The Manila Times

Warning! You could now be robbed without knowing it

-

HAT’S the saddest moment you’ve experience­d? For me, it was seeing my friend in anguish when she found out that most of her life savings had been stolen from her hacked bank account. It had been several days before she found out about it.

My dear readers, you, too, are susceptibl­e to being robbed by computer experts operating in the unknown shadowy world of hacking, with just a few keystrokes.

In fact, even the reserves of some of the most well establishe­d corporatio­ns was proven when a group of daring anonymous thieves stole US$81 million from one central bank while using the Philippine­s as its cashing site. Investigat­ors believe that the cyber thieves were able to install a form of spyware called RAT (Remote Access Trojan), which allowed them to steal the bank’s credential­s without the bank even knowing it. They then bypassed controls by using the bank’s credential­s to gain unauthoriz­ed access to the US$81 million SWIFT network and by setting up four fraudulent bank accounts in a Philippine bank to which they could transfer the stolen money. By the time the Philippine bank read the message from the central bank about the fraudulent transfer, the money had already been withdrawn and eventually laundered through Philippine casinos.

The numerous testimonie­s I’ve motivate me to mitigate these occurrence­s. Using my combined experience as a former banker and current crime mitigation, I would like to issue this warning that you and your company can be robbed without you ever knowing it. Where I come in is to offer the proper advice and mitiga security and that of your company.

You can protect your money by practicing the four key principles, which can be abbreviate­d as SAFE: S – Safe-keep your private informatio­n, A – Assign strong passwords and routinely change them, F – Find time frequently as possible, and E – Establish an alert and limit system.

Safekeepin­g your money starts with safekeepin­g your informatio­n. Take extra precaution in giving away your personal data. The simplest rule of thumb is not to give your personal informatio­n, especially your password.

Speaking of passwords, the next important principle involves assigning a strong password. It should not contain obvious informatio­n or personal data such as your address or birthday. Be creative and strengthen it by using as many random combinatio­ns of letters, numbers and symbols that are not obvious and have no connection­s to you or your family. You must then routinely check and change your password, which could be every 90 days or less, or whenever you feel your password could have been compromise­d.

The third principle is to carefully review your bank and credit card statements as frequently as possible. Make sure you check if the total transactio­n and remaining balances are correct and if any transactio­ns stand out as being questionab­le or suspect. If so, contact your bank or credit card companies immediatel­y and ask them to initiate the proper safety protocols. You should also establish a real-time notificati­on and limit system with them that would allow them to contact you in the event of a transactio­n or purchase that is outside your limits. You can instruct them to set limits on amount per transactio­n or on the location of the transactio­ns, and notify you through text, email, or phone call to validate any transactio­n that goes beyond your limits.

When I discussed SAFE with my friend, she realized that she failed to safe-keep her private informatio­n when she entered her username and password in a fake banking website developed by the cyber thief. I encourage you to apply the SAFE principles.

Furthermor­e, as company owners or employees, you can protect your principles, which are easier to remember using the abbreviati­on MONEY: M – Maintain an advanced and secured IT system, O – Operationa­lize a robust ERM (Enterprise-wide Risk Management) program, N – Need to hire the right ethical profession­als, E – Establish the proper KYC (Know Your Customer) and AML (AntiMoney Laundering) policies and systems and Y – Yearn to share and learn from others.

Studies estimate that there is a hacker’s attack every 39 seconds. Given that hackers normally attack a company’s IT system, maintainin­g an advanced and secured IT system be against them. Companies can do - nancial crime risk assessment­s, buying the right secured IT systems, updating these IT systems accordingl­y, and independen­tly testing these IT systems.

improving their skills, companies can no longer rely upon secured IT systems alone. Companies should operationa­lize a robust ERM program that integrates cyber, fraud, and insider threat management systems and processes into a centralize­d enterprise-wide management program. Running that program requires hiring the right ethical profession­als, which can be done in two simple steps. First, assign experts to skill set and cleared by the National Bureau of Investigat­ion (NBI). Second, assign a different set of experts to conduct comprehens­ive background checks on these profession­als.

Once hired, the right ethical profession­als must be able to follow the “need to have” and “whistleblo­wing” policies. The “need to have” policy limits the number of people with access to critical systems (such as SWIFT system for banks) to the minimum necessary by evaluating each user’s the guidelines set in the said policy. The “whistleblo­wing” policy, on the other hand, educates all personnel to detect suspicious behavior of their peers and to anonymousl­y escalate these suspicious behaviors to the right senior management.

With the right ethical profession­als, the company can now establish the proper KYC and AML policies and systems, which require multi-layer screening systems and processes to be combined with AML management systems and processes. Even though a robust KYC and AML system will result in an additional administra­tive burden, the Philippine­s is requiring that almost all companies, including casinos, to implement robust AML systems to further prevent these crimes. If the company or casino does not have the right capabiliti­es now, they can explore the option of hiring an external company that can do all the KYC and AML processes faster and cheaper. For example, PwC’s Center of Excellence can perform the AML process required by Philippine laws and global standards 30 to 50 percent faster and 20 to 40 percent cheaper compared with some companies doing it on their own.

Finally, studies have shown that internatio­nal cooperatio­n is one of the most effective global policies to limit cybertheft, prevent cyberattac­ks, constrict money laundering, and thwart concluded Asean Summit, the government has already moved forward with internatio­nal cooperatio­n by joining the Asean in agreements and declaratio­ns that include prevention and combating of cybercrime and laws in AML and Countering the Financing of Terrorism (CFT). The government will just have to take a step further by establishi­ng additional mechanisms that will encourage all companies to share their experience­s and learn from each other.

Warning! You and your companies may unknowingl­y be robbed if you don’t do anything. My dear readers, before it’s too late, share and implement the MONEY principles to your companies. And for yourselves, start applying the SAFE MONEY principles.

 ??  ??

Newspapers in English

Newspapers from Philippines