National Bank of Arizona on Facebook  National Bank of Arizona on YouTube Google Plus Subscription Page
National Bank of Arizona
Please be aware that not all of the content on this page originates from National Bank of Arizona® (NB|AZ®). By clicking on links on this page you may be directed to other websites that may have a different level of privacy and security from NB|AZ®. NB|AZ® does not endorse or guarantee the privacy, security, accuracy, or performance of these sites, or the information, products, or services that are expressed or offered on these sites.

Online Security Center


The security of your online banking and personal data is our highest priority. Learn how to minimize your risk and protect yourself online.







Facing Fraud Today
Get familiar with the common schemes and their costs.


The Layered Defense Approach
Implement four pillars to help protect your organization from multiple angles.


Fraud-Fighting Tools
NB|AZ works with your business to provide products and services that can help address numerous fraud risks.


"Everyday behaviors cost North American companies
roughly $3.5 billion annually."


CyberSource® 2013 Online Fraud Report




Today's Fraud Threats & Fraud Prevention Strategies

 
Accounts Receivable Fraud

The Scheme
Your employees are the lifeblood of your business, but they also have the power to deteriorate it for their own gain. Accounts receivable fraud is purely internal, where employees steal funds, in both online and offline settings, and then alter records via fake discounting/write-offs, faulty balancing, and fraudulent debiting. One of the more common accounts receivable fraud methods is called lapping, where employees continuously steal customer payments to cover previous customer payment thefts.

 

The Impact
According to recent estimates, 80% of the fraud cases are asset misappropriations, including accounts receivable fraud.
(Report to the Nation on Occupational Fraud and Abuse. Association of Certified Fraud Examiners (ACFE). 2002.)

Implement common-sense prevention strategies

  • Conduct all business on one or a few computers that don't allow for any other type of Internet usage
  • Perform daily reconciliation of accounts to find unauthorized ACH debits
  • Follow the same online precautions recommended in the Online Account Takeover section
 
 
ACH Payment Fraud

The Scheme
Your business can be targeted for ACH Payments fraud by employees or outside criminals. No matter who's doing the defrauding, it's one of the easiest methods of fraud to commit. ACH Payments fraud only requires a checking account number and a bank routing number, which are frequently collected from victims with the help of Trojans and other malicious software.

 

The Impact
In 2014, 22% of organizations were affected by ACH debits fraud while 9% experienced ACH credits fraud.
(2014 AFP Payments Fraud Survey)

Implement common-sense prevention strategies

  • Conduct all business on one or a few computers that don't allow for any other type of Internet usage
  • Perform daily reconciliation of accounts to find unauthorized ACH debits
  • Follow the same online precautions recommended in the Online Account Takeover section
 
 
Wire Fraud

The Scheme
Criminals have advanced methods for stealing credit card data virtually. Once they have the information, they proceed to spend your money through either withdrawals or purchases. Credit card theft is one the most prevalent methods of fraud and can usually be attributed to fake websites where you attempt to make a transaction or phishing.

 

The Impact
In 2013, 14 percent of organizations were affected by wire transfer fraud.
(2014 AFP Payments Fraud Survey)

Implement common-sense prevention strategies

  • Call to verify all new payment instructions using a number already on your records
  • Set transfer limits
 
 
Credit Card Fraud

The Scheme
Criminals have advanced methods for stealing credit card data virtually. Once they have the information, they proceed to spend your money through either withdrawals or purchases. Credit card theft is one the most prevalent methods of fraud and can usually be attributed to fake website where you attempt to make a transaction or phishing.

 

The Impact
65% of organizations detected transactions executed with their stolen credit cards in 2013.
(RSA-2013 Fifth Annual Online Fraud Benchmark Report)

For businesses that experienced attempted or actual payment fraud in 2012, 43% cited credit cards as the method used.
(2014 AFP Payments Fraud Survey)

Implement common-sense prevention strategies

  • Only make purchases from trusted, secure websites
  • Set up purchase alerts for your credit card
  • Review account activity frequently
  • Set usage restrictions for transaction type and amount
  • Never send financial information via regular email (it's insecure and easily compromised)
 
 
Check Fraud

The Scheme
As technology progresses, fraudsters enjoy easier access to equipment for reproducing fake checks. Such "bad checks" often accompany lottery scams, check overpayment scams, internet auction scams and secret shoppers scams. Check washing involves erasing details from a check. Once cleared of its details, criminals can use a check to make fraudulent withdrawals and other types of theft. These checks are most frequently stolen out of mailboxes when someone sends a bill payment.

 

The Impact
In 2013, 82% of organizations experienced actual or attempted check fraud.
(2014 AFP Payments Fraud and Control Survey)

For businesses that experienced attempted or actual payment fraud in 2012, 43% cited credit cards as the method used.
(2014 AFP Payments Fraud Survey)

Implement common-sense prevention strategies

  • Mail all bill payment checks directly from the post office
  • Use a special "check writing" pen, available at most office supply stores
  • Order checks with chemically-sensitive paper
  • Pay your bills online
  • Check your bank account often to see what checks have cleared
  • Recognize signs of bad checks, including: no perforations, missing check number, mismatching fonts, handwritten additions, missing address and stains or discoloration
  • Be wary of a low check number (101-400 on personal checks or 1001-1500 for business checks); 90% of bad checks are written from accounts that are less than a year old.
 
 
Online Account Takeover/Enrollment

The Scheme
When a criminal can obtain your personal information or login data, they can sign up for credit cards, transfer money and complete other transactions to steal money, all while posing as you. Online, this type of fraud is achieved via phishing scams, malware forcefully installed on your computer and phony websites made to legitimate so they can steal your log-in credentials.

 

The Impact
Of the businesses that detected a fraud attempt in 2012, 71% reported that the scheme was online account takeover with fraudulent money transfer.
(RSA-2013 Fifth Annual Online Fraud Benchmark Report)

Implement common-sense prevention strategies

  • Keep fundamental computer security features up-to-date, including operating systems, firewalls and antivirus software
  • Never download or install files from unknown resources
  • Don't click on web ads or pop-ups
  • Access the bank's website by typing or bookmarking www.nbarizona.com instead of clicking links
  • Look for the "s" in https://www.nbarizona.com" when you arrive at the NB|AZ website
  • Don't respond to unsolicited emails, open their links or view their attachments
  • Be aware of inappropriate web surfing activity on computers you use to access online banking. (That is how a lot of malware is loaded onto your systems.)
 


Take A Layered Defense Approach

A growing number of daily business operations are now completed online. And because fraud attacks can come from an ever-increasing number of sources, organizations must establish multiple
layers of safeguards,otherwise known as the Layered Defense Approach. The Layered Defense Approach (LDA) consists of the four key security measures that all organizations should implement. When implemented effectively, the LDA helps mitigate a business's risk of becoming a fraud victim. The four pillars are an industry standard for cybersecurity.

4 Pillars of the Layered Defense Approach:
  1. Robust, yet easily managed Fraud Monitoring
  2. Multi-Level Authentication to validate and restrict access to your accounts
  3. Secured Web Browsing with deep online coverage
  4. An Adaptive Security Platform that's customizable to your business


Fraud-Fighting Tools
Gain the collaborative support your business needs to implement the Layered Defense Approach. With NB|AZ's anti-fraud suite of products and services, you can spend as much time as possible reaching toward business goals.

View The Fraud Fighting Tools Table


 
IBM Security Trusteer Rapport
What it is: FREE software that complements your antivirus and firewall software to help protect your login credentials, online communications and transactions.

Helps prevent:
  • ACH fraud
  • Wire fraud
  • Account enrollment/takeover
 
 
Lockbox
What it is: 3 different tools that can ease the collection of receivables and verify payment sources.

Helps prevent:
  • Accounts receivable fraud
  • Employee embezzlement
  • Check fraud
 
 
Positive Pay
What it is: A notification service that can give your business increased control over which checks to return or approve for deposit.

Helps prevent:
  • ACH fraud
  • Employee embezzlement
  • Check fraud
 
 
Remote Deposits™
What it is: A convenient service allowing your business to deposit checks right from the office with a certified scanner.

Helps prevent:
  • Check fraud
 
 
Dual Control
What it is: A feature of all our Online Banking solutions that helps to segregate duties and manage user access for any payment or administration function.

Helps prevent:
  • Wire fraud
  • Electronic (ACH) payments fraud
  • Employee embezzlement
  • Account enrollment/takeover
 
 
Transaction Limits
What it is: A valuable component of Business Online Banking allowing an authorized representative to complete an outgoing electronic payment up to a specified amount.

Helps prevent:
  • Wire fraud
  • Electronic (ACH) payments fraud
  • Employee embezzlement
  • Account enrollment/takeover
 
 
EMV Technology
What it is: A security chip is implemented in all debit and credit cards. National Bank of Arizona will offer updated POS devices, to help businesses transition as EMV cards become the standard.

Helps prevent:
  • Merchant services loss
  • Card loss
 
 
OTP Token
What it is: A security enhancement, which uses one-time passwords to further project and authenticate a business's online transactions.

Helps prevent:
  • Merchant services loss
  • Card loss
 
 
ACH Debit Blocks
What it is: A tool that allows you to decide which ACH transactions your business allows to post, better avoiding unauthorized charges.

Helps prevent:
  • Electronic (ACH) payments fraud
 
 
Outsourced Disbursement
What it is: An automated consolidation tool giving your business more efficient ways to process large volumes of payables and helping reduce expenses.

Helps prevent:
  • Check fraud
 


Fighting Fraud Is Everyone's Responsibility

Please take the time to review your National Bank of Arizona account and service agreements. They include both customer protections (like Visa’s Zero Liability™ program) and responsibilities. For example, under your Treasury Management Master Services Agreement, you are responsible for your Internal Security Controls and all instructions we receive with your Access Credentials even if not actually sent by you.

You should discuss cybertheft protection with your insurance provider to determine if it makes sense for your organization.

For more information or to schedule a FREE no obligation consultation, call 888.241.5550, email corporatebanking@nbarizona.com or contact your local banker today.

**Important Details**
Greenwich Award: As part of Zions Bancorporation, National Bank of Arizona has received 24 Greenwich Excellence Awards and Top Honors in Middle Market Banking for 2014.

Trademarks: Trademarks or trade names used herein are owned by parties who are not affiliated with National Bank of Arizona. Use of such marks does not imply any sponsorship by or affiliation with third parties, and NB|AZ does not claim any ownership of or make representations about products and services offered under or associated with such marks.


Protect Your Identity Online

To help protect you online, NB|AZ® offers free software from the financial security experts at Trusteer Rapport.

 

Use Rapport to help prevent online identity theft with any website that contains private or personal information. Rapport is entirely transparent and does not require you to change the way you work or sign into websites.

 

To learn more about Rapport, please visit Trusteer's website. Rapport works with your antivirus & firewall software and is not designed to replace these valuable tools.

 

 

Trusteer Rapport software is not available for Mac at this time. By downloading and installing Trusteer Rapport you agree with all Trusteer terms and conditions. National Bank of Arizona® is not responsible for, nor do we guarantee, the content or services associated with this product. All problems, questions or concerns regarding Trusteer Rapport should be directed to support@trusteer.com.

 
 
What Is Phishing?

The most common type of online fraud includes email messages sent to you for the purpose of stealing personal & financial information. This practice is known as "phishing" or "spoofing".

 

These emails claim to be from legitimate sources you use and trust and will entice you to provide different types of personal and confidential information including online IDs, passwords, social security and bank account numbers by asking you to reply directly to the email.

 

To protect yourself, never reply directly to an email claiming to be from National Bank of Arizona®. Call our Customer Service directly or contact your local branch. Read more under Report Online Fraud on this page below.

 
 
Report Fraud To NB|AZ®

If you received or responded to an email claiming to be from National Bank of Arizona® that you believe to be fraudulent, contact our Online Banking Support at 1-800-497-8168, option 7 and forward the e-mails to abuse@nbarizona.com.

 
 
Identity Theft 101

If your identity has been stolen:

  • Inform all creditors by phone and in writing.
  • Inform your local post office.
  • Report the incident to the Federal Trade Commission, 1.877.382.4357.
  • Alert NB|AZ® and all other banks you have accounts with. Have your accounts flagged. Request a change of PIN and a new password.
  • Contact Social Security's Fraud Hotline at 1.800.269.0271.
  • Contact the Department of Motor Vehicles. Request a new license if one has been issued in your name.
  • Call the major credit bureaus:
  • Equifax Credit Bureau
    1.800.525.6285
  • Experian Information Solutions
    1.888.397.3742
  • TransUnion Credit Bureau
    1.800.680.7289

This information is excerpted from the Identity Theft pamphlet available from the U.S. Postal Service.

 
 
Ensure you are on the authentic nbarizona.com website

When accessing your online bank account, take these simple steps to ensure you are on the authentic nbarizona.com website.


  1. Always access the online banking site by manually typing in the URL https://www.nbarizona.com or by using a preconfigured book mark pointing to https://www.nbarizona.com. It is a good practice to avoid accessing your accounts by clicking on links on other websites or in emails.
  2. Once you have accessed the online banking site, validate that the URL in the address bar is https://www.nbarizona.com.
  3. Look for your browser's symbol indicating that you are on a secure site whose authenticity has been verified by an independent authority. For example, in Internet Explorer, a padlock image () will appear to the right of the address line. You can view the details of the authenticity by clicking on the lock.
 
Lock

Report Fraudulent Emails
Forward to abuse@nbarizona.com
Call 800.497.8168
Mon-Sat from 8 a.m. to 8 p.m. MST