The Key to Wire Fraud Prevention: Out-of-Band Authentication

We take cybersecurity seriously. That’s why we utilize out-of-band authentication, to help make hacking an account much harder for attackers.

Out-of-band authentication is a process where access to an account requires two signals from two different channels. Attackers would have to compromise two separate and unconnected authentication channels, rather than one.

For instance, if you get an email from a vendor, you should call them using the number you previously had on file and confirm that they sent the email. This is especially true if they are giving you new account information. One example is asking you to send money to a different account than one you’ve used in the past.

Similarly, if you get an email from a co-worker that asks you to send money to a new vendor or changes the account information for an existing vendor, confirm it is real. Walk over to their workspace or call them on their extension to confirm. It’s better to ask questions first than to authorize the payment and regret it.

Anyone who is tasked with purchasing supplies or making payments to vendors could be at risk of receiving falsified payment instructions. These fraudsters are smart; it is important to stay vigilant and cautious to avoid sending money to someone who is attempting to trick you in order to receive funds through fraudulent methods. Here are three common scenarios in which someone may try to trick you into a fraudulent transaction:

Security Breach
Your system has been breached and someone’s email account has been hacked. In this scenario, a hacker has gained access to your systems in order to hijack your email accounts. This means that they have an employee’s login credentials and can communicate with you without the employee knowing. The hacker can also make it appear as if an actual employee is sending an email with instructions on how to distribute funds. Oftentimes, the attackers will monitor your communications, and use the information they gather to send a more convincing e-mail.

Vendor Data Hack
The vendor’s system has been hacked. In this scenario, one of your vendors has been hacked, and the attacker sends you an email from the vendor’s account asking for you to make a payment. As in the first scenario, the email will be from a legitimate account of someone you have communicated with in the past. The attacker will also likely monitor communications and jump in after legitimate emails have been sent back and forth, so that it looks like a continuation of a real conversation with the vendor.

Email Imposter
The vendor’s email is spoofed or imitated ¬– and it looks legit. This scenario is different from the first two because no one has actually been “hacked.” Instead, the attacker makes it appear as if they are one of your vendors. These attackers are smart, so the email will look similar to a real email from your vendor. They may copy the logo and the email address will likely be off by only one or two characters. An example is vs.

What’s the solution to each of these scary scenarios? Out-of-band authentication, of course. Contact us to learn more about how we help protect our clients’ accounts using out-of-band authentication.

  • Recent News
    Bridge Bank company logo red black and white
    Bridge Bank Upsizes Capstone Turbine Facility to $15 Million
    Bridge Bank company logo red black and white
    Restoration Robotics Secures $20 Million Loan and Security Agreement with Solar Capital Ltd. and Bridge Bank
    Bridge Bank company logo red black and white
    CytoSorbents Refinances Existing Debt with New $15 Million Debt Facility with Bridge Bank
    Bridge Bank company logo red black and white
    Bridger acquires Old Mill Brick
    Bridge Bank company logo red black and white
    BIOLASE Secures $6 Million Revolving Line of Credit
  • Recent Insights
    Stock image with blue background and hackers attacking a giant computer monitor.
    Don't Get Hooked: How to Spot a Phishing Email
    The Biggest Trends in Hotel Franchising - 2017 Edition
    laptop with someone out of the frame holding a cell phone for two-factor authentication
    The Key to Wire Fraud Prevention: Out-of-Band Authentication
    Woman on a smartphone
    Mobile Banking Helps Businesses On The Go
    A hand inserts a bank card into an ATM
    Consider the Business Benefits of Payroll Cards — and Keep Employees Happy
  • Get Started