Unauthorized access to information by a fraudulent party.
What is a data breach?
Using a method outside of a password to authenticate someone logging into a system.
What is two-factor authentication?
This is clicked whenever a suspicious email comes into your mailbox.
What is the report phishing button?
These must be worn by all team members and used when scanning in and out of areas and FOC buildings.
What is your Employee Badge?
These are added to your phone to identify who you are when logging into our banking portals.
What are security tokens?
People who attempt to gain unauthorized access to computer networks.
Who are hackers or fraudsters?
Uniquely assigned identifiers used to log into windows, banking portals, etc.
What are Account or Login ID's?
A type of scam used by fraudsters to target business communications to insert themselves into the process
What is email fraud or email compromise?
Done every time you step away from your computer while at home or in the office. Can allow access if missed.
What is locking your computer?
This document and procedure assures that wires of specific monetary levels have the right people approve them as needed.
What are our wire approval levels?
These are large scale attacks that request specific demands be met to lift the attack.
What are ransomware attacks?
These can help you generate and store your passwords across applications and online sites.
What is a password manager?
A cyber attack that is specifically geared towards larger high profile targets.
What is whaling?
Theft of personality information like date of birth, credit card, bank account, or social security number.
What is Identity or PII theft?
This tool is used as wires are received as part of their validation process.
What is Giact?
Using knowledge of human nature and social skill to steal passwords, token keys or other credentials to gain access to systems.
What is social engineering?
Passwords
The fraudulent practice of sending e-mails from a known or trusted sender in order to induce target individuals to reveal confidential information.
What is spear fishing?
This is done to all documents containing sensitive information from our clients or the FOC once we're done with them.
What is shredding or placing into shredder bin?
These instruct us on where a wire is going and the correct account and routing information to use.
What are wire instructions?
The weakest link in any computer system.
Who are humans?
Asked when first setting up a profile for a website and is used when attempting reset your password.
What are security questions?
Software designed to damage and destroy computers and computer systems.
What is malware or viruses?
This is when a fraudster follows behind someone badging into an area in hopes of unauthorized access.
What is piggy-backing or tail-gaiting?
This law was meant to protect investors from fraudulent accounting and resulted in all public companies needing extensive yearly auditing.
What is the Sarbanes-Oxley Act of 2002, or SOX for short?