Cyber and Mobile Security

As consumers’ and businesses’ reliance on electronic devices such as computers, tablets, and smartphones to bank and shop online increases, so do the threats posed by cybercriminals and hacktivists who want to steal personal and financial information or disrupt access to online services.

 Financial Services Information Sharing and Analysis Center
The FS-ISAC gathers threat, vulnerability, and risk information about cyber and physical security risks faced by the financial services sector. Sources of information include commercial companies who gather this type of information, government agencies, CERTs, academic sources, and other trusted sources. After analysis by industry experts, alerts are delivered to participants based on their level of service.  Join Now

Top Issues

Many of the attacks are launched through malicious software, or “malware”, that a user has unknowingly downloaded onto their workstation or device, often through:

  • Opening an infected attachment, document, photo or video.
  • Visiting an infected website.
  • Accepting fake requests or notifications through social networking sites.
  • Inserting an infected USB drive into the device.

Once the malware or Trojan is downloaded onto the device, it can:

  • Capture sensitive data such as passwords and account information.
  • Allow the cybercriminal to infiltrate and access the user’s files, databases, and network to perform unauthorized transactions or surveillance.
  • Turn the device into a “bot” or “zombie,” including it in a network of infected computers (known as a botnet) that is used to send spam, spread viruses, attack computers and servers, and commit other kinds of crime and fraud on a large scale.

October is National Cyber Security Awareness Month

October is National Cybersecurity Awareness Month. ABA developed the following resources to help bankers promote consumer awareness about cybercrime.

Customizable Press Releases
Customizable Tip Sheets

Protecting Customers

To help ensure users’ safety while offering the convenience of online banking, financial use sophisticated technology and monitoring techniques, intricate firewalls and other methods of securing customer data to include multifactor authentication, encryption, privacy policies and training, anomaly detection, and more.

Customers, too, play an important role in protecting financial information through education and the use and regular updating of technological protections such as anti-virus software, anti-spyware and firewalls.

Cyber Awareness Calendar

 
  • June is National Internet Safety Month
  • October is National Cyber Security Awareness Month

For more information, see:

Online Banking: Convenient. Popular. Safe.

Online banking makes managing money convenient for millions of American households. With a few clicks of a mouse, customers can check deposits and pay bills, saving time and giving them more control over their finances.

To help ensure your safety while offering you this convenience, banks use sophisticated technology and monitoring techniques, intricate firewalls and other methods of securing customer data.

  • Multifactor authentication.
    Banks use more than one method for verifying a customer’s identity before granting online account access. Forms of identification may include something you know (password or PIN) and something you have (ATM card, smart card). Banks also use authentication methods that you may not see, but that nonetheless assist them in knowing if you are who you say you are.
  • Encryption.
    Banks secure your transactions and personal information online using encryption software that converts the information into code that only your bank can read.
  • Privacy policies and training.
    All banks have stringent privacy policies. Employees are trained to treat your confidential information with the utmost care, meeting or exceeding federal and state mandates.
  • Fraud prevention.
    Banks typically use programs that monitor your account to help detect unusual activity. Customers, too, play an important role in protecting financial information. Here’s what you can do to enhance your online security:
    • Use a strong password.
      Experts advise using a combination of letters, numbers and characters, and caution you not to use easily guessed passwords, such as birthdays, children’s names or home addresses. Change your password regularly and do not use the same password for multiple accounts.
    • Keep it to yourself.
      Don’t share your password or any personal information online with anyone.
    • Avoid fraudulent Web sites.
      To help ensure the Web site you have visited is authentic and secure, when conduct¬ing financial transactions online look for a lock icon on the browser’s status bar or a Web site URL that begins “https:” (the“s” stands for “secure”).
    • Protect yourself online.
      Don’t click on pop-ups claiming that your com¬puter is infected or offering discounts, as you may be installing malicious software (“malware”) on your machine.
    • Use antispyware.
      Install and regularly update virus protection software that detects and blocks “spyware”—programs that can give criminals access to your computer.
    • Be wary of e-mail.
      Do not share sensitive information via e-mail. If you receive an unscheduled or unsolicited e-mail claiming to be from your bank, proceed with caution. Close the email and log on to your bank’s online banking yourself or check with your bank to make sure it’s legitimate.
    • Monitor your account.
      Check your online balances and paper statements frequently to spot any fraudulent activity—and report it immediately to your bank.
    • Log off.
      Remember to sign off your bank’s secured area when you have finished online banking. Also log off of your computer to prevent unauthorized access to your information and files.
  • Your protections.
    Individuals are protected against unauthorized elec¬tronic fund transfers, provided there is compliance with the institution’s disclosed reporting requirements. Contact your local banker for information about protections and liabilities.


Regulatory Guidance


Publications


ABA Resources


ABA Endorsed Solutions


Other Resources

 

Questions? Please contact Doug Johnson for more information.