Home

Ridgestone Express Internet Banking and

image

Contents

1. Review the transfer information for accuracy and click Submit You will thea be given a confirmation number that you should retain for your reconds Ridgestone Bank 10 uy 2012 Ridgestone Express Chapter 2 Merchant Information and Responsibilities 24 Workstation Requirements Disk Space 10GB of available disk space on the system drive recommended Hardware 20 GHz or higher processor recommended GB of RAM or higher recommended 1 GB minimum Operating System Windows XP Service Pack 3 Vista 32 bit or 64 bit and Windows 7 32 bit or 64 bit Note Macs are not compatible with SCO Merchant Capture Software Microsoft Intemet Explorer 7 0 80 and the 32 bit version of IE9 0 Appropriate Ranger Device Driver varies depending on the scanner in use and will be lined from the UFS SCO Drivers Link Note The workstation and server if applicable on which Branch Source Capture is installed must be defined usa trusted site hps sco web ufsdata com User must be a Local Administrator onthe PC when installing SCO Merchant Capture Internet connection Wired Ethernet Network Interface Card conection DSL ASDL Cable T 1 with Intemet access of 1 5 megabits per second MBPS connection or higher Internet access If client PC must connect to the Internet through a corporate firewall the firewall must be configured to allow HTTPS requests port 443 to the Merchant Caplure web server and receive correspo
2. docs not appear After ALL Exceptions have Been Corrected click on the Update iem button The Submit Deposit button should appear Verity with an Account Owner that you have been given access to submit deposits if you have contact Deposit Operations to verify your user settings You may need to scroll down using the left hand scroll bar to view the Submit Deposit Button When Tuy t login the webpage closes Verily that you are running Internet Explorer 6 oF 7 This i a common problem when IE is upgraded to Version 5 Consult your IT Provider to verify that your Virus Protection wil allow the SCO program some security programs need to be disabled during install lis possible that a Google or Yahoo toolbar is blocking pop ups Consult your IT provider to uninstall these toolbars Treceive a CHECK TAM eror message when trying to scan certain checks When you ae in the scanning screen uncheck the Detect Double Feed button located next tothe green SCAN button Verity that there are no bent edges or tears on any of the checks that are being scanned Clean Scanner and check to make sure no paper or any other foreign objectis not lodged in the scanning track Seer will wot Power ON Scatter will not Power ON I you have a Unisys Smart Source scanner check thatthe power button located on the back ofthe scanner is in the ON position Check to make sure that the power cord is sccurc
3. i Ridgestone Bank Making success happen Ridgestone Express Internet Banking and Remote Deposit Capture User Manual Version 3 0 July 2012 Ridgestone Bank July 2012 Ridgestone Express User Manual This page intentionally left blank Ridgestone Bank July 2012 Ridgestone Express User Manual TABLE OF CONTENTS CHAPTER 1 INTERNET BANKING SECTION L1 ENABLING YOUR TOK s SECTION 12 LOGGING INTO ONLINE BANKING 7 SECTION 1 3 ONLINE BANKING OVERVIEW 5 SECTION L MAKE A TRANSFER m CHAPTER2 SCO MERCHANTINFORMATIONANDRESPONSIBILITIES 11 SECTION 21 WORKSTATION REQUIREMENTS n StCTION 22 QUALIFIED SCANNERS n SECTION 23 SCANNER MAINIENANC n SECTION 2 REMOTE DEPOSIT CAPTURE SECURITY RECOMMENDATIONS n SECTION 25 INCIDENT RESPONSE PLAN GUIDANCE FOR RDC MERCHANTS 6 SECTION 2 RDC MERCHANT CONTINUITY PLAN OUTLINE m SECTION 3 1 CUSTOMER WORKSTATION CONFIGURATION n SECTION 3 2 INSTALLING TIE SCANNER as SECTION 33 UNINSTALLING RANGER DRIVER E E SECTION A1 CREATE A BEFOSE E SECTION 2 EXCEPTION ITEMS n SECTION 4 3 DUPLICATE ITEMS 3 WO FROM A DEPOSIT E DELETING A DEPOSIT 3s IETWEEN CLASSICICONTEMPORARY VIEW 36 CHAPTER 5 REPORTING z SECTION 1 DETAILED DEPOSIT REPORT CLASSIC VIEW x SECTION S2 DETAILED DEPOSIT REPORT CONTEMPORARY VI SECTION SA RETRIEVE SPEC LASSIC VIEW E SECTION S1 RETRIEVE SPECIFIC CHECK CONTEMPORARY VIEW 2 CHAPTER 6 TROUB
4. 6 July 2012 Ridgestone Express User Manual 12 Logging into Online Banking With Token 1 Open Internet Explorer and Navigate to www ridgestone com 2 Enter your Access ID under Commercial Access ID and select login 3 Click the grey button on your token to produce a onetime passcode Enter this passcode followed hy your 4 digit PIN into the password box and click Log In ws Hrsggezstoa 4 The Site Authentication Screen will appear Click the rey button on your token again to prodoce the Site Authentication Value Ifthe value on he token matches what has been produced on the screen click submit I they do not match do not continue with login and cal he bank for assistance S You are now successfully logged in to Internet Banking Ridgestone Ban 7 July 2 Ridgestone Express User Manual Without Token 1 Open Intemet Explorer and Navigate to www ridgestone com 2 Enter your Access ID under Commercial Access ID and select login Ridgestone Ban Ridgestone Express User Manual Econ Summary Tab to loverew ot at ot our account Ridgestone Bank July 2012 gestone Express User Manual 14 Make a Transfer 1 From the Homepage lick on Funds Transfer and select Transfer List LE 2 Check the box es next to the transfer that you would like to make and enter in the amount that You would lke to transfer and lick Submit EE N TEE a 3
5. A Warning box is displayed Click YES GE m Rea ET 6 The Internet Options Sax again displayed Select PRIVACY tb Very hat the Pop Up Blockers not turned on Iis box is checked uncheck he box I you would prefer to keep the Pop Up Blocker tumed on for a sites except SCO Merchant Capture proceed to Step amp CER C D Cin Ja e mm p 7 Click OK Ifyou would prefer to keep the Pop Up Blocker turned on for al sites excluding SCO Merchant C ptue clik onthe Settings button under Pop Up Blocker EDE II po i Ridgestone Ban a July 2012 Ridgestone Express User Manual 9 When the Setings screen appears add ihe following site Bps sco web ufsdata com to ihe Adres of website tallow and click ADD Then seleet CLOSE This means hat for only ese sites listed will Pop Ups be allowed Forall the sies ey wil be blocked t p E xm Cmq Em Ese E 10 The Internet Options box wil be displayed Click on APPLY Then slee OK 1L Close the Internet Explorer window Ridgestone Ban E uy 2012 Ridgestone Express User Manual 32 Installing the Scanner User MUST have Administrative Rights on the workstation that is being used Please note hat if the computer you are attempting to access the drivers on has Winzip a trial version of Winzip or no Winzip st all the procedures below may vary slightly The procedures below are as il the computer has Winzip installd 3 Open internet Explo
6. Bank 4 The scanner will tum self on and the Silver Bullet window is displayed is wil be displayed every time you login SALV3R BULLST Ridgestone Ban July 2 Ridgestone Express User Manual After login the screen below wil appear Click OE 6 The Home Seren s displayed Select the Create Deposit fi Ridgestgne Bank cnc d 7 The Create New Deposit box is displayed Ener the deposit amount and select he appropriate deponit account Click the Continue button Ridgestone Bank uy 2012 Ridgestone Express User Manual 8 Plae your checks to be scanned in the scanner and chick the ol Scis button in the lower left corner of your sereen you may need to seroll down to locate the SCAN button Let the check s scan When finished click Capture Complete f midgestoneBunk cesses Your image s will appear as they ar scanned notice the virtual endorsement There is no longer a need to endorse the back of your checks EO 9f here are no exceptions click on Submit Deposit and your deposit is complete and you will return to the main screen To logout click on Logout on the information bar Ridgestone Bank E uy 2012 Ri gestone Express User Manual 4 2 Exception items Is possible that when a check is scanned for some reason there might he an image quality error This can he caused by the check being torn bent busy backgrou
7. LESHOOTING as SECTION 61 TROUBLESHOOTING FAQ E This page intentionally left blank Ridgestone Bank July 2012 Ridgestone Express User Manual Chapter 1 Internet Banking 1 1 Enabling your Token Enablement Please note that these steps MUST be completed even if you only login to the remote deposit program 1 Open Internet Explorer and navigate to www ridgestone com 2 Enter your Access ID under Commercial Access ID and select login 3 You wil nee er your pot efor leto can eee Cick Log pn Ex r P ES FDIC ed 44 gt The Token Enablement screen will appear The Token Serial Number is the 10 digit number found on the back of token above the barcode do not include hyphens Click the Grey button on the front of the token to produce a onetime passcode enter iin the One Time Passcode box The PIN is a number of your choice that willbe used to login going forward Please choose something that you can remember Please enter in your email address a secret question and the answer to the seeret question These wil help us verify who you are if you need to call the bank for online assistance Once you have entered in all the information click Submit 5 You will be taken to the online banking home screen and will receive a message that the token has been enabled successfully Fi mE A fee willbe assessed to replace lost token Ridgestone Ban
8. O divers link at htps sco WE slsdsis con drivers and select the following SCO12SI Install Documentation and SCOI251 Install Package The install documentation will provide the instructions for sunning the SCO1251 Install package Tee the following pop up aller installing the scanner driver and logging in This pop up means that you Mei to install the driver without extracting the driver from the zip file To correct uninstall the driver Extract the contents ofthe zip file and make sure thatthe executable ile and the dui fle are present in the same folder Then reinstall the driver Tuy to open SCO I get an ear Internet Explorer cannot display the webpass Ta Tnvemet Explorer click on Tools Internet Options Click om the Advanced Tab Under the Security section ether check or uncheck the box next to Do not save encrypted pages to disk rhe option is checked uncheck it Wits unchecked check it 45
9. This document discusses the considerations required to build an incident response plan Incident Response Goals Verity lat an incident occurred Maintain or Restore Business Continuity Reduce the inciden impact Determine how the attack was done or the incident happened Prevent future attacks or incidents Improve security and incident response Prosecute illegal activity Keep management informed of the situation and response Incident Defi An incident is any one or more of he following Loss of information confidentiality data theft Compromise of information integrity damage to data or unauthorized modification Theft of physical IT aset including computers storage devices printers ez Damage to physical IT assets including computers storage devices printers et Denial of service Misuse of services information o assis Infection of systems by unauthorized or hostile software An attempt at unauthorized access Unauthorized changes to organizational hardware software or configuration 10 Reports of unusual system behavior 1I Responses to intrusion detection alarms Incident Planning In the incident response plan do the following 1 Define roles and responsibilities 2 Establish procedures detailing actions taken during the incident 9 Detail actions based on type of incident such asa virus hacker intrusion data Wen system destruction Procedures should consider how critical the threate
10. and Recommendations The following security requirements and recommendations have been compiled from industry best practices and the Payment Card Industry Data Security Standards We recommend consideration and implementation of the following to help safeguard the integrity confidentiality and availabilty of the information and information systems Physical Security REQUIRED 1 Restrict physical access to workstation and scanner Locate workstation and scanner where feasible in an area that has restricted traffic flow Ideally the equipment would be in an office with access by only thse authorized to access the application 2 Secure physical checks prior to during and post scanning and transmission Physical security over the checks should include limited access and protection from unauthorized access to the checks prior to being scanned Ifthe scanning process is interrupted the checks should physically be secured and the user logged out of the application Once the Scanning process is complete and the files have been transmitted the checks should be stored in a secure under lock and key location under dual control until they are destroyed 3 The physical items are to be shredded under dual contol after 30 days An audit log that records the date of destruction batch numbers and initials of those performing the shredding should be maintained 4 The detailed reports retrieved from the SCO system should be kept either secured
11. cedure or policy is followed in the future Was the incident response appropriate How could it be improved Was every appropriate party informed in a timely manner Were tbe incident response procedures detailed and cover the entre situation How caa they be improved Have changes been made to prevent a re infection of he current infection Are ll stems pace ems lacked down password changed mins updated mail policies set ec Have changes been made to prevent a new and similar infection Should any security policies be updated What lessons have been learned from this experience 2 6 RDC Merchant Continuity Plan Outline In the event thatthe merchant experiences an adverse event that precludes it from continuing normal remote deposit capture operations an alternative plan for processing should be established An adverse event can include the failure to sean and transmit images fom any of he following Categories but not limited to these events Natural event Humicane Tornado Snow som Tee storm Earthquake Flood Technical event Loss of the Intemet o Malfunction of the equipment scanner and or PC Loss of electricity Virus malicious code infestation Human eror Environmental issue 5 Pe Evacuation due to circumstances outside of the companies control Alterate methods of processing may include 5 Physically taking deposits to the bank Going toa remote location to scan and transmit In th
12. e event an alternate location is used the merchant should ensure bat security over he physical documents and the transmission is maintained Transmissions should never be sent over unsecure wireless or using a public Internet connection Weiten procedures for processing a an alternate site need to be developed which include security procedures Notification or Calling Tree Customer s management Financial Institution Lawenforcement Employees ai m Chapter 3 Installing Source Capture Optimization SCO Remote Deposit System 34 Customer Workstation Configuration This must be completed on the workstation that wil run the SCO Software 1 Open internet Explorer and select INTERNET OPTIONS from the Tools Menu 2 The temet Options box is displayed Select the SECURITY tb highlight TRUSTED SITES and click the SITES button 3 The Trusted sies boris displayed Enterthe website shown below and lick the ADD button Click CLOSE Hersien web ufsdata com 4 The Itenet Options box is again displayed Click the Custom Settings button Ridgestone Bunk n daly 2012 Ridgestone Express User Manual The Security Setings Trusted Sites Zone box is displayed Change the following Automatic Prompting for ActiveX controls Select the Enable option Download signed ActiveX controls Select the Prompt option Ridgestone Bunk 2 daly 2012 Ridgestone Express User Manual 5
13. e scanner and proce obe Launch Web Capture documentation Ridgestone Bank n Tuly 2012 Ridgestone Express User Manual 33 Uninstalling the Ranger Driver Is possible that you may need to uninstall your ranger driver at some point Please do not do this unless absolutely necessary 1 Go to Control Panel 2 Double Click on Ad gr Remo Prog 2 Scroll Down to find the Ranger Driver for will vary depending on which scanner you have installed I i i B 4 Click Change Remove and follow the instructions to complete the uninstall Ridgestone Bank E July 2012 gestone Express User Manual Chapter 4 Making a Deposit 4 4 Creating a Deposit Be sure the scanner is plugged in and the drivers installed before completing these steps Also be sure that the Pop Up Blocker is turned off when running Merchant Capture 1 On the merchant capture workstation open Intemet Explorer and open the following link ntsc eb alata conf Web ste WE Merchant Cap pali EBILASORFID U S91 2010 You MUST copy and paste this ink typing itin wll not allow you to properly logit 2 Ou recommendation is that you ald the above site to your imemet favorites and name it Ridgestone Deposit in Internet Explorer Click on Favorites and select Add to Favorites 3 The Merchant Capture Login box is displayed Enter your Premier Ecorp Access ID and Token Number PIN and click LOGIN 5 nidgestone
14. ecks in your deposit Option 2 Generate CSV Report bis report will extract all the individual check information ina Format bat can be uploaded into olher programs Option 3 XML Extract This report will only pull the images of every check in the deposi Option 4 Deposit Detail Report This report will list all o the checks in your deposit along vith images of cach check Ridgestone Bank uy 2012 Ridgestone Express 5 Retrieve a Specific Check Classe View 1 On the Home Screen click on Query and select liem Quer 2 Vou will be taken to the item query screen Enter in the dates you would like to search and any ther identifying check information Amount and account number are the best 3 Click Search This will ring up a list of checks 4 Click on the check in be ist to display the image Ridgestone Bank n uy 2012 Ridgestone Express User Manual 5 M you need to print the check Right Mouse Click on the Image and selec print Ridgestone Bank a July 2012 Ridgestone Express User Manual 54 Retrieve a Specific Check Contemporary View 1 From the home screen click on the tab labeled View Items 2 Click on the next to he check that you would ike to view 3 To print the check Right mouse click on he image and select Ridgestone Ban 2 July 2012 Ridgestone Express User Manual Chapter 6 Troubleshooting 6 1 Troubleshooting FAQ Submit Deposit Button
15. em 4 Once you hit Delete iem the system will ask verify that you really want to delete this item S Click OK D m n DE tinta sw san 6 The screen will refresh and the duplicate m will be removed Continue as many limes as necessary Once you have removed ll the necessary items proceed with your deposit at normal Ridgestone Ban Jul Ridgestone Express User Manual 44 Deleting Check While scanning a deposit it is posible that you will ave to delete a check that you have scanned Please follow the direction below to do so proper 1 While inthe View All Items screen Click the red X in the same line as the check you wish to delete 2 A box will pop up verifying that you really want to delete this item if you do click Yes 3 You can then finish your deposit Ridgestone Bank E uy 2012 Ridgestone Express User Manual AS Deleting a Deposit FH you are not going to Submit your deposit for any reason it MUST be deleted 1 Select the deposit you wish to delete from the deposit list by checking the box next to the deposit 2 Click the Remove button 3 A box will pop up verifying that you want to delete the deposit If you do click OK 4 Once you click OK you will be taken back to the Home screen Ridgestone Bank daly 2012 Ridgestone Express User Manual 46 Switching between Classic and Contemporary View The latest upgrade to Merchant Capture allows for you to cho
16. h those specified in Section 2 1 Customer Workstation Configuration lis possible that a Google or Yahoo toolbar is blocking pop ups Consult your IT provider to uninstall these toolbars Tam receiving an error message Wat says Transport APL is dead M youlase a Unisys Smart Source scanner check thatthe power button located on the back ofthe scanner is in the ON position o Check to make sure that the power condis securely plugged into the wall and he back of he scanner Verify ibat he 2 pars of the power cord the box and he plug we correctly attached Make sure that the USB cord is securely plugged into the computer and the scanner The scanner driver may need to be m Timid Reter to Section 3 Uninstalling Ranger Driver and 3 2 Installing the scanner Tam receiving the eror Ranger cannot connect to API The scanner driver may need io Be reinstalled Refer to Section 34 Uninstalling Ranger Driver and 3 2 Installing the scanner When Tolick the Scar bation a box pops up that says Uploading and will mol go away Refer in Section 2 1 Workstation requirements to ensure that your internet connection is the correct speed Refert Section 3 1 Customer Workstation Configuration to ensure that you have properly configured he Internet Explorer seiags EET to sum ieupZipsc exc every time Login To prevent his message from appearing upon login access the SC
17. here are they located physically and on the network Is the incident inside the trusted network 16 Response Strategy Determine a response strategy 1 B Is the response urgent Can the incident be quickly contained Will the response alert the attacker and do we care si u 7 Containment Take ction o prevent further intrusion or damage and remove the cause of he problem May need to 1 Disconnect the afected systems 2 Change passwords 3 Block some ports or connections from some IP addresses R Prevention of re infection 1 Determine how he intrusion happened Determine the source of the intrusion whether it was email inadequate training attack through a por attack through an unneeded service attack due to unpatched system or application 2 Take steps to prevent an immediate re infection which may include one or more of Close a port on a firewall Patch the affected system Shut down the infected system until it can be re installed Re install the infected system and restore data from backup Be sure the backup was made before the infection 5 Change email settings to prevent a file attachment type from being allow through the email system 6 Plan for some user training 7 Disable unused services on the affected system 9 Restore Affected Systems Restore affected systems to thei original state Be sure to preserve evidence against the intruder by backing up logs or possibly the entre syste
18. ly plugged into the wall and ihe hack of he scanner Verity thatthe 2 parts ofthe power cord the box and the plug are eoreet attached Make sure thatthe USB cord is securely 3 lagged tao the computer and The The user that installed the scanner driver must bea local administrator on the computer refer to Section 2 1 System Requirements Treccive multiple exceptions when scanning checks The scanner is designed to read each number dollar amount i the check is dark colored or the amount is skewed the scanner may not properly read the check Clean the scanning panels as indicated in Section 2 3 Scanner Maintenance SCO taker a Tong time to open Check your internet connections and make sure that it complies with Section 2 1 Workstation Requirements When Tsign n a pop up appears telling me that my Silver Bullet License is going to expire This message appears when the drivers were not properly unzipped Refer to section 3 4 for help on uninstalling and 3 2 for reinstalling the Ranger Driver When Tiga in a pop up appears and asks me fora productserial number for Silver Bullet This message appears when the drivers were not properly unzipped Refer to section 3 4 for help on uninstalling and 3 2 for reinstalling the Ranger Driver Tam not able o install the Medical Informatics Engineering Program Verity that your Internet Explorer setings matc
19. m Depending on the situation restoring the system could include one or more of the following 1 Re install the affected system s fom scratch and restore data from backups if necessary Be sure to preserve evidence agsinst the intruder by backing up logs or possibly the entre system 2 Make users change passwords if passwords may have been sniffed 3 Be sure the system has been hardened by turning off or uninstalling unused 4 Be sure the system is fully patched S Be sure real time virus protection and intrusion detection is running 6 Be sure the system is logging the correct items 10 Documentation Document what was discovered about the incident including how it occurred where the attack came from the response whether the response was effective 11 Evidence Preservation Make copies of logs email and other documentable communication Keep lists of witnesses 12 Notifying proper extemal agencies Notify the police if prosecution of the intruder is posible 13 Assess damage and cost Assess the damage to the organization and estimate both he damage cost and the cost of the containment efforts 14 Review response and update polices Plan and take preventative steps so he intrusion cant happen again 1 Consider whether an additional policy could have prevented the intrusion Consider whether a procedure or policy was not followed which allowed the intrusion then consider what could be changed to be sure Ihe pro
20. nd dust ete If you receive an image Quality exception you will see a red X with a pink background letting you anos that there was an issue with the image was that scanned Click on the check in the list to view the document Upon reviewing the image i tis straight and legible click on Accept Image The screen will efresh itself approving the image quality and allowing you to continue with your deposit ME ie dollar amount is not read correctly ener in the correct amount in the botom right hand box tht is highlighted pink and hit Ener The dollar amount is the only amount that you can change If any other information is incorrect it will be fixed during processing Now ibat there are no exceptions you can continue with your deposits normal and submit ihe deposit Ridgestone Bank 2 July 2012 Ridgestone Express User Manual 43 Duplicate Items The system will automatically check for duplicate check entres f you happen to scan a duplicate item the View Exceptions tab will be highlighted pink and you will also see thatthe item you scanned will be highlighted in pink indicating that this might be a duplicate depos Lf you wish to accept the item only accept the item if you have verified that the check has not been deposited in a previous deposit click Accept Duplicate and proceed withthe deposit as normal 2 I you choose to delete an item make sure that you highlight the correct check 3 Click on Delete l
21. nding HT TPS responses This is a secure Internet connection over port 443 using 128 bit encryption Ifa proxy server is being used it may need to be configured to allow access for the Merchant Capture application Uninstall thid party toolbars such as Yahoo Google Bing et they have caused issues in installing the merchant capture software It problems arise daring installation it may be necessary to disable spyware or antivirus temporarily ne Bani u 22 Qualified Scanners Listed below are all scanners qualified for SCO Merchant Source Capture veniae Met Unisys SimanSoureT Jay wie My Vos TM Vision XTM series scanners Unisys Smart Source Micro 23 Scanner Maintenance Scanner MUST be cleaned weekly to ensure proper images and ease of scanning To Clean the Scanner 1 Remove both top covers of the scanner 2 Use canned ai to blow out the track that the check travels through tbe scanner 3 Mdentify the scanning panel near the end of the check track A Using the tab with the green dot gently open the scanning panel to reveal both front and back panels 5 Using a cotton swab dipped lightly in rubbing alcohol wipe down both scanning panels and let ir dry 6 Once dry close the scanning panels 7 Replace both covers The scanner is now clean and ready to sean Note Keep scanner covered when not in use o avoid excess dust exposure 24 Remote Deposit Capture Security Requirements
22. ned system or data is Consider whether the incident is ongoing or done Implement policies with security tools including firewalls intrusion detection systems and other required items Post warning banners against unauthorized use a system points of access Establish Response Guidelines by considering and discussing possible scenarios Train users about computer security and train IT staff in handling security situations and recognizing intrusions Establish Contacts Incident response team member contact information should be readily available An emergency contact procedure should be established There should be onc contact lst with names listed by contact priority Test the process 3 Discovery Someone discovers something not right or suspicious This may be from any of several sources Inrosion detection system A system administrator A firewall administrator A business partner A monitoring team A manager The security department ora security person An outside source 4 Notification The emergency contact procedure is used to contact the incident response 5 Analysis and Assessment Many factors will determine the proper response including 5 6 Is the incident real or perceived Is the incident stil in progress What data or property is threatened and how critical sit What is the impact on the business should the attack succeed Minimal serious or critical What system or systems are targeted w
23. ose which view you prefer In order to switch back and forth simply lick on the link inthe upper right hand corner Below are examples of the home pages of each view Contemporary View fiserv ec ca Ridgestone Bank 3 uy 2012 Ridgestone Express User Manual Chapter 5 Reportin 5 Detail Deposit Reports Classic View 1 On the Home screen click onthe Deposit ID number 2 Click on the Detailed Reports tab you will see four reporting options Described on next Page You can print or Save any df the report Ridgestone Bank uy 2012 Ridgestone Express User Manual Option 1 Generate PDF Report This report will list all of the checks in your deposit Option 2 Generate PDF Report with Images This report will list all of the checks in your deposit along with images of each check Option 3 Generate CSV Report this report will extract all the individual check information in a format that ean be uploaded into other programs Option 4 Extract Images This report will only pull the images of every check in the deposi Ridgestone Ban EI 52 Detail Deposit Reports Contemporary View 1 On the Home screen check the box next to the depositis you would like to report on 2 Click on the Export As tab you will sce four reporting options Described below You ean print or Save any o the report Option I Generate PDF Report This report will ist all f the ch
24. peer PAP networks and file sharing capabilites Restrict remote access if remote software i installed ensure itis secure or prohibit installation PC Anyware GoToMyPC et Do not allow outside software to be loaded on the workstation restrictor prohibit Internet downloads Vendor supplied default system passwords must be changed This includes Windows and RDC application software Ensure that each user of the system has their own ID and password log on credentials should never be shared since it negates any audit tril Sisong password parameters are encouraged minimum length of 8 characters and must include alphanumeric and special characters for both the network and RDC application Network passwords should expire within 30 to 60 days Network settings should log users off after 10 minutes of inactivity Ideally the workstation should have a password protected sereen saver enabled Consider mult factor authentication by installing biometric readers Network and workstations should have the latest vendor supplied security patches installed Industry practice isto install relevant security patches within one month of release or sooner following testing o ensure interoperability Windows updates should be researched prior to installation however anti virus anti spyware and firewall definitions should be automatically installed immediately upon release Establish a process to identify newly discovered security vulnerabilities subscribe
25. rer and acces the following page Mpsjaco web ita coved 2 Selcetthe appropriate driver hy clicking onthe descipion o picture ofthe scanner your 3 When asked Do you want to open or sve this fil choose SAVE 4 V LLom DE re 4 Choose location onthe FOR save DE diver where Ww Be cay Gesie 5 Click Save and close the web page pr 5 Access the locaton o your PC that you saved he driver Open the folder containing the ipped diver Note The locaton listed Delo is for example purposes ly You may ot have val in similar location EIE EE GOM OF Pow rims ib XO its Steam veer gese OEE te rx 7 Wee ETER 7 Right liek en the sp fle and choose Winzip Extract where 4 NOTE Je PC does nt have Winzip then ou shoud ve an option fa Evract Al Gm OF Dm Crim io XI poc Co DU p z Ee Altre ip le has extracted the contents to the path you indicated you should nov see the Folder which wil contain the executable fl exe that you will use to launch the instalation of the driver 9 Choose the Executable fle exe forthe scanner being installed RET init rope write EER ER d Ee AA ensem Ridgestone Bank 2 uy 2012 Ridgestone Express User Manual 30 Follow the prompts to complete the installation enim antag reside ESE N GEED C Toate 2 EER BEHEERS ad Jem Cue end res 21 When nallo is comple slot FINISH Plug in h
26. to alert services available on the Internet run an automated application on the network to identify vulnerabilities Consider annual penetration testing Limit Internet access and restrict webmail access for added protection against potential viruses Trojans and key loggers Review system event logs and user activity logs especially those with administrator profiles Maintain system backup Consider segregation of duties between initial scanning of tems edits to images and transmission of th fils Aa minimum a review ofall manual adjustments to check images should be reviewed by someone other lan the person making the changes to ensure accuracy 2 5 Incident Response Plan Guidance for RDC Merchants This section provides information about the Incident Response Plan and isnot intended to be a definitive guide to responding to a breach The merchant should tailor the plan to their business and use their own judgment about how to handle their own breaches An Incident Response Plan defines the response to a security incident such as viruses malicious code network intrusion abuse of a computer system or other situations The plan should define he information flow to the appropriate personnel assessment of he incident minimizing damage and response strategy documentation and preservation of evidence The incident response plan should define arcas of responsibility and establish procedures for handing various security incidents
27. with the physical cheeks or in a secured file on the computer The detailed reports need to be destroyed if physical and removed from the system if electronic after 30 days 5 The detailed reports must be kept and destroyed in the same manner as the checks They contain sensitive information that must be handled securely To achieve logical security it may be necessary to engage an outside network consultant to configure network and workstation security L Install and maintain a firewall on the network Consideration should alo be given to installing a personal firewall on the workstation or enabling the Windows firewall if uiliing a Windows operating system The firewall should be configured to disallow traffic from untrusted networks and restrict inbound and outbound Internet traffic Direct public access must be prohibited The firewall should he kept up to date and monitored Ensure the firewall has audit logging capabilities 2 Install and maintain anti virus and anti spyware tools on the workstation The tools should be kept upto date and are capable of generating audit logs 3 If wireless networks are deployed must ensure wired equivalent privacy WEP is cnabled default service set identifier SSID broadcasts ar disabled and vendor default settings are changed WiFi protected access WPA and WPA2 encryption and aubentication should also be enabled 1 u n 1 is 16 i 1 2 Restrict use of peer to

Download Pdf Manuals

image

Related Search

Related Contents

取扱説明書  SMC LECPA User`s Manual    Benutzerhandbuch  Service only  ビルダーフェルテラチェス粒剤 - Meiji Seikaファルマ  Program Rain 10-12  Section 8 Technician Level Maintenance  IBM Tivoli Monitoring for Databases: DB2: Benutzerhandbuch  JULIEN PRÉVIEUX PORTFOLIO  

Copyright © All rights reserved.
Failed to retrieve file