Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

9/24/2009
11:01 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Five Tips To Protect Your Business From Online Banking Fraud

Guardian Analytics CEO Terry Austin provides insight on how business owners can safeguard their finances online

LOS ALTOS, Calif. Sept. 24/PRNewswire/ --Guardian Analytics, a provider of fraud prevention software for the financial services industry, is advising businesses on the risks of Internet banking, and how they can protect their companies from becoming a victim of online banking fraud.

The need for businesses to examine their online business banking practices has never been more important. In August alone, the FDIC, NACHA - The Electronic Payments Association, and the Financial Services Information Sharing and Analysis Center (FS-ISAC) all published alerts warning about rising Internet threats to businesses. Analyst firm Gartner issued a report on the issue in August, and last week the Senate Committee on Homeland Security and Governmental Affairs held a special hearing to discuss cybercriminals targeting small- and medium- sized businesses. Committee Chairman Joe Lieberman, ID-Conn., and Ranking Member Susan Collins, R-Me., have also started drafting legislation to address this as well as other cyber security issues, and is working to bring public and private organizations together to spearhead the initiative.

"In the last several weeks, business banking fraud has become a dominant discussion point in the financial and security industries," said Avivah Litan, VP and distinguished analyst at Gartner. "With cybercriminals circumventing strong authentication and using sophisticated reconnaissance on accounts during the attacks, increased fraud awareness has never been more important."

Terry Austin, Guardian Analytics CEO, provides the following advice to entrepreneurs to protect their companies against online banking fraud:

1. Be aware of your financial rights: If your business becomes the victim of online business banking fraud, you have fewer rights than you do as an individual. Regulation E of the Federal Electronic Funds Transfer Act requires banks to reimburse consumer fraud victims within 10 days of a fraud report, but it does not protect businesses the same way it protects individual accounts. Ask your bank what their policies are on protecting business accounts.

2. Ask your bank to increaseinvestment in protection technologies: Your bank's online account platform is only as secure as the technology behind it. Ask your bank if they have a proactive online banking fraud monitoring system in place to detect suspicious account activity and how they are responding to the recent alerts. Despite increased regulations, many financial institutions still have not implemented the technologies beyond authentication that are necessary to fight today's sophisticated threats.

3. Update your anti-malware software and firewalls: Not keeping your anti-malware and firewalls updated is a huge risk for anyone, and even more so when it could jeopardize your businesses' entire financial health. Still, know that your business can fall victim even with updated computer security protection.

4. Monitor for irregularities and missing funds: It is imperative for any business to always be on the lookout for anything abnormal occurring in its account/s. Many banks offer transaction alerts so customers can be notified of important account activity, so ask your bank about this service.

5. Educate your financial managers on the threats: Forward the latest advisories on to whoever manages your online business banking accounts. If anyone needs to know about the threats, it is the person closest to your online banking account/s, whether that is the CEO, CFO, or accountant.

About Guardian Analytics

Headquartered in Los Altos, Calif., Guardian Analytics is focused on the prevention of online account fraud. The company's real-time risk management approach to fraud detection, forensics and risk monitoring is built on strong analytics and predictive models of individual behavior. Leading financial services institutions rely on Guardian Analytics to protect individual account assets and the integrity of their online channels. Founded in 2005, Guardian Analytics is privately held with venture funding from Foundation Capital. For more information, please visit www.guardiananalytics.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27132
PUBLISHED: 2021-02-27
SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
CVE-2021-25284
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
CVE-2021-3144
PUBLISHED: 2021-02-27
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
CVE-2021-3148
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
CVE-2021-3151
PUBLISHED: 2021-02-27
i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__M...