
CEOs have long worried about financial losses from stolen or forged
checks, so most executives have taken steps to prevent those types of losses by keeping checks in locked drawers
and creating procedural safeguards. But
with the advent of online banking and
electronic financial services, today’s criminal is more likely to enter your company
through cyberspace than the front door.
Phishing, which is a form of online identity theft that uses both social engineering
and technical subterfuge to steal personal data and account information from
users, can be hard to discern from legitimate banking institution communications. In some cases, bank and credit card
brands are hijacked and used as part of
phony e-mail schemes; the APWG reported the hijacking of more than 178 brands
during November 2007. These two examples are only the tip of the modern-day
fraud iceberg.
“There’s been a big increase in counterfeit items because of desktop publishing
technology that allows hackers to replicate and print any company’s checks anywhere in the world, once they’ve stolen the
information,” says Terry Akin, vice president and regional risk manager for Fifth
Third Bank.
Smart Business spoke with Akin about
how executives can protect their company’s assets.
What are other modern fraud techniques?
Anyone inside or outside your company
has the ability to transfer funds to his or
her personal accounts if he or she has the
password and the signature information
for your business accounts. Today, more
companies wire money between accounts
online through the use of a PIN by designated users, so the theft opportunities are
greater. Some perpetrators use malicious
software that downloads onto your desktop and secretly captures the information
needed to access your accounts during
transactions, or they steal the information
by sending an e-mail from someone who
appears to be your banker requesting the
information.
What are some preventive measures?
First, keep all personal and business
account information secured by locking up
checks, codes, passwords and account
statements and limiting the number of people who can sign checks. Also, make sure
that users log out of computers when they
are away from their desks, create a policy
that passwords should never be stored in
the computer’s cache and instruct staff not
to respond to any e-mail request for bank
account information. Requiring dual signatures, especially on large checks, is an
excellent idea as is segregating duties, so
one employee can’t complete all the steps
in a payment transaction. Certainly, audits
are a necessary part of a good prevention
structure as is entering dummy transactions into the system from time to time, to
see if they are discerned during the
accounting process.
What security measures should the bank provide?
Many banks offer their business customers a security system called positive
pay. Traditional positive pay is a system where banks verify checks presented for
payment against a list of issued checks previously submitted by the company. There’s
payee positive pay, which involves comparing the image of the payee name on the
check to the payee name included on issue
information provided to the bank.
Most financial institutions offer enhanced authentication procedures that
require the person logging in to prove who
he or she is, usually by asking a series of
questions whose answers are known only
to the user. In addition, there are other
bank security measures available to business clients; one such system reviews
banking activity electronically and generates exceptions that are kicked out for
human review. Often, the banking relationship manager is familiar with the client’s
typical transactions and can place a call to
verify authenticity if the transaction seems
out of the norm. Also, banks that specialize
in business relationships will often customize review processes and authentication procedures based upon the customer’s
request, and CEOs should alert their personal bankers to business changes.
How can CEOs protect data stored externally?
Today, more people are using laptops
instead of desktops, which poses a unique
security challenge, simply because someone breaking into your company can
remove a laptop more easily than a desktop. More employees use laptops in remote
locations away from the protection of the
office environment and network security
systems. Be sure to have a policy about
what information can be stored on laptop
hard drives and require that laptops are
locked up when not in use. It’s not a good
idea to have any accounting or banking
information stored on laptop computers.
Last, be aware of the threats posed by
wireless networks. Without an appropriate
firewall, wireless networks may launch the
company’s financial transactions into
cyberspace where anyone can grab the
information, access the account and transfer the funds.
TERRY AKIN is vice president and regional risk manager for Fifth Third Bank. Reach him at (615) 687-3104 or [email protected].