Vectra Bank Colorado

The Layered Defense Approach

The Layered Defense Approach

Helping you protect your business from fraud.

Vectra Bank Presents: The Layered Defense Approach

Helping You Protect Your Business From Fraud



Facing Fraud Today
Get familiar with the common schemes and their costs.

The Layered Defense Approach
Implement four pillars to help protect your organization from multiple angles.

Fraud–Fighting Tools
Vectra Bank works with your business to provide products and services that can help address numerous fraud risks.

“Everyday behaviors cost North American companies roughly $3.5 billion annually.”

CyberSource® 2013 Online Fraud Report

Today’s Fraud Threats & Fraud Prevention Strategies


Accounts Receivable Fraud

The Scheme
Your employees are the lifeblood of your business, but they also have the power to deteriorate it for their own gain. Accounts receivable fraud is purely internal, where employees steal funds, in both online and offline settings, and then alter records via fake discounting/write–offs, faulty balancing, and fraudulent debiting. One of the more common accounts receivable fraud methods is called lapping, where employees continuously steal customer payments to cover previous customer payment thefts.

The Impact
According to recent estimates, 80% of the fraud cases are asset misappropriations, including accounts receivable fraud. (Report to the Nation on Occupational Fraud and Abuse. Association of Certified Fraud Examiners (ACFE). 2002.)

Implement common–sense prevention strategies

  • Conduct all business on one or a few computers that don’t allow for any other type of Internet usage
  • Perform daily reconciliation of accounts to find unauthorized ACH debits
  • Follow the same online precautions recommended in the Online Account Takeover section (see below)

Explore Vectra Bank tools to help prevent ACH payments fraud
Learn More

Read More

ACH Payment Fraud

The Scheme
Your business can be targeted for ACH Payments fraud by employees or outside criminals. No matter who’s doing the defrauding, it’s one of the easiest methods of fraud to commit. ACH Payments fraud only requires a checking account number and a bank routing number, which are frequently collected from victims with the help of Trojans and other malicious software.

The Impact
In 2014, 22% of organizations were affected by ACH debits fraud while 9% experienced ACH credits fraud. (2014 AFP Payments Fraud Survey)

Implement common–sense prevention strategies

  • Conduct all business on one or a few computers that don’t allow for any other type of Internet usage
  • Perform daily reconciliation of accounts to find unauthorized ACH debits
  • Follow the same online precautions recommended in the Online Account Takeover section (see below)

Explore Vectra Bank tools to help prevent ACH payments fraud
Learn More

Read More

Wire Fraud

The Scheme
Criminals have advanced methods for stealing credit card data virtually. Once they have the information, they proceed to spend your money through either withdrawals or purchases. Credit card theft is one the most prevalent methods of fraud and can usually be attributed to fake website where you attempt to make a transaction or phishing.

The Impact
In 2013, 14 percent of organizations were affected by wire transfer fraud. (2014 AFP Payments Fraud Survey)

Implement common–sense prevention strategies

  • Call to verify all new payment instructions using a number already on your records
  • Set transfer limits

Explore Vectra Bank tools to help prevent ACH payments fraud
Learn More

Read More

Credit Card Fraud

The Scheme
Criminals have advanced methods for stealing credit card data virtually. Once they have the information, they proceed to spend your money through either withdrawals or purchases. Credit card theft is one the most prevalent methods of fraud and can usually be attributed to fake website where you attempt to make a transaction or phishing.

The Impact
65% of organizations detected transactions executed with their stolen credit cards in 2013. (RSA–2013 Fifth Annual Online Fraud Benchmark Report)

For businesses that experienced attempted or actual payment fraud in 2012, 43% cited credit cards as the method used.* (2014 AFP Payments Fraud Survey)

Implement common–sense prevention strategies

  • Only make purchases from trusted, secure websites
  • Set up purchase alerts or your credit card
  • Review account activity frequently
  • Set usage restrictions for transaction type and amount
  • Never send financial information via regular email (it’s insecure and easily compromised)

Explore Vectra Bank tools to help prevent ACH payments fraud
Learn More

Read More

Check Fraud

The Scheme
As technology progresses, fraudsters enjoy easier access to equipment for reproducing fake checks. Such “bad checks” often accompany lottery scams, check overpayment scams, internet auction scams and secret shoppers scams.

Check washing involves erasing details from a check. Once cleared of its details, criminals can use a check to make fraudulent withdrawals and other types of theft. These checks are most frequently stolen out of mailboxes when someone sends a bill payment.

The Impact
In 2013, 82% of organizations experienced actual or attempted check fraud. (2014 AFP Payments Fraud and Control Survey)

Implement common–sense prevention strategies

  • Mail all bill payment checks directly from the post office
  • Use a special “check writing” pen, available at most office supply stores
  • Order checks with chemically–sensitive paper
  • Pay your bills online
  • Check your bank account often to see what checks have cleared
  • Recognize signs of bad checks, including: no perforations, missing check number, mismatching fonts, handwritten additions, missing address and stains or discoloration
  • Be wary of a low check number (101–400 on personal checks or 1001–1500 for business checks); 90% of bad checks are written from accounts that are less than a year old

Explore Vectra Bank tools to help prevent ACH payments fraud
Learn More

Read More

Online Account Takeover/Enrollment

The Scheme
When a criminal can obtain your personal information or login data, they can sign up for credit cards, transfer money and complete other transactions to steal money, all while posing as you. Online, this type of fraud is achieved via phishing scams, malware forcefully installed on your computer and phony websites made to legitimate so they can steal you log–in credentials.

The Impact
Of the businesses that detected a fraud attempt in 2012, 71% reported that the scheme was online account takeover with fraudulent money transfer. (RSA–2013 Fifth Annual Online Fraud Benchmark Report)

Implement common–sense prevention strategies

  • Keep fundamental computer security features up–to–date, including operating systems, firewalls and antivirus software
  • Never download or install files from unknown sources
  • Don’t click on web ads or pop–ups
  • Access the bank’s website by typing or bookmarking www.vectrabank.com instead of clicking links.
  • Look for the “s” in “https://www.vectrabank.com” when you arrive at the Vectra Bank website.
  • Don’t respond to unsolicited emails, open their links or view their attachments
  • Be aware of inappropriate web surfing activity on computers you use to access online banking. (That is how a lot of malware is loaded onto your systems.)

Explore Vectra Bank tools to help prevent ACH payments fraud
Learn More

Read More

Take A Layered Defense Approach


Layered Defense Approach A growing number of daily business operations are now completed online. And because fraud attacks can come from an ever–increasing number of sources, organizations must establish multiple layers of safeguards, otherwise known as The Layered Defense Approach.

The Layered Defense Approach(LDA) consists of the four key security measures that all organizations should implement. When implemented effectively, the LDA helps mitigate a business’s risk of becoming a fraud victim. The four pillars are an industry standard for cybersecurity.

4 Pillars of the Layered Defense Approach:

  1. Robust, yet easily managed Fraud Monitoring
  2. Multi–Level Authentication to validate and restrict access to your accounts
  3. Secured Web Browsing with deep online coverage
  4. An Adaptive Security Platform that’s customizable to your business

Fraud–Fighting Tools


Gain the collaborative support your business needs to implement the Layered Defense Approach. With the Vectra Bank’s anti–fraud suite of products and services, you can spend as much time as possible reaching toward business goals.

View The Fraud Fighting Tools Table

IBM® Security Trusteer Rapport

What it is: FREE software that complements your antivirus and firewall software to help protect your login credentials, online communications and transactions.
Helps prevent:

  • ACH fraud
  • Wire fraud
  • Account enrollment/takeover
Learn More
Read More

Lockbox

What it is: 3 different tools that can ease the collection of receivables and verify payment sources.

Helps prevent:

  • Accounts receivable fraud
  • Employee embezzlement
  • Check fraud
Learn More
Read More

Positive Pay

What it is: A notification service that can give your business increased control over which checks to return or approve for deposit.

Helps prevent:

  • ACH fraud
  • Employee embezzlement
  • Check fraud
Learn More
Read More

Remote Deposit Capture

What it is: A convenient service allowing your business to deposit checks right from the office with a certified scanner.

Helps prevent:

  • Check fraud
Learn More
Read More

Dual Control

What it is: A feature of all our Online Banking solutions that helps to segregate duties and manage user access for any payment or administration function.

Helps prevent:

  • Wire fraud
  • Electronic (ACH) payments fraud
  • Employee embezzlement
  • Account enrollment/takeover
Read More

Transaction Limits

What it is: a valuable component of Business Online Banking allowing an authorized representative to complete an outgoing electronic payment up to specified amount.

Helps prevent:

  • Wire fraud
  • Electronic (ACH) payments fraud
  • Employee embezzlement
  • Account enrollment/takeover
Read More

EMV Technology

What it is: a security chip is implementing in all debit and credit cards. Vectra Bank Colorado will offer updated POS devices, to help businesses transition as EMV cards become the standard.

Helps prevent:

  • Merchant services loss
  • Card loss
Learn More
Read More

OTP Token

What it is: a security enhancement, which uses one–time passwords to further protect and authenticate a business’s online transactions.

Helps prevent:

  • Merchant services loss
  • Card loss
Read More

ACH Debit Blocks

What is it: A tool that allows you to decide which ACH transactions your business allows to post, better avoiding unauthorized charges.

Helps prevent:

  • Electronic (ACH) payments fraud
Read More

Outsourced Disbursement

What is it: An automated consolidation tool giving your business more efficient ways to process large volumes of payables, and helping reduce expenses.

Helps prevent:

  • Check fraud
Read More

Fighting Fraud Is Everyone’s Responsibility


Please take the time to review your Vectra Bank account and service agreements. They include both customer protections (like Visa’s Zero Liability™ program) and responsibilities. For example, under your Treasury Management Master Services Agreement, you are responsible for your Internal Security Controls and all instructions we receive with your Access Credentials even if not actually sent by you.

You should discuss cybertheft protection with your insurance provider to determine if it makes sense for your organization.

For more information, or to schedule a FREE no obligation consultation, call 800–341–8156, email tmsupport@vectrabank.com or complete the short form below.


**Important Details**
Trademarks: Trademarks or trade names used herein are owned by parties who are not affiliated with Vectra Bank. Use of such marks does not imply any sponsorship by or affiliation with third parties, and Vectra Bank does not claim any ownership of or make representations about products and services offered under or associated with such marks.