Service Center
21 ways to protect your business from fraud and identity theft
Business fraudsters and identity thieves are clever and determined and can quickly take advantage of business owners that do not take certain precautions to protect their business.
The following are some of the proactive actions that you and your employees can take to help prevent criminals using your business’s identity information to steal from you or commit fraud in your name.
1. Enact security and authentication controls to protect against fraudulent wire transfers and electronic transactions.
Wire transfer and electronic payment fraud are serious threats to businesses. Through spyware and compromised banking credentials, criminals can initiate fraudulent payments and transfers out of the business’s bank account. Because these transactions occur quickly, businesses often do not catch the fraud in time and are too late to stop the transfer or recover the funds. Businesses hit by wire transfer fraud regularly suffer significant losses and may only recover some, if any, of the stolen funds.
If your business employs wire transfers, contact The Provident Bank and request double or dual authentication on any wires. That means a wire won't automatically be originated when someone requests it. The bank must take the additional step of obtaining a second authorization from someone at your business -- in writing or in person -- before completing it.
If your business does not use wire transfers, consider inquiring with your bank if you can filter, limit or block wire transfers altogether.
2. Monitor and reconcile your business accounts daily.
Frequent account review and immediate reporting of suspicious or fraudulent transactions can reduce your business's liability and potential fraud loss. Online banking allows you to quickly log in to your bank account and view your business account balance and transactions. The Provident Bank also provides email alerts regarding your account activity, which can help alert you to suspicious transactions. Through online banking, you can also eliminate mailed paper statements which can further reduce the risk that your business banking information may be stolen or exposed.
3. Think "security" when you access your accounts online.
4. Be wary of phishing scams.
Phishing email scams are designed to trick you or your employees into revealing confidential personal and business account information (e.g. SSN, employer identification number, taxpayer identification number, account number, username, password, etc.) The IRS, government agencies and legitimate financial institutions never request that you provide or "verify" this information through email communications. If you or your employees receive such an email, notify your bank's fraud department. Do not respond to the email and do not click on any links or open any attachments in the email as doing so can connect you to a fraudulent website and/or cause spyware to be installed on your computer.
5. If you pay by company check, enroll in Positive Pay.
Provident Bank offers Positive Pay services, which can significantly reduce business check fraud losses. When you write business checks, you provide the bank with a list of check numbers and dollar amounts. The bank compares any checks received for payment against your list. If a check doesn't match, it is identified as an "exception" and is not paid.
6. Keep your business checking account supplies secure.
Check stock, deposit slips, endorsement stamps and all other checking account supplies and records should be kept in a secure location not accessible by unauthorized persons.
7. Keep all documents containing business information or business identifiers in a safe, secure location not accessible by unauthorized persons.
Be certain to protect and secure hard copy documents that contain business identifiers, account numbers and other sensitive information at all times. Be mindful of all persons that may be able to view or have access to these documents (authorized or not), including clients and customers, visitors, contractors, cleaning crew personnel, etc.
8. Securely shred old or unnecessary documents that contain your business information or business identifiers.
Shred any old or unnecessary documents containing business license numbers, business registrations, EIN/TIN, account numbers, etc. using a cross-cut, confetti cut or diamond cut shredder. You can also employ the services of a secure document destruction company. Any documents waiting to be shredded should be placed in a secure locking receptacle or locked storage room not accessible by unauthorized persons.
9. Maintain an inventory of accounts and key contact information.
Keep a list of your business accounts, including creditor/financial institution, account number(s), card number(s), etc. for billing and fraud departments in a safe, secure location to minimize the time required to make notifications in the event that fraud is discovered.
10. Carefully review and reconcile account statements as soon as they are received.
Be alert for unusual or suspicious purchases or transactions and promptly contact the creditor if you discover any unrecognized or fraudulent activity, no matter how small. Be aware that a common criminal tactic is to make small purchases on a compromised card, typically $5 to $10, and wait to see if the fraudulent transaction is noticed before making larger purchases.
11. Ask trade and credit references to notify you if they are contacted.
If your business provides or maintains a list of trade or credit references, request each reference to notify you if they are contacted by a third party. Protect and Regularly Review Your Business Credit File
12. Review your business credit reports.
Though Dun & Bradstreet may be the best recognized source of business verification and business credit reporting, the 3 national credit bureaus (Equifax, Experian, and TransUnion) also provide business credit services. You can obtain copies of your business credit reports from each of these organizations and review them for suspicious activity and to ensure that the information is accurate. These organizations also offer fee-based services to monitor your business credit file and alert you to changes.
Dun & Bradstreet | www.dnb.com | Toll free: 1-800-234-3867 |
Equifax | www.equifax.com | Toll free: 1-800-525-6285 |
Experian | www.experian.com | Toll free: 1-888-397-3742 |
TransUnion | www.transunion.com | Toll free: 1-800-680-7289 |
13. Keep your business and personal finances separate.
Avoid using your personal credit cards, accounts and lines of credit for business and instead use business cards for business-related expenses and transactions. If a business account is compromised, any personal payment methods (including card or account numbers) associated with that account may also be compromised.
14. Restrict the use of your business computers to only business activities.
Activities such as casual internet surfing, use of social networks (e.g. Facebook, Twitter, LinkedIn), online gaming, downloading programs and file sharing, expose your business computers to viruses and spyware that can jeopardize your business operations, your accounts and the confidential information of your business, customers and employees.
15. Install and use regularly updated anti-virus/anti-spyware/Internet security software.
Be certain to install a program that actively scans and is frequently updated to keep up with new threats.
16. Keep security patches and updates current.
It is critically important to regularly check for and install any security updates for your computer’s operating system and internet browsers to ensure that you have the latest versions designed to protect against known software vulnerabilities. You should set your system to check for and install important security updates no less than weekly.
17. Install and use a firewall on your business computers or network.
A firewall is a software program or hardware device that monitors and controls external connections to your computer and/or network. Many routers include a built in firewall that helps prevent unauthorized or unwanted external connections. Be certain to change the default administrative password on your router.
18. Secure your business's wireless network.
If your business uses a wireless network and it is not secured (encrypted), others can gain access to your network. Average Wi-Fi signals can extend for a few feet beyond the perimeter of the building. Off-the shelf wireless network devices typically do not come with their security features activated. You must review the product documentation to learn how to set the security features for your device or call the manufacturer if you need assistance. WPA2 is the most commonly used wireless network encryption standard and is available on most modern wireless network devices. Be certain to change the default administrative password on the wireless router.
19. What you and your employees don't know can hurt your business.
Protecting your business and the sensitive information of your business, customers and employees is the responsibility of everyone in your organization. Properly trained employees are your first line of defense because they understand the risks, know how to protect information and can recognize and stop fraud and information security risks before they impact your business.
20. Who is Database and domain privacy services.
Thieves, scammers and spammers frequently peruse the public Who is database, which provides information regarding the registered owner of an internet domain name (including owner name, key contacts, address, email and telephone number) that can be used in a variety of scams and also for spam email. If your business owns one or more internet domains and/or maintains a website, you might consider opting for a domain registration privacy service which replaces your business information in the Who is database with that of the domain service provider. Your business retains full ownership and control of the domain, but your information is better protected from scammers, spammers and prying eyes.
21. Beware of Social Engineering.
Social engineering is the art of manipulating people so they give up confidential information. In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person or researcher. He or she might even offer credentials to support a false identity. However, by asking questions, the crook may be able to piece together enough information to infiltrate an organization's network.
In order to protect your business against social engineering:
For more information visit the Provident Security Center
US Cert Website: http://www.us-cert.gov/home-and-business
APWG: Unifying the Global Response to Cybercrime Website: http://www.antiphishing.org
Much of this information came from the Business Identity Theft Organization at: http://www.businessidtheft.org/