Treasury Management – Manage and Protect Your Funds More Effectively

Screen Shot 2016-04-25 at 11.51.43 PM

Moving money and executing transactions is easier than ever, but what is your business doing to make sure your funds aren’t at risk? From the most elaborate cyber attacks to a simple unauthorized alteration on a check, you could be vulnerable to all kinds of fraud.

Financial institutions have processes and procedures in place to help protect against fraud. But the increasing risk and sophistication of cyber crimes in particular, both at home and in the office, makes it especially important for everyone to be vigilant and cautious. That’s why Grandpoint continually invests in tools and resources to help detect potentially fraudulent transactions and accounts with a high potential for fraud. We believe it is equally important for our clients to understand the risks and be aware of the steps you can take to help protect your business assets. We want to share a few of the practices we follow and the products we offer to help you minimize your vulnerability.

With so many ways that passwords can be compromised – from inadvertent sharing with others to malware that mines your personal information — protecting the secure access to your online accounts is crucial. Ever heard of a keylogger? It’s malware that captures and records a user’s keystrokes. It can be used by a cyber-criminal to record your passwords and a variety of other information. As a deterrent to these kinds of compromises, Grandpoint business clients use a secure access code to access their accounts through online banking, and the associated password expires every 90 days. This precaution helps protect against a possible breach if your password falls into the wrong hands.

Most people know that Internet connections can be vulnerable to compromise. Various layers of protection are available, including firewalls, anti-virus software and network encryption, but cyber criminals are always working to try to break through these barriers. That’s why these programs are continuously updated and why keeping current with each new release is so critical. To provide a secure web channel between our client’s computer and the bank’s online banking site, so that no other user can get in the middle, we offer Trusteer Rapport software to our business clients. This free, downloadable software helps to prevent malware and phishing attacks and provides sustainable fraud protection.

One of the most frequent targets for cyber thieves are ACH payments – payments created when you give an originating party authorization to debit directly from your checking or saving account for the purpose of bill payment. To commit ACH fraud, all a cyber thief needs is your account number and the bank routing number, which can be taken directly from an unsuspecting victim’s check. Our ACH Fraud Protection Services enable business clients to review these transactions before they are complete and to choose to pay or return each item, to guard against fraudulent automatic withdrawals. If you know you won’t be using these electronic payments, we can set up an ACH block so that no ACH payments are allowed. Or, if you only expect ACH withdrawals from a handful of vendors, you can restrict your ACH authorization to just those few vendors.

As an added layer of protection, your online banking profile can also be IP address-restricted, meaning if a request to transfer funds from your Los Angeles-based company is issued by an IP address located in New York, the transaction will be rejected. Our Risk Fraud Analytics system reviews all of your company’s transactions for other anomalies as well. You also have the option to set a maximum dollar limit for transactions you may initiate. If that limit is exceeded, the transaction will automatically be rejected. In addition, you’ll be alerted if someone changes a password, user entitlements, dollar limits and more. Business clients can also set up dual control on their wires and ACH transactions. This can reduce employee fraud, but it also makes it more difficult for cyber criminals to complete a fraudulent transfer since two people within the business must sign off on these transactions.

One of the most prevalent types of fraud today is cyber deception, which is usually the result of human error – falling victim to complex scams in which criminals pose as a trusted colleague, business associate or vendor in order to gain access to your financial assets. It is particularly hard to detect. These schemes are typically executed via email, but cyber criminals have become increasingly adept at spoofing phones as well. What you believe to be a legitimate request could result in you unwittingly paying a crook. For more on this topic, please refer to the cyber security article from the FBI we republished on our blog.

Of course, fraud schemes aren’t always so sophisticated. If someone has altered a check you’ve issued, you might never notice – until it is too late. A simple safeguard against this kind of theft is our Positive Pay Service. You provide the bank with what is essentially a digital check register and we match it against the checks presented for payment. If we see any discrepancies, we notify you so that you can review and decide whether or not the check should be paid. All checks presented for payment are verified, including checks presented in person at our banking offices.

Businesses with a high volume of checks arriving through the mail are at risk of crooks intercepting these payments. We offer a layer of protection through our Lock Box Service, which streamlines the remittance process. Payments are sent to a secure post office box where they are collected by the bank several times a day and deposited directly into your Grandpoint account. The post office box and speedy collection system help minimize the opportunities for the check to be intercepted after it’s placed in the mail. The service also provides timely payment receipt reporting and provides you access to electronic and paper remittance images online to update your receivables or research customer questions.

To discuss how you can layer additional treasury management protections onto your business accounts, contact your Grandpoint Bank relationship manager or call any of our offices.

screen-shot-2016-09-28-at-7-28-21-pm

fbtwitterLinkedIngp

 

Posted on April 26, 2016, in Fraud protection and tagged , , , , , , , , , , . Bookmark the permalink. Leave a comment.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: