Paymerang "Are Your Business Payments Safe?" Webinar

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

in partnership with

Are your business payments safe?


SECURING YOUR FUTURE PAYMENTS FROM
FRAUD
Crush Payment Fraud in 2019 and beyond…
- How do you make payments today?
a) Mostly Checks
b) Mostly Checks, some ACH
in partnership with

c) Mostly Checks and ACH, some Credit Card


SECURING YOUR FUTURE PAYMENTS FROM
d) Other
FRAUD
Crush Payment Fraud in 2019 and beyond…
AGENDA

3
FRAUD IS EXPLODING

Source: The Seattle Times

Source: Forbes

Source: Daily Record

4
FRAUD RISK IS HIGHER THAN EVER

This is the second highest percentage


of reported fraud attacks/attempts
since 2009, with the most often
reported source of payments fraud
attacks being Business Email
Compromise (BEC)

Source: 2020 AFP Payments Fraud & Control Survey

5
What is the biggest security threat to your business?
a) Phishing
b) Business Email Compromise (BEC)
c) Malware
d) Distributed Denial of Service (DDoS)
in partnership with

SECURING YOUR FUTURE PAYMENTS e) StoringFROM


data
FRAUD f) Password Attacks
g) Ransomware
Crush Payment Fraud in 2019 and beyond…
EXAMPLES OF BUSINESS FRAUD

XOOM CORPORATION UBIQUITI NETWORKS MATTEL


$30.8 million email scam $46.7 million attack $3 million phishing email scam

7
AGENDA

8
FOUR LAYERS OF PROTECTION AVAILABLE

9
PROTECT THE PAYMENT

POSITIVE PAY ACH PAYMENT


WHY: To ensure only the authorized party on a check WHY: Use of electronic payments that can be trusted through an
can cash that check and reduce the likelihood of established network, where the likelihood of fraud is reduced.
payment to a fraudulent entity.

HOW: Enroll in the Positive Pay service at the financial HOW: Register to use ACH payments with the bank account
institution where check payments are sourced. where payments are sourced and take additional steps to protect
the payment information (i.e. encrypt sensitive data).

VIRTUAL CARDS PROCEDURES


WHY: To limit the exposure of open, higher limit credit WHY: Procedures need to be in place to validate payment
lines that are in use for payments. relationship information before action is taken to modify accounts
or payments.
HOW: Transact using VISA virtual debit cards (vCards) to
limit payments to a one-time use, preloaded payment HOW: Before engaging with vendors or making any changes to
amount. information, the identity of the other party must be verified. Limit
the information your employees can see and do not allow them to
change sensitive data without approvals.

10
SECURE THE OPERATIONS

SECURE ENVIRONMENT FRAUD DETECTION


WHY: All payment data needs be protected in the WHY: To detect fraudulent payments and ensure that only
operating environment where processed. legitimate payments are made.

HOW: Use a combination of a clean desk policy, removal HOW: Verify any anomalous changes made to vendor account
of all payment information from open office view, and a information before processing payments. Assign fraud scores
certified shredding service. based on recent account changes.

TRAINING PROCEDURES
WHY: The payment team members are an important line WHY: To ensure operational controls are present throughout the
of defense for ensuring a secure operation. payment process.

HOW: Conduct security awareness training by qualified HOW: Set up all payment processes with multiple approvals,
staff on a regular basis to ensure team is aware of threats single payment limits and segregation of duties. Implement job
and how to detect suspicious links or fraudulent email rotation and cross-training for payment team members.
addresses. Provide ongoing payment threat awareness Appropriate access controls.
information so the team knows what is considered
suspicious and are ready to respond to it.

11
FORTIFY THE NETWORK

END POINT PROTECTION VULNERABILITY MANAGEMENT


WHY: To ensure that only safe and trusted software WHY: To identify exploitable software and security weaknesses in
run on computers that process payments. the payment system in order to reduce exposure to possible
system compromise.
HOW: Provide protection with the use of anti-virus
software coupled with best in class application whitelisting HOW: Enable a vulnerability management program with regular
technology to protect against forms of malware. security posture scanning, software patching, and expert
penetration testing.

EMAIL DEFENSES THREAT PROTECTION


WHY: To reduce the amount of unsafe email into the WHY: To determine when suspicious actions are being attempted
payment process and protect sensitive information sent in or carried out against the payment system.
payment email.
HOW: Enact intrusion and anomalous behavior detection
HOW: Deploy layers of spam/phishing defenses, including capabilities with multi-factor authentication and full logging in the
spear phishing detection, along with email encryption and appropriate layers of the payment system.
rights management to protect sensitive email content.

12
LOCK DOWN COMPLIANCE

NACHA PCI
WHY: To ensure automated payments are processed WHY: If payment cards are processed or stored there is a security
in a trusted and controlled environment. standard mandated by the Payment Card Industry (PCI) that must
be attested.
HOW: Process payments using the ACH Network which
maintains the highest level of safety and security for its HOW: Implement the PCI Data Security Standard (PCI-DSS) to
participants through governance oversight by NACHA. ensure that cardholder data is maintained in a secure environment
accordingly.

SOC-2 OFAC LIST


WHY: To verify the operating effectiveness of a service WHY: To reduce the likelihood of payments being sent to
provider’s Availability, Integrity and Confidentiality (AIC) individuals or organizations determined to be threats to US
security controls, by an audit expert, for companies national interests.
wanting to use the service.
HOW: Compare the US Treasury Office of Foreign Assets Control
HOW: If you are a service provider, then contract an audit (OFAC) Sanctions List against pending payments and stored
service to conduct a SOC-2 assessment, in accordance with supplier data to identify possible threats.
AICPA Trust Service Criteria.
If you are a consumer of a supplied service, then request
the SOC-2 Report from the supplier and confirm any gaps
in expected controls.

13
Are you 100% confident your payments are fully
protected?
a) Yes
b) No
in partnership with

SECURING YOUR FUTURE PAYMENTS FROM


FRAUD
Crush Payment Fraud in 2019 and beyond…
AGENDA

15
PRACTICAL STEPS

• Positive pay • Clean desk and secure documents • Antivirus Software and whitelisting • NACHA - read it, learn it, train it
• Use one-time use, preloaded • Utilize certified shredding service technology • Do not store banking data if you can
virtual cards • Verify anomalous changes • Vulnerability management program avoid it
• Encrypt account information • Assign fraud scores • Security posture scanning • PCI- Secure cardholder data
• Verify vendors before making • Suspicious links and fraudulent email • Software patching • SOC 2- Security controls for integrity
changes detection training • Expert penetration testing and confidentiality
• Limit employee access • Multiple approvals • Spam and phishing defenses • OFAC- Know your vendor and where
• Require approval for changes • Single payment limits • Email encryption your money is going

• Segregation of duties • Multi-factor authentication


• Job rotation and cross training
• Defined access controls

16
Next
Steps
in partnership with

SECURING YOUR FUTURE PAYMENTS FROM


FRAUD
Crush Payment Fraud in 2019 and beyond…
Secure your payments yourself OR let PAYMERANG help!

ACH Disbursement Card Processing Check Processing


Email remittance same day. Instructions and remittance delivered Checks printed & mailed within 24 hrs
Deposit next business day 90% settle in 3 days (Positive Pay file, custom logo optional)

Recon Recon Recon


Rejects called within one Contact supplier at 7 days Contact supplier at 14
day outstanding days outstanding

18
Would you like to learn more?
a) Yes
in partnership with b) No
SECURING YOUR FUTURE PAYMENTS FROM
FRAUD
Crush Payment Fraud in 2019 and beyond…
CONTACT US

Please send any questions, comments or feedback to:

Matthew Kirkpatrick
Vice President

(804) 868-5794

mkirkpatrick@paymerang.com

20

You might also like