Instances of Internet fraud and other data related crimes have been increasing dramatically and becoming progressively sophisticated. Cyber-attacks on organizations via security loopholes and un-patched servers have increased over 80 percent in the last two years as intruders look for industry or identity data theft.
Recently the FBI, in conjunction with the Secret Service, Internet Crime Complaint Center (IC3) and the Financial Services Sharing and Analysis Center, has released a document outlining the various methods being used — along with the growth of frequency and sophistication of cyber crime.
The good news is that you can be proactive and protect yourselves from these types of illegal activities. Your best defense is first to understand the methods being used by cyber criminals. Understanding not only how they access your critical data but also how the data is used can help you identify your most vulnerable assets. Next is to understand the technologies and methodologies you can implement to protect yourself and your data. Real-time intrusion monitoring is one critical element. Having access to certified security experts who can review threatening situations and assess your threat level is paramount.
I encourage you to review the government advisory document which outlines how cyber criminals operate and the basic recommendations you can take to reduce the likelihood of fraud in your organization. Here is an excerpt from the article that outlines tips to protect your organization, detect fraud and respond to suspicious activity.
- Educate everyone on types and sources of fraud
- Enhance security within the network systems to protect against fraud
- Enhance the security around banking processes and controls
- Understand responsibilities and liabilities
- Monitor and reconcile accounts daily
- Discuss options offered by your financial institution
- Note any changes in performance
- Pay attention to warnings
- Be on alert of rogue e-mails
- Run regular system scans for viruses and malware
- Develop a response system
- Ensure employees know who key contacts are
- Possess key contact information for your financial institution
- Maintain written chronology of events
- File police report
- Have a contingency plan for compromised systems
- Consider other data/systems that may be at risk
- Report exposure to PCI/DSS
If you do not have the appropriate internal resources to assist with fraud protection, detection and responses, be sure to find a provider that understands the risks associated with cyber crime. It’s also important to work with someone who understands your industry and business processes.
Visit the IC3 website to read the full article, Fraud Advisory for Businesses: Corporate Account Take Over.
For more information, please contact RSM technology practice director Aaron Donaldson at 641.494.2127.