Risk
4/4/2011
02:23 PM
50%
50%

75% Of SMB Banking Fraud Occurs Online

Most scams involved online account takeover or theft, according to a study commissioned by security vendor Guardian Analytics and conducted by Ponemon Institute.

Three out of four small and midsize businesses that encountered banking fraud during the past year were victimized online, according to a new study.

Well over half -- 56% -- of those companies experienced some form of banking-related scam during the previous 12 months, according to the report. About 75% of those cases involved online account takeover or other Web-based fraud. Some 61% of SMBs that fell prey to bank fraud were victimized more than once.

The 2011 Business Banking Trust Study, commissioned by security vendor Guardian Analytics and conducted by Ponemon Institute, included 533 businesses with fewer than 200 employees and average annual revenue of $21.6 million. All respondents were owners or senior executives with access to their company's corporate bank accounts. Guardian Analytics CEO Terry Austin noted that the current fraud numbers -- particularly in the online security arena -- showed remarkably little change from the 2010 version, the first year that Guardian sponsored the study. Last year's study found the same rate of Web-based fraud -- 75% of all cases occurred online.

"What we highlighted in 2010 was that the fraud problem was bigger than we expected and having a pretty substantial impact on businesses and the banks that serve them, and it hasn't gotten any better," said Guardian Analytics CEO Terry Austin. "In some cases it has gotten worse, but it certainly hasn't improved over the [last] 12 months."

Small and midsize businesses that manage their money with smaller banks aren't any more likely to run into fraud -- it occurred just as often at midsize or large financial institutions. The study also found that 78% of bank scams involving SMB accounts weren't discovered until after funds were transferred outside of the institution.

"The banks have not stepped up and adopted the techniques and the technology that is available to them in a broad enough fashion to make any material difference," Austin said. He added that some banks are doing a better job combating online crime than others, but the segment overall is losing the fight with fraudsters. "As an industry, the needle hasn't really moved."

Some 31% of the victimized SMBs included in the study said their bank didn't compensate them for fraud-related losses, while another 29% were only partially paid back. Just 8% of those surveyed said their bank fully covered their fraud-related losses.

Austin said the real onus in online banking security lies with the institutions rather than businesses that may not have the resources or expertise to contend with fallout from the Zeus botnet and other threats. While Austin's company recommends SMBs take certain steps to protect their company accounts online, he acknowledges that some of the practices -- such as designating a dedicated PC to be used only for banking -- may not be realistic for the smallest of businesses. He also notes that the technique most commonly used by SMBs in the study -- 78% perform monthly account reconciliations to check for fraud -- correlates closely to the finding that banks are only uncovering scams after the money is stolen.

"Businesses expect their banks to take responsibility for this," Austin said, adding that the banks themselves usually have deeper resources and better technology access than their small business customers. "Expecting [SMBs] to become security experts and adopt a wide array of techniques is pretty unrealistic."

Adding another potential wrinkle in online banking security for SMBs: More than one-third (38%) of respondents said they access their company's accounts on a tablet or smartphone, up from 23% in the 2010 version of the study.

"[Mobile] is a new and pronounced vulnerability, primarily because it's more frequent access and more variability in the endpoint device being used to access the system," Austin said. Mobile adoption further fuels Austin's view that banks need to focus on account protection from a server and back-end perspective, rather than worrying about every potential endpoint. "They need to be examining all of the information about the individual user as they access online banking -- that is the best and most effective way of protecting against fraudulent activity."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5395
Published: 2014-11-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Huawei HiLink E3276 and E3236 TCPU before V200R002B470D13SP00C00 and WebUI before V100R007B100D03SP01C03, E5180s-22 before 21.270.21.00.00, and E586Bs-2 before 21.322.10.00.889 allow remote attackers to hijack the authentication of users ...

CVE-2014-7137
Published: 2014-11-21
Multiple SQL injection vulnerabilities in Dolibarr ERP/CRM before 3.6.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) contactid parameter in an addcontact action, (2) ligne parameter in a swapstatut action, or (3) project_ref parameter to projet/tasks/contact.php; (4...

CVE-2014-7871
Published: 2014-11-21
SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call.

CVE-2014-8090
Published: 2014-11-21
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nes...

CVE-2014-8469
Published: 2014-11-21
Cross-site scripting (XSS) vulnerability in Guests/Boots in AdminCP in Moxi9 PHPFox before 4 Beta allows remote attackers to inject arbitrary web script or HTML via the User-Agent header.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?