most instances, the site will still “show” you as logged in, leaving the
  possibility for a non-authorized user accessing the information.
What are some ways you can mitigate your
own risk for cyber attacks?
• Never download unauthorized shareware
programs or files without authorization.
 o Never download programs without first verifying the validity of the
 information.
What are some ways you can mitigate your
own risk for cyber attacks?
• E-mails are like postcards. ANYONE CAN READ THEM!!!
 o Do not e-mail proprietary information without encrypting software.
When will the Bank contact you requesting log-
in or account information?
• NEVER!!!!!!
 o 1st Mariner Bank will NEVER call you requesting your online banking
 log-in information or your account numbers. If you receive unsolicited
 calls requesting this information, hang-up and contact the Bank
 immediately.
When is it a good time to perform a “risk-
assessment” of your company’s security?

 o Why not right now?? The link below is a simple questionnaire, containing
 10 questions to help determine the adequacy of your company’s security. Risk
 Assessment – WHAT ARE YOU DOING TO MITIGATE THE RISKS TO YOUR
 BUSINESS.docx
If you have any questions or concerns, please
contact _________________

More Related Content

Viewers also liked

Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...Symantec
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh WebinarArrow ECS UK
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Adv Prashant Mali
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android applicationIAEME Publication
 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Marco Morana
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Symantec
 

Viewers also liked (8)

Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Security Metrics
Security MetricsSecurity Metrics
Security Metrics
 
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
 

Similar to Ffiec presentation

Internet Banking by Chethan Raju
Internet Banking by Chethan RajuInternet Banking by Chethan Raju
Internet Banking by Chethan Rajuchethu6391
 
Internet banking - College Project
Internet banking - College ProjectInternet banking - College Project
Internet banking - College ProjectSheril Daniel
 
Internet Banking
Internet BankingInternet Banking
Internet Bankingsnehateddy
 
Internet Banking
Internet BankingInternet Banking
Internet Bankingsnehateddy
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfTechSoup
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentationYusuf Qadir
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyAnjan Mahanta
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?Entrance Exam Info
 
Chris bowser reviews about protecting e commerce store against fraudulent act...
Chris bowser reviews about protecting e commerce store against fraudulent act...Chris bowser reviews about protecting e commerce store against fraudulent act...
Chris bowser reviews about protecting e commerce store against fraudulent act...Chris Bowser
 
E-banking FOR CLASS 10 students
E-banking FOR CLASS 10 studentsE-banking FOR CLASS 10 students
E-banking FOR CLASS 10 studentsSartha Gupta
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraudWebSitePulse
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesHuman Resources & Payroll
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayMichele Chubirka
 

Similar to Ffiec presentation (20)

Internet Banking by Chethan Raju
Internet Banking by Chethan RajuInternet Banking by Chethan Raju
Internet Banking by Chethan Raju
 
Internet banking - College Project
Internet banking - College ProjectInternet banking - College Project
Internet banking - College Project
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Online banking
Online bankingOnline banking
Online banking
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
internet banking
internet banking internet banking
internet banking
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentation
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & Safety
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
Chris bowser reviews about protecting e commerce store against fraudulent act...
Chris bowser reviews about protecting e commerce store against fraudulent act...Chris bowser reviews about protecting e commerce store against fraudulent act...
Chris bowser reviews about protecting e commerce store against fraudulent act...
 
Internet banking
Internet bankingInternet banking
Internet banking
 
E-banking FOR CLASS 10 students
E-banking FOR CLASS 10 studentsE-banking FOR CLASS 10 students
E-banking FOR CLASS 10 students
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
Internet Phishing
Internet PhishingInternet Phishing
Internet Phishing
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 

Recently uploaded

一比一原版(BU毕业证书)波士顿大学毕业证成绩单学位证书
一比一原版(BU毕业证书)波士顿大学毕业证成绩单学位证书一比一原版(BU毕业证书)波士顿大学毕业证成绩单学位证书
一比一原版(BU毕业证书)波士顿大学毕业证成绩单学位证书atedyxc
 
International economics – 2 classical theories of IT
International economics – 2 classical theories of ITInternational economics – 2 classical theories of IT
International economics – 2 classical theories of ITArifa Saeed
 
Prezentacja Q1 2024 EN strona www relacji
Prezentacja Q1 2024  EN strona www relacjiPrezentacja Q1 2024  EN strona www relacji
Prezentacja Q1 2024 EN strona www relacjiklaudiafilka
 
DSP Gold ETF Fund of Fund PPT - April'2024
DSP Gold ETF Fund of Fund PPT - April'2024DSP Gold ETF Fund of Fund PPT - April'2024
DSP Gold ETF Fund of Fund PPT - April'2024DSP Mutual Fund
 
Fintech Belgium General Assembly and Anniversary Event 2024
Fintech Belgium General Assembly and Anniversary Event 2024Fintech Belgium General Assembly and Anniversary Event 2024
Fintech Belgium General Assembly and Anniversary Event 2024FinTech Belgium
 
is pi Network coin available for sale in 2024
is pi Network coin available for sale in 2024is pi Network coin available for sale in 2024
is pi Network coin available for sale in 2024DOT TECH
 
Human Capital: Education and Health in Economic Development
Human Capital:  Education and Health      in Economic DevelopmentHuman Capital:  Education and Health      in Economic Development
Human Capital: Education and Health in Economic Developmentyirgalemleaye
 
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单学位证书
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单学位证书一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单学位证书
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单学位证书atedyxc
 
How do I sell my Pi Network currency in 2024?
How do I sell my Pi Network currency in 2024?How do I sell my Pi Network currency in 2024?
How do I sell my Pi Network currency in 2024?DOT TECH
 
一比一原版(UMich毕业证书)密歇根大学安娜堡分校毕业证成绩单学位证书
一比一原版(UMich毕业证书)密歇根大学安娜堡分校毕业证成绩单学位证书一比一原版(UMich毕业证书)密歇根大学安娜堡分校毕业证成绩单学位证书
一比一原版(UMich毕业证书)密歇根大学安娜堡分校毕业证成绩单学位证书atedyxc
 
Monthly Market Risk Update: May 2024 [SlideShare]
Monthly Market Risk Update: May 2024 [SlideShare]Monthly Market Risk Update: May 2024 [SlideShare]
Monthly Market Risk Update: May 2024 [SlideShare]Commonwealth
 
一比一原版(UW毕业证书)华盛顿大学毕业证成绩单学位证书
一比一原版(UW毕业证书)华盛顿大学毕业证成绩单学位证书一比一原版(UW毕业证书)华盛顿大学毕业证成绩单学位证书
一比一原版(UW毕业证书)华盛顿大学毕业证成绩单学位证书atedyxc
 
Goldamn report on India's economy in 2024
Goldamn report on India's economy in 2024Goldamn report on India's economy in 2024
Goldamn report on India's economy in 2024ssuser7d2330
 
Bahawalpur Culture.pptx pptx pptx pttx pttx
Bahawalpur Culture.pptx pptx pptx pttx pttxBahawalpur Culture.pptx pptx pptx pttx pttx
Bahawalpur Culture.pptx pptx pptx pttx pttxAbdulNasirNichari
 
Abhay Bhutada’s Plan to Boost Financial Growth in 2024
Abhay Bhutada’s Plan to Boost Financial Growth in 2024Abhay Bhutada’s Plan to Boost Financial Growth in 2024
Abhay Bhutada’s Plan to Boost Financial Growth in 2024Champak Jhagmag
 
What exchange can I sell my pi coins in 2024
What exchange can I sell my pi coins in 2024What exchange can I sell my pi coins in 2024
What exchange can I sell my pi coins in 2024DOT TECH
 
NO1 Best kala jadu karne wale ka contact number kala jadu karne wale baba kal...
NO1 Best kala jadu karne wale ka contact number kala jadu karne wale baba kal...NO1 Best kala jadu karne wale ka contact number kala jadu karne wale baba kal...
NO1 Best kala jadu karne wale ka contact number kala jadu karne wale baba kal...Amil baba
 
New Stratus Corporate Presentation May 2024
New Stratus Corporate Presentation May 2024New Stratus Corporate Presentation May 2024
New Stratus Corporate Presentation May 2024Adnet Communications
 
How to exchange my pi coins on HTX in 2024
How to exchange my pi coins on HTX in 2024How to exchange my pi coins on HTX in 2024
How to exchange my pi coins on HTX in 2024DOT TECH
 
Population Growth and Economic Development
Population Growth and  Economic DevelopmentPopulation Growth and  Economic Development
Population Growth and Economic Developmentyirgalemleaye
 

Recently uploaded (20)

一比一原版(BU毕业证书)波士顿大学毕业证成绩单学位证书
一比一原版(BU毕业证书)波士顿大学毕业证成绩单学位证书一比一原版(BU毕业证书)波士顿大学毕业证成绩单学位证书
一比一原版(BU毕业证书)波士顿大学毕业证成绩单学位证书
 
International economics – 2 classical theories of IT
International economics – 2 classical theories of ITInternational economics – 2 classical theories of IT
International economics – 2 classical theories of IT
 
Prezentacja Q1 2024 EN strona www relacji
Prezentacja Q1 2024  EN strona www relacjiPrezentacja Q1 2024  EN strona www relacji
Prezentacja Q1 2024 EN strona www relacji
 
DSP Gold ETF Fund of Fund PPT - April'2024
DSP Gold ETF Fund of Fund PPT - April'2024DSP Gold ETF Fund of Fund PPT - April'2024
DSP Gold ETF Fund of Fund PPT - April'2024
 
Fintech Belgium General Assembly and Anniversary Event 2024
Fintech Belgium General Assembly and Anniversary Event 2024Fintech Belgium General Assembly and Anniversary Event 2024
Fintech Belgium General Assembly and Anniversary Event 2024
 
is pi Network coin available for sale in 2024
is pi Network coin available for sale in 2024is pi Network coin available for sale in 2024
is pi Network coin available for sale in 2024
 
Human Capital: Education and Health in Economic Development
Human Capital:  Education and Health      in Economic DevelopmentHuman Capital:  Education and Health      in Economic Development
Human Capital: Education and Health in Economic Development
 
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单学位证书
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单学位证书一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单学位证书
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单学位证书
 
How do I sell my Pi Network currency in 2024?
How do I sell my Pi Network currency in 2024?How do I sell my Pi Network currency in 2024?
How do I sell my Pi Network currency in 2024?
 
一比一原版(UMich毕业证书)密歇根大学安娜堡分校毕业证成绩单学位证书
一比一原版(UMich毕业证书)密歇根大学安娜堡分校毕业证成绩单学位证书一比一原版(UMich毕业证书)密歇根大学安娜堡分校毕业证成绩单学位证书
一比一原版(UMich毕业证书)密歇根大学安娜堡分校毕业证成绩单学位证书
 
Monthly Market Risk Update: May 2024 [SlideShare]
Monthly Market Risk Update: May 2024 [SlideShare]Monthly Market Risk Update: May 2024 [SlideShare]
Monthly Market Risk Update: May 2024 [SlideShare]
 
一比一原版(UW毕业证书)华盛顿大学毕业证成绩单学位证书
一比一原版(UW毕业证书)华盛顿大学毕业证成绩单学位证书一比一原版(UW毕业证书)华盛顿大学毕业证成绩单学位证书
一比一原版(UW毕业证书)华盛顿大学毕业证成绩单学位证书
 
Goldamn report on India's economy in 2024
Goldamn report on India's economy in 2024Goldamn report on India's economy in 2024
Goldamn report on India's economy in 2024
 
Bahawalpur Culture.pptx pptx pptx pttx pttx
Bahawalpur Culture.pptx pptx pptx pttx pttxBahawalpur Culture.pptx pptx pptx pttx pttx
Bahawalpur Culture.pptx pptx pptx pttx pttx
 
Abhay Bhutada’s Plan to Boost Financial Growth in 2024
Abhay Bhutada’s Plan to Boost Financial Growth in 2024Abhay Bhutada’s Plan to Boost Financial Growth in 2024
Abhay Bhutada’s Plan to Boost Financial Growth in 2024
 
What exchange can I sell my pi coins in 2024
What exchange can I sell my pi coins in 2024What exchange can I sell my pi coins in 2024
What exchange can I sell my pi coins in 2024
 
NO1 Best kala jadu karne wale ka contact number kala jadu karne wale baba kal...
NO1 Best kala jadu karne wale ka contact number kala jadu karne wale baba kal...NO1 Best kala jadu karne wale ka contact number kala jadu karne wale baba kal...
NO1 Best kala jadu karne wale ka contact number kala jadu karne wale baba kal...
 
New Stratus Corporate Presentation May 2024
New Stratus Corporate Presentation May 2024New Stratus Corporate Presentation May 2024
New Stratus Corporate Presentation May 2024
 
How to exchange my pi coins on HTX in 2024
How to exchange my pi coins on HTX in 2024How to exchange my pi coins on HTX in 2024
How to exchange my pi coins on HTX in 2024
 
Population Growth and Economic Development
Population Growth and  Economic DevelopmentPopulation Growth and  Economic Development
Population Growth and Economic Development
 

Ffiec presentation

  • 2. What can you do to protect yourself? • Dual Control o Assign one user with the authority to create a transaction and choose a different user to actually submit / approve the transaction.
  • 3. What can you do to protect yourself? • Tokens o An additional security feature is in the form of a small, hand held device that provides a unique password with each touch of the button. 1st Mariner Bank utilizes tokens provided by VASCO (DigiPass 260 Whitesheet.pdf).
  • 4. What can you do to protect yourself? • Multi-Factor Authentication o Some online applications require more than one layer of authentication before allowing the user access. For example, entering a user name and password is one layer of authentication. A second layer would be the requirement that you register your computer during the initial log-in. If you sign-on from a different computer, you will be asked challenge questions before being allowed to continue. Challenge Questions: In what city were you born? What is your favorite color?
  • 5. What can you do to protect yourself? • Multi-Factor Authentication o Another example is the image and phrase that shows up on the password screen once you enter your user name. If the image and phrase match, you have landed on the page that you intended. If not, you should not enter your password. Multi-factor authentication – Wikipedia, the free encyclopedia.mht. My Pet Name
  • 6. What can you do to protect yourself? • Dedicated Workstation o Designate a specific workstation as the “Banking Workstation” and limit its use to only banking business. This workstation should not be used for web browsing.
  • 7. What can you do to protect yourself? • Monitor and Balance Your Account Daily o You are the first line of defense against fraudulent activity on your accounts. Make it a practice to log onto your bank’s website daily and review your accounts. Pay special attention to suspicious or unexplained transactions.
  • 8. What can you do to protect yourself? • Always Update Workstations w/ Latest Anti-Virus Software o Advances in technology happen at lightning speed as do the number of ways someone can wreak havoc on your accounts and computers. Make sure your anti-virus software and patches are up to date.
  • 9. Who can you call to report an issue or ask a question? Heather Adams hsadams@1stmarinerbank.com 410-558-4223 Elizabeth Sherman esherman@1stmarinerbank.com 410-558-3341 Cash Management Service Line CashManagement@1stmarinerbank.com 410-735-2003
  • 10. What are some ways you can mitigate your own risk for cyber attacks? • Positive Pay: Ensure that only the checks YOU write are being cashed. o Positive Pay was created to help prevent fraud on business checking accounts. As checks are issued, the payee name, check number, date and amount are entered in an online banking application. As those checks clear through the bank, they are matched up against information entered by the customer. If there are any discrepancies between the actual check and the information entered, the check is considered as an “exception item” and the customer is notified through the online banking application. This notification allows the customer to decide whether to pay or return the potentially fraudulent item.
  • 11. What are some ways you can mitigate your own risk for cyber attacks? • Do Not Share Your Passwords o Never share your password with anyone! Anything that happens under your log-in is automatically your responsibility. o If one employee leaves and another is hired, be sure to terminate the departing employee’s access and assign a new user ID for the new employee. o Always contact Cash Management when an employee, who had access to 1st Online, leaves your employ. The Cash Management Department has the ability to block, delete and add users at your discretion.
  • 12. What are some ways you can mitigate your own risk for cyber attacks? • Change Passwords o Institute the practice of changing passwords every 30 – 90 days.
  • 13. What are some ways you can mitigate your own risk for cyber attacks? • Require Minimum Length and Complexity of Passwords o You should require passwords be a minimum length of 6 characters and should be alpha-numeric. Example Password = Ay3bcSe! o Don’t write down your password and leave it in your unlocked desk drawer.
  • 14. What are some ways you can mitigate your own risk for cyber attacks? • Always lock workstations if leaving them attended. o Locking workstations will prohibit unauthorized users from gaining access to programs on YOUR workstation when you are not around. ALT CTRL Delete Press Alt Ctrl Del and then press ENTER to lock your workstation.
  • 15. What are some ways you can mitigate your own risk for cyber attacks? • Always log out of internet sites that you visit. o Don’t just “X” out of the web browser screen when leaving an internet site. In most instances, the site will still “show” you as logged in, leaving the possibility for a non-authorized user accessing the information.
  • 16. What are some ways you can mitigate your own risk for cyber attacks? • Never download unauthorized shareware programs or files without authorization. o Never download programs without first verifying the validity of the information.
  • 17. What are some ways you can mitigate your own risk for cyber attacks? • E-mails are like postcards. ANYONE CAN READ THEM!!! o Do not e-mail proprietary information without encrypting software.
  • 18. When will the Bank contact you requesting log- in or account information? • NEVER!!!!!! o 1st Mariner Bank will NEVER call you requesting your online banking log-in information or your account numbers. If you receive unsolicited calls requesting this information, hang-up and contact the Bank immediately.
  • 19. When is it a good time to perform a “risk- assessment” of your company’s security? o Why not right now?? The link below is a simple questionnaire, containing 10 questions to help determine the adequacy of your company’s security. Risk Assessment – WHAT ARE YOU DOING TO MITIGATE THE RISKS TO YOUR BUSINESS.docx
  • 20. If you have any questions or concerns, please contact _________________