Home Posts tagged protection
Banking & Finance

Knowledge Is Power

Greenfield Cooperative Bank employees

Greenfield Cooperative Bank employees actively participated in scam-prevention education during Cybersecurity Awareness Month.

 

$8.8 billion. With a B.

That’s how much money, according to the Federal Trade Commission (FTC), consumers lost in 2022 to phishing scams and other fraud — an increase of more than 65% compared to 2021.

It’s a number leaders at Greenfield Cooperative Bank (GCB) take seriously, which is why it’s participating, for the fourth straight year, in #BanksNeverAskThat, an online campaign by the American Bankers Assoc. in partnership with banks across the U.S. to educate consumers about the persistent threat of phishing scams.

To combat those attacks, the campaign uses attention-grabbing humor and other engaging content to empower consumers to identify bogus bank communications asking for sensitive information like their passwords and Social Security numbers.

“We are proud to join the ABA #BanksNeverAskThat campaign to educate our customers and the community about how to protect themselves from phishing scams,” GCB President and CEO Tony Worden said. Phishing is a serious threat that can compromise your personal and financial information, and we want to help you avoid falling victim to it.”

“Phishing is a serious threat that can compromise your personal and financial information, and we want to help you avoid falling victim to it.”

Among the bank’s messaging to customers, Worden continued, “we never ask you to provide sensitive information like your account number, PIN, password, or Social Security number in an email, text, or phone call. If you receive a suspicious message that claims to be from Greenfield Co-op, do not click on any links, open any attachments, or reply with any information. Instead, contact us directly using the phone number on the back of your card or on our website.”

Considering the uptick in phishing and other scams — and the continued effectiveness of such techniques — the ABA says such messaging is more important than ever.

“By impersonating a bank, a scammer can steal thousands of dollars with just one text message, phone call, or email,” said Paul Benda, senior vice president for Operational Risk and Cybersecurity at ABA, adding that, with the support of individual banks, “the campaign seeks to turn the tables by arming consumers with the information they need to outsmart the scammers and protect their money.”

Throughout Cybersecurity Awareness Month in October, Greenfield Cooperative Bank shared consumer tips on social media and highlighted the campaign in its branches with posters and employee T-shirts.

Because cybersecurity education and fraud awareness can often be dull and forgettable to many consumers, the #BanksNeverAskThat campaign is designed to be bright and bold, with a bit of comedy.

Lisa Pandolfi, fraud analyst with Freedom Credit Union

Lisa Pandolfi, fraud analyst with Freedom Credit Union, discusses strategies to avoid financial scams with an audience at Southwick Villages.

“Would you rather give up sugar or salt?” one of the campaign’s social-media posts asks users. “Banks texting you about sweet vs. savory would be just as weird as banks texting you a link to log in, ’cause #BanksNeverAskThat.”

The campaign’s short videos offer similarly ridiculous scenarios like wallpapering a room with cash, roasting marshmallows over a cash fire, and recycling cash on garbage day to remind people they stand to lose real money if they aren’t vigilant.

At banksneveraskthat.com, consumers will find a new, interactive quiz; a video game called Scam City; engaging videos, and tips on how to spot phishing scams. This year, the campaign is also offering a Spanish-language version of the website, bancosnuncapideneso.com, and providing a host of other scam education and consumer resources in Spanish.

 

Targeting the Elderly

Greenfield Cooperative Bank has also reached out to local Councils on Aging with tips on how to spot scams, and for good reason. According to the FBI’s 2022 Elder Fraud Report, Americans over age 60 lost $3.1 billion to fraud in 2022, an increase of 84% from 2021. That’s the highest loss amount reported out of any age group.

To combat that trend, Freedom Credit Union announced it has taken action to help its members and the community at large, particularly the vulnerable senior population, protect themselves. Most recently, those efforts included free educational sessions at senior centers throughout the region, including Agawam, East Longmeadow, West Springfield, and Chicopee.

Freedom’s team also led a fraud-education seminar for Health New England employees in Springfield, as well as at the Senior Health and Safety Expo in Greenfield, sponsored by the Franklin County Sheriff’s Office TRIAD Unit.

The next session open to the public is scheduled for Wednesday, Dec. 20 at noon at the Pleasant View Senior Center, 328 North Main St., East Longmeadow. The seminar is free, and lunch is available for $3. Registration is required by Dec. 19 by calling (413) 525-5436.

“We have long been committed to helping our members and community protect their identities and finances from criminals,” Freedom Credit Union President Glenn Welch said. “We regularly communicate with our members about new scams and maintain a robust Cyber Security Center with resources for consumers on our website.”

One recent post on that site details the ‘grandparent scam,’ in which a fraudster acquires a consumer’s personal information through various means, such as mining social media or purchasing data from cyber thieves, then uses that information to contact the victim with a deceptive story, claiming to be in a crisis and needing financial assistance, sometimes even spoofing the caller ID to make it seem as though the name and number are coming from a trusted source.

“We have seen firsthand that seniors are especially at-risk targets, so we developed these free educational seminars to help them shore up their defenses,” Welch noted. 

During these public sessions, Freedom’s security experts discuss how some of the most common scams work, red flags to look for, strategies to maintain security, and resources for those who think they may be victims. Older adults are often prime targets for financial cons, as they may have accumulated significant savings and valuable possessions; may not be as technically savvy to online, social, and telephone scams; or may be perceived as easier to confuse and intimidate.

“People are often embarrassed if they fall victim to these crimes, but it can happen to anyone,” Welch added. “Scammers have become increasingly sophisticated in their approaches, which can appear quite legitimate. Education is essential to prevention. The sessions we’ve held so far have been well-attended and popular. They offer an open and safe forum for seniors to talk freely and ask questions.”

Senior centers or community organization wishing to schedule a financial scam-prevention session at their facility can call Lisa Pandolfi, fraud analyst at Freedom Credit Union, at (413) 505-5717.

 

—Joseph Bednar

Technology

Protecting Yourself from IT Threats

By Charlie Christensen

 

As hackers, organized crime syndicates, and state-backed bad actors aggressively pursue ways to compromise the world’s data; business owners, leadership, and IT professionals continue to seek ways to counter these ever-growing threats to their information technology infrastructure. In this article, I will explore some of these threats, as well as the advancements in anti-virus/malware protection that are working to defend corporate and personal data every minute of every day.

Lastly, I will provide you with some key steps you should take to protect your business and data assets from attack.

Charlie Christensen

Charlie Christensen

The notion that you are just too small a company to worry about these threats, or that no one wants your data is a fallacy. Criminals are targeting small companies every day because they are easy targets.”

As someone who understands the threats we as IT professionals see every day, it is my hope that I can use this opportunity to provide the average businessperson with a better understanding of what they should focus on most urgently in today’s technology environment, and how they can better protect their business from being compromised.

• Ransomware: This is every company’s worst nightmare and is a topic that we could dedicate an entire article on. In short, ransomware is an extortion scheme that costs businesses billions of dollars per year. It most commonly spreads via malicious email attachments or links, software apps, infected external storage devices, and compromised websites.

Ransomware searches out every computer on the network and seeks to encrypt the data it finds. The only way to get the data back is to pay the extortion, usually via cryptocurrency which is largely untraceable. Not content with simple extortion, cybercriminals are now adding an additional element to the ransomware scheme.

Attackers will now download your data prior to encryption, and if you refuse to pay, they will threaten to release your data into the public domain. If the thought of this doesn’t lead you to a few sleepless nights, it should.

• Phishing, spear phishing, and whaling attacks: I think by now we all understand phishing. An attacker uses social-engineering techniques, like an enticing looking link, to get the end user to disclose some form of personal information such as a Social Security number, information, credentials, etc. Spear phishing, however, is a bit more focused and targeted. A spear-phishing message might seem like it came from someone you know or a familiar company like your bank or credit card company, shipping company, or a frequented retailer.

Whaling, on the other hand, goes after high-value targets such as C-level leadership or accounts payable. A whaling attack might look like an email from the CFO asking you to initiate a transfer to pay a large invoice. This is an incredibly common attack vector and one that relies on your team’s ability to identify it. Education and vigilance are your best defense.

• Advanced persistent threats: APTs happen when an intruder gains access to your systems and remains undetected for an extended period. They seek to quietly extract data such as credit card data, social security numbers, banking information, and credentials. Detection relies on the ability to identify unusual activity such as unusual outbound traffic, increased database activity, network activity at odd times. APTs also likely involve the creation of backdoors into your network.

• Insider threats: Although we are fixated on external threats, internal threats are more common and can be equally as damaging. Examples of intentional and unintentional threats include:

Intentional threats such as employees stealing data by copying or sending sensitive or proprietary data outside the company. This may occur via email/FTP, USB drive, cloud drive (One Drive, Dropbox, iCloud), or some other means. Often, these happen because someone fails to comply with security protocols because they are perceived to be inconvenient or “overkill.”.

Unintentional threats might include an employee clicking on a phishing email, responding to a pop up asking for credentials, not using a strong password, or using the same password for everything. It could also be a system that was not patched, a port that was left open on a firewall, or forgetting to lock a user account after termination.

• Viruses and worms: Frequently considered to be ‘old school’ threats, these still exist and can cause tremendous damage. Users should be careful about clicking on ads, file sharing sites, links in emails, etc. Their purpose is to damage an organization, systems, data, or network. However, traditional anti-virus software is usually effective at controlling them.

• Botnets: Simply put, a botnet is a collection of devices that have access to the internet like PCs, servers, phones, cameras, time clocks, or other commonly found networked devices. These devices are then infected by malware that allows criminals to use them to launch attacks on other networks, generate spam, or create other malicious traffic.

• Drive-by attacks: These are infected graphics or code on a website that gets injected into your computer without your knowledge. They can be used to steal personal information, or inject trojans, exploit kits, and other forms of malware.

While this list might seem exhausting, it only represents a few of the more common attack methods that we see daily. It also helps explain the emergence of a new generation of security products and platforms. To better understand how we look at information security, let me borrow one of the examples I commonly use when speaking to businesspeople and groups about building an effective Information Security Program.

Think of information security as an onion. Like an onion, information security programs are comprised of layers (firewall, backup, AV, email filtering, etc…) of protection surrounding the core (your data). As we build an information security program, we need to put layers of protection between the threat and the asset we are trying to protect. While the details of an information security program are outside the scope of this article, for the purposes of this discussion you only need to understand that there is no single magic product that can protect you from all threats. Anti-virus, or even the new generation endpoint detection and response (EDR) products are but one layer of protection in an over-arching strategy to protect your business from modern threats.

A brief history of antivirus (AV) products has them coming onto the scene in the late 1980s, with familiar names like McAfee, Norton, and Avast. These early products relied on signature-based definitions. Much like you look up a word in the dictionary, these AV products could catch defined threats, but they would easily fail to prevent attacks that had yet been discovered; or worse, that they had not yet downloaded an update for that would allow them to recognize the threat. Traditional AV changed very little until several years ago with the advent of Next Generation Antivirus. NGAV uses definitions coupled with predictive analytics driven by machine learning to help identify undefined threats.

The latest technology to hit the market is enhanced detection and response (EDR) or extended detection and response (XDR). These technologies continue to use traditional signature-based antivirus and NGAV, but they also introduce the use of artificial intelligence (AI).

AI is used to constantly analyze the behavior of devices so it can detect abnormal activities like high CPU usage, unusual disk activity, or perhaps an abnormal amount of outbound traffic. This new generation of software not only detects an attack and warns you that it is occurring, but it can also isolate the attack to the device(s) that are infected by automatically taking them off the network and protecting the rest of your network. Some EDR products like SentinelOne also have threat-hunting capabilities that can map the attack as it unfolds. This mapping aids IT professionals in the identification of devices involved in the attack; a process that can take days or weeks when performed manually. XDR even goes a bit further in that it looks beyond the endpoint (PC, laptop, phone) and looks at the network holistically.

A good example of how EDR systems are being used as a layer of protection is how SonicWall firewalls combine a physical firewall with a suite of security capabilities like content filtering, DPI-SSL scanning, geo-blocking, gateway antivirus, and more to filter traffic before it enters your network. Then, with the addition of their Capture Client product (a collaboration between SonicWall and SentinelOne), they integrate the power of SentinelOne EDR with the firewall’s rules. This allows you to extend protections beyond devices inside the network and include company devices outside the network as well. This helps to eliminate gaps in protection that can exist with remote users.

The notion that you are just too small a company to worry about these threats, or that no one wants your data is a fallacy. Criminals are targeting small companies every day because they are easy targets. Large companies have armies of highly educated and well-paid people protecting their networks. And while a large company might represent a big score, hackers can spend years trying to penetrate a large network. However, they know smaller organizations have limited budgets and staff to protect their network. This makes it far more lucrative to hit 50 or 100 small companies for $100,000 than a single large company for, say, $2 million.

Investing in modern security products, building a sound information security program, and educating your team will pay off in the long run, as the question is not if you will be attacked — but when. The cost of the systems to protect you is far less the frequently irreparable harm caused by a breach or infection.

Many people say, ‘I have cyber insurance,’ but fail to put the necessary precautions in place to protect their systems and data. Little do they know that when they filled out the pre-insurance questionnaire and answered ‘yes’ to all the questions, they gave the insurer the ability to deny the claim. If you do not have written policies, use EDR (or at least NGAV), have a training program in place, and use multifactor authentication to protect user logins, you could be sealing your own fate. Insurers are no longer baffled by today’s technology and are aggressively investigating cyber claims. In fact, we are seeing significantly increasing numbers of denied claims.

There is little you can do after the fact to offset missing protections or enforcement of policies. By taking the appropriate steps to protect your network and systems you can hopefully minimize the risk of falling victim to an attack and ensure that your insurer will cover such a claim. Insurance companies will go to great lengths to cover legitimate claims at great cost. In fact, they can be their own worst enemy. In many ransomware attacks, insurance companies will simply pay the ransom because it is more expeditious to do that than it is to pay for the actual remediation. This, of course, only encourages the criminals while leading to higher premiums and greater risk to our technology infrastructure.

To close, I’d like to leave you with a few things that you can do to better protect your systems, data, and network.

• Take the time to understand what protections you have in place and engage a professional to help you identify any gaps in your information security strategy;

• Educate your staff on information security best practices and the threat spectrum. An educated workforce is one of your best protections. There are several great training tools that are inexpensive and easy to implement, such as KnowBe4;

• Implement a next-generation firewall that utilizes deep packet inspection and take the time to dial in the suite of security features that are designed to stop threats before they get into the network;

• Move to an EDR system rather than relying on a traditional signature-based antivirus;

• Be sure that all systems with access to your networks (computers, network equipment, servers, firewalls, IoT devices, cameras, etc.) are patched regularly to eliminate vulnerabilities that can be easily exploited;

• Do not run unsupported operating systems, equipment, or applications;

• Establish a set of written information security policies, and make sure everyone understands that they need to live by them; and

• Limit those with administrative credentials on your network. If an administrative account is compromised, you have given away the keys to the kingdom. Make sure users only have permission to get to the resources they need to do their job.

 

Charlie Christensen is president of East Longmeadow-based CMD Technology Group; http://www.new.cmdweb.com/; (413) 525-0023.