{"id":4726,"date":"2012-04-05T12:47:00","date_gmt":"2012-04-05T12:47:00","guid":{"rendered":"https:\/\/evssolutions.com\/microsoft-straps-up-with-nacha-to-fight-fraud\/"},"modified":"2012-04-05T12:47:00","modified_gmt":"2012-04-05T12:47:00","slug":"microsoft-straps-up-with-nacha-to-fight-fraud","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/microsoft-straps-up-with-nacha-to-fight-fraud\/","title":{"rendered":"Microsoft Straps up with NACHA to Fight Fraud"},"content":{"rendered":"
This month Microsoft partnered with multiple industry
One of the largest obstacles that Operation B17<\/a>
As this becomes a more pressing issue, more organizations
<\/p>\n [Contributed by, EVS Marketing]<\/p>\n <\/p>\n","protected":false},"excerpt":{"rendered":" This month Microsoft partnered with multiple industry organizations including The Electronic Payments Association (NACHA) in order to fight cybercrime and ID theft through electronic payments systems. What caused more than five organizations and vendors to collaborate towards this common goal?<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,38],"tags":[],"class_list":["post-4726","post","type-post","status-publish","format-standard","hentry","category-identity-theft","category-internet-fraud"],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4726","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4726"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4726\/revisions"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4726"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4726"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4726"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}
\norganizations including The Electronic
\nPayments Association<\/a> (NACHA) in order to fight cybercrime and ID theft
\nthrough electronic payments systems. What caused more than five organizations
\nand vendors to collaborate towards this common goal? One word – Zeus<\/a>.
\nThis keylogging malware has been causing the industry troubles for years
\nincluding account takeover. In March of this year, Microsoft and their
\naffiliates took down two IP addresses behind Zeuss command in an effort called
\nOperation B71. Since 2007, more than 13 million computers have been affected by
\nZeus, making it a force not to be ignored. While the operation and efforts all
\ncome in good nature, some experts believe that it is not enough to stop online
\nfraud in the long term.<\/p>\n
\nand the industry as a whole faces, is the fact that Zeus is capable of
\ndefeating common methods of ID authentication measure that most financial
\ninstitutions enforce. This means that standard fraud prevention procedures may
\nnot be enough to protect you or your company from this malware. As Avivah Litan<\/a>
\nstated in an article in Bank Info Security, relying on one approach or solution
\nis a set up for failure. Companies must fight fire with fire, and find ways to
\ncatch any fraudulent activity before its too late. This is easier said than
\ndone though. Microsoft faces legal roadblocks that may make B17 a bit more
\ndifficult than predicted.<\/p>\n
\nhave joined forces to fight against financial fraud. As these big name
\ncompanies take on the giant that is affected so many consumers, its important
\nfor smaller companies not to let their guard down. Companies of all shapes and
\nsizes can fall victim to this type of crime and must learn to protect
\nthemselves against Trojans. Outside security vendors<\/a>
\ncan help to add an extra level of security to protect against ID theft. If your
\ncompany does not have a third party ID
\nauthentication<\/a> provider, look into integrated one into your security
\nmeasures today.<\/p>\n