Confidential – For Discussion & General Information Purposes Only
Cyber payments fraud
February 2020
Cyber payments fraud February 2020 Confidential For Discussion - - PowerPoint PPT Presentation
Cyber payments fraud February 2020 Confidential For Discussion & General Information Purposes Only Online Payments fraud agenda New and evolving threats in the fraud landscape Critical strategies your organization needs for fraud
Confidential – For Discussion & General Information Purposes Only
Cyber payments fraud
February 2020
2
Online Payments fraud agenda
3
Payment fraud trends
82%
80%
as a result
52%
$26.2 Billion dollars lost to BEC fraud
Sources: The 2019 AFP Payments Fraud Controls Report and The Federal Bureau of Investigation, Internet Crime Compliance Center (IC3)
4
Source: 2019 AFP Payments Fraud Controls Report
70% 45% 29% 33% 0% 10% 20% 30% 40% 50% 60% 70% 80% Checks Wires Credit Cards ACH Debits 2015 2016 2017 2018
Trends by payment type
5
counterfeits, but when isn’t it as effective?
alteration fraud
payee
effective*
Positive pay
* Wells Fargo metric
Positive Pay effectiveness
6
from a legitimate check
transactions using legitimate account numbers
052047 204790 1 90 1230009 3000999 5 99 55555 555
052047 04790 1 90 123000999 000999 5 55555 55ACH Debit Fraud
7
Attack spanning large to small organizations
New threats in the world of fraud
Mobile malware Social engineering Unauthorized apps Fraudulent apps Lost Devices
Mobile banking on the rise: Increased risk for carelessness or speed
Source: FBI PSA dated 4 May 2017, Alert # I-050417-PSA
8
Protect devices
Follow entity policies
Apps from trusted sites
Mobility and technology best practices
Keep devices up to date
Be aware of open networks
To protect your organization, be aware of these threats.
9
Fraud Attacks: The Schemes That Stand Out
10
Business email compromise
The biggest threat for 2019 and beyond?
Sophisticated fraudsters + Time and patience = Significant losses
11
If you receive a request from a vendor or executive to change payment details such as account or invoice information, always make sure the request is authentic.
request is made electronically.
change.
Never use the information provided in the request, as it may also be fraudulent.
Dual custody requires two users on different devices to initiate and approve online payments, payment instruction changes and administrative changes. This serves as a second chance to spot a fraudulent payment before it goes out the door.
details, and note any changes from the information you have on file.
payment and payment instructions.
30 days, it’s important to pay close attention to your account activity.
Steps to protect against impostor fraud
12
to access your online accounts directly
account takeover incident
confidential information
send unauthorized payments
What is Account Takeover fraud?
13
security measures to reflect your
respond in case of a fraud attack
most powerful protection.
Know your organization’s critical needs
14
Verbally Authenticate all requests for payment or account change requests
request Vendor/Trading partner awareness
Educate your entire staff
by email — even from executives
Best Practices
15
15
As soon as possible, meet with your:
support necessary changes to mitigate risk.
If you suspect fraud, immediately contact your bank Call to Action - Help increase awareness of fraud
16
Fraud websites for additional fraud assets
security/)
Fraud checklists
io-items/tm3232/
io-items/tm3167/
Resources for more fraud protection information
Note: to use the links, highlight the link, right click and select “Open Hyperlink” – if reading hard copy, enter the https address on your browser.
17
Contact your respective financial institution for additional information. Or Email us at treasurysolutions@wellsfargo.com For questions and comments
Thank you