Risk
4/4/2011
02:23 PM
50%
50%

75% Of SMB Banking Fraud Occurs Online

Most scams involved online account takeover or theft, according to a study commissioned by security vendor Guardian Analytics and conducted by Ponemon Institute.

Three out of four small and midsize businesses that encountered banking fraud during the past year were victimized online, according to a new study.

Well over half -- 56% -- of those companies experienced some form of banking-related scam during the previous 12 months, according to the report. About 75% of those cases involved online account takeover or other Web-based fraud. Some 61% of SMBs that fell prey to bank fraud were victimized more than once.

The 2011 Business Banking Trust Study, commissioned by security vendor Guardian Analytics and conducted by Ponemon Institute, included 533 businesses with fewer than 200 employees and average annual revenue of $21.6 million. All respondents were owners or senior executives with access to their company's corporate bank accounts. Guardian Analytics CEO Terry Austin noted that the current fraud numbers -- particularly in the online security arena -- showed remarkably little change from the 2010 version, the first year that Guardian sponsored the study. Last year's study found the same rate of Web-based fraud -- 75% of all cases occurred online.

"What we highlighted in 2010 was that the fraud problem was bigger than we expected and having a pretty substantial impact on businesses and the banks that serve them, and it hasn't gotten any better," said Guardian Analytics CEO Terry Austin. "In some cases it has gotten worse, but it certainly hasn't improved over the [last] 12 months."

Small and midsize businesses that manage their money with smaller banks aren't any more likely to run into fraud -- it occurred just as often at midsize or large financial institutions. The study also found that 78% of bank scams involving SMB accounts weren't discovered until after funds were transferred outside of the institution.

"The banks have not stepped up and adopted the techniques and the technology that is available to them in a broad enough fashion to make any material difference," Austin said. He added that some banks are doing a better job combating online crime than others, but the segment overall is losing the fight with fraudsters. "As an industry, the needle hasn't really moved."

Some 31% of the victimized SMBs included in the study said their bank didn't compensate them for fraud-related losses, while another 29% were only partially paid back. Just 8% of those surveyed said their bank fully covered their fraud-related losses.

Austin said the real onus in online banking security lies with the institutions rather than businesses that may not have the resources or expertise to contend with fallout from the Zeus botnet and other threats. While Austin's company recommends SMBs take certain steps to protect their company accounts online, he acknowledges that some of the practices -- such as designating a dedicated PC to be used only for banking -- may not be realistic for the smallest of businesses. He also notes that the technique most commonly used by SMBs in the study -- 78% perform monthly account reconciliations to check for fraud -- correlates closely to the finding that banks are only uncovering scams after the money is stolen.

"Businesses expect their banks to take responsibility for this," Austin said, adding that the banks themselves usually have deeper resources and better technology access than their small business customers. "Expecting [SMBs] to become security experts and adopt a wide array of techniques is pretty unrealistic."

Adding another potential wrinkle in online banking security for SMBs: More than one-third (38%) of respondents said they access their company's accounts on a tablet or smartphone, up from 23% in the 2010 version of the study.

"[Mobile] is a new and pronounced vulnerability, primarily because it's more frequent access and more variability in the endpoint device being used to access the system," Austin said. Mobile adoption further fuels Austin's view that banks need to focus on account protection from a server and back-end perspective, rather than worrying about every potential endpoint. "They need to be examining all of the information about the individual user as they access online banking -- that is the best and most effective way of protecting against fraudulent activity."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7402
Published: 2014-12-17
Multiple unspecified vulnerabilities in request.c in c-icap 0.2.x allow remote attackers to cause a denial of service (crash) via a crafted ICAP request.

CVE-2014-5437
Published: 2014-12-17
Multiple cross-site request forgery (CSRF) vulnerabilities in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) enable remote management via a request to remote_management.php,...

CVE-2014-5438
Published: 2014-12-17
Cross-site scripting (XSS) vulnerability in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allows remote authenticated users to inject arbitrary web script or HTML via the computer_name parameter to connected_devices_computers_edit.php.

CVE-2014-7170
Published: 2014-12-17
Race condition in Puppet Server 0.2.0 allows local users to obtain sensitive information by accessing it in between package installation or upgrade and the start of the service.

CVE-2014-7285
Published: 2014-12-17
The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.