Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceBanking/Finance/Insurance

5 Minutes With

Mitigating fraud, theft and scam risks within financial institutions

By Jordyn Alger, Managing Editor
5 Minutes Santor

Image courtesy of Santor

December 2, 2024

Banks and other financial institutions have a myriad of security risks to manage. Cyber threats and physical threats alike are valid concerns for financial institutions, giving security leaders in this sector many risks to mitigate. 

Here, we talk with Tracey Santor, Assistant Vice President for Financial Institutions at Travelers, about handing these risks. 

Security magazine: Tell us about your title and background:

Santor: I am the product manager for Financial Institution Bonds, Kidnap and Ransom policies and ID Fraud policies for Bond & Specialty Insurance at Travelers. I began my career in the Claim department, where I ultimately managed the Claim professionals who handled Bonds, Kidnap and Ransom and ID Fraud claims, along with a variety of commercial crime claims for many years. I transitioned to my current product manager role in 2013. I have enjoyed the challenges of monitoring my products’ strategies, profitability and training as well as the changing market place.

Security magazine: Social engineering fraud tactics have evolved and become quite sophisticated, and banks should always be on high alert that an illegitimate fund transfer request might be coming. How can banks mitigate this risk?

Santor: Social engineering schemes have been such an easy way for fraudsters to get money. To guard against this exposure, banks and financial institutions have to work just as hard as the fraudsters, and stay on top of any new threats that emerge. 

One of the best ways to defeat a social engineering scam requesting payment is to make a phone call to a number that is on file and ask if the person you received the request from really sent those instructions. Often, requests to transfer funds comes through email, so responding through a different method can sometimes uncover that the request is not legitimate. Confirming with the appropriate person on file through a verbal phone call that a funds transfer request can proceed is a smart way to identify scam attempts. The company and its person you are confirming the request with should appreciate the diligence the bank is taking. With possibly hundreds of thousands or even millions of dollars at stake, it’s worth taking the extra time to confirm the validity of a funds transfer request.

Security magazine: Employee theft is another threat. What tips can you share to help banks reduce the chances of becoming this type of victim?

Santor: This is also a serious threat that requires a bank’s attention. There are ways to combat this. Implementing a separation of duties and making sure someone has oversight of what others are doing is always encouraged. Giving one person the opportunity to work with and manage a bank’s finances and assets without anyone else’s involvement is asking for trouble. Creating a system of checks and balances, with multiple employees directly involved with a bank’s finances instead of only one, should provide the framework needed to catch employee theft, and discourage people from attempting it.

Security magazine: Any other scams you’re seeing that banks and financial institutions need to be aware of and guard against?

Santor: We’re seeing a lot of Financial Institutions claims where fraudsters are embedding themselves into customer accounts. The fraudster poses as a person with authority from the bank’s customer and requests that a new individual be added as an authorized financial approver with full access to everything. If the bank complies, it is like handing a criminal the keys to the vault, and the vault, not surprisingly, very quickly gets wiped out. 

Banks should talk to their frontline people about this scam, and how to vet it. Just like with other social engineering attempts, calling the company and not emailing is always the best response. Calling someone other than the alleged employee who is to receive the new authorization abilities is the safest checkpoint.

In addition to the staff training and reminding them what banks can do in the fight against funds transfer fraud, securing appropriate insurance coverage is another protective step a bank can take. 

KEYWORDS: 5 minutes with bank security finance cybersecurity financial service security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • PayPal logo

    Account Profile Scam Targets PayPal Users

    See More
  • We are hiring sign

    Report: New cyber scam campaign targets job seekers

    See More
  • Folded dollars

    Recent research reveals “phish-free PayPal phishing” scam

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • High-Rise Security and Fire Life Safety, 3rd edition

See More Products

Events

View AllSubmit An Event
  • February 20, 2025

    Ideological Tensions in the Workplace: Understanding and Mitigating Risks of Violence

    ON DEMAND: Organizations face evolving threats, including workplace violence stemming from ideological tensions, political polarization, economic disparities, and other factors.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing