This document discusses cyber security threats and fraud prevention tactics. It provides examples of common phishing scams and outlines tools and best practices for safeguarding information. Some key points include:
- Cyber threats have increased with cloud, mobile, and remote access adoption and fraud can occur across businesses of all sizes.
- Over half of businesses surveyed were more concerned about cyber threats in 2015 and over 60% experienced payment fraud in 2014.
- Common phishing scams include impersonating businesses in emails or texts to get users to click links or reply to fake conversations.
- Recommended safeguards include employee training, dual authorization, daily transaction reviews, and using security tools like IBM Trusteer Rapport.