Interested in learning about the many ways you can protect your financial institution from fraud? Episode 4 of the Independent Banker podcast features Pioneer Trust Bank’s Betsy Steinberg and ICBA Bancard’s Rebecca Kruse to inform listeners of the types of fraud cases to protect your customers and services from.
Listen Up: Partners in fraud prevention
March 01, 2023 / By ICBA
Interested in learning about the many ways you can protect your financial institution from fraud? Episode 4 of the Independent Banker podcast features Pioneer Trust Bank’s Betsy Steinberg and ICBA Bancard’s Rebecca Kruse to inform listeners of the types of fraud cases to protect your customers and services from.
Who’s in conversation?
Betsy Steinberg,
Vice president of Pioneer Trust Bank NA, in Salem, Ore.
Rebecca Kruse
Executive vice president, operations, for ICBA Bancard
Hosted By Charles Potts
ICBA executive vice president and chief innovation officer, and host of the Independent Banker podcast
Listen to Independent Banker: A Community Banking Podcast from ICBA wherever you get your podcasts or at icba.org/podcast.
“I know firsthand how it feels to [experience a fraud attack] and not be able to get that traction that you need. It may seem like a small event to a very large bank, but for you and your customers, this is a big, big deal. We understand that, and we want to make sure all of our [ICBA Bancard] partners understand that.”
—Rebecca Kruse
“We would go to the forms every day to find out if there were new data breaches and if they were identified from a place of purchase. We would then go look at our card-based transactions and both our credit and debit cards to see if our cards had been used at those merchants. If they had, and we had a confirmed window of vulnerability, we would be proactive in closing out those cards and getting new cards … That helped keep our losses down.” —Betsy Steinberg
“We would go to the forms every day to find out if there were new data breaches and if they were identified from a place of purchase. We would then go look at our card-based transactions and both our credit and debit cards to see if our cards had been used at those merchants. If they had, and we had a confirmed window of vulnerability, we would be proactive in closing out those cards and getting new cards … That helped keep our losses down.”
—Betsy Steinberg
“We would go to the forms every day to find out if there were new data breaches and if they were identified from a place of purchase. We would then go look at our card-based transactions and both our credit and debit cards to see if our cards had been used at those merchants. If they had, and we had a confirmed window of vulnerability, we would be proactive in closing out those cards and getting new cards … That helped keep our losses down.” —Betsy Steinberg
“BIN [Bank Identification Number] attacks are increasing in the industry now. Essentially, a BIN attack is when a bad actor identifies a BIN and tests … a set of card numbers to identify which are valid. Unlike a data breach where the bad actor has card numbers that were at least at one point valid, a BIN attack does the opposite and tests lots of card numbers. As soon as one hits and is valid, it’s exploited and used until it can’t be used any longer.”—Rebecca Kruse
“Card skimming, back before EMV chips, meant physically putting on a device that as you inserted your card or your card was swiped, it read the mag stripe on the back, and it literally gave [fraudsters] the keys to the kingdom, where if they could replicate that card, they could go out and do card transactions. They could put whatever name they wanted to on the card to match whatever ID they had.” —Betsy Steinberg
“Card skimming, back before EMV chips, meant physically putting on a device that as you inserted your card or your card was swiped, it read the mag stripe on the back, and it literally gave [fraudsters] the keys to the kingdom, where if they could replicate that card, they could go out and do card transactions. They could put whatever name they wanted to on the card to match whatever ID they had.” —Betsy Steinberg
“I do like a proactive processor for a partner. I do like it when they issue alerts about BIN attacks. I know we’ve received them from all of our processors. Same thing with ICBA, people that are proactive and let us know this [solution] is coming out. They might tell us about some testers to watch for or some basic elements that gives us a leg up and narrows the scope of what I have to watch for.” —Betsy Steinberg
Subscribe now
Sign up for the Independent Banker newsletter to receive twice-monthly emails about new issues and must-read content you might have missed.
Sponsored Content
Featured Webinars
Join ICBA Community
Interested in discussing this and other topics? Network with and learn from your peers with the app designed for community bankers.
Subscribe Today
Sign up for Independent Banker eNews to receive twice-monthly emails that alert you when a new issue drops and highlight must-read content you might have missed.
News Watch Today
Join the Conversation with ICBA Community
ICBA Community is an online platform led by community bankers to foster connections, collaborations, and discussions on industry news, best practices, and regulations, while promoting networking, mentorship, and member feedback to guide future initiatives.