Electronic Banking. HSBC Trinkaus & Burkhardt. Bank since 1785

Size: px
Start display at page:

Download "Electronic Banking. HSBC Trinkaus & Burkhardt. Bank since 1785"

Transcription

1 Electronic Banking

2 Online banking The range of electronic banking services offered by allows you to conduct certain banking transactions through our online banking service. Using your PC or laptop, you can conveniently check account balances and securities account holdings, or transfer money - within Germany or abroad. For this purpose, you have a choice of either using the tradition PIN/TAN authentication method, or the new HBCI online banking standard. PIN/TAN You can easily access the classic form of online banking through our homepage, using a PIN (personal identification number) and list of TANs (transaction numbers). No additional software installation is required the service is accessible at the following URL: HBCI HBCI' is short for Home Banking Computer Interface a standardised and comprehensive online banking platform that is independent of specific systems. With the current HBCI definition as an internet-based banking solution, all that is required is access to the internet (via any internet service provider), plus HBCIcompliant software. HBCI services use an electronic signature to authenticate your banking transactions PIN and TAN lists used in traditional internet banking are no longer required. The combination of state-of-the-art cryptography and chip cards ensures secure communications especially via the internet. HBCI offline This service requires HBCI-compliant software. As HBCI is a general banking standard, you can use any commonly-used, HBCI-compliant software to exchange data with HSBC Trinkaus & Burkhardt or any other bank providing HBCI-compliant services. If you don t have any HBCI-compliant software, just let us know we will gladly provide you with our e-assistant product. HBCI online (e-assistant online) This access option is available straight from our website, with no additional software required. Being the online version of our HBCI-compliant e-assistant software, it offers virtually the same functionality, with the exception of certain functions offering extra convenience. 1

3 HBCI offline Our e-assistant software offers safe access to your accounts and securities accounts via the internet, using the established German HBCI standard. Functionality Information Account statements and transaction details Summary financial status Payments Domestic payments International payments Standard E cross-border payments Standing orders Payments for a specific future date Securities account Your securities portfolio, valued using the previous day's closing prices Current securities prices Creating a sample portfolio Profit and loss calculation Special functions Can be used for your accounts with multiple banks Standardised payment instructions Creation of master data for recipients/debtors supported Connectivity to price dissemination system (OnVista) GeldKarte (POS cash card) management functions System requirements Personal computer running Microsoft Windows (Windows 98 SE or higher) CD-ROM drive (required for installation) Internet access Chip card reader (when using a chip card as a security medium); or floppy-disk drive (when using a disk as a security medium). 2

4 HBCI online An HBCI plug-in is available from s website: This enables you to conduct your banking transactions from wherever you are. All you need are your access details (on a chip card, together with a chip card reader; on a disk used as a security medium; or your PIN, with a TAN list). Functionality Information Account statements and transaction details Summary financial status Payments Domestic payments Standing orders Payments for a specific future date Standard EC cross-border payment International payments Securities account Your securities portfolio, valued using the previous day's closing prices Special functions Can be used for your accounts with multiple banks System requirements Personal computer running Microsoft Windows (Windows 98 SE or higher) Internet access Chip card reader (when using a chip card as a security medium); or floppy-disk drive (when using a disk as a security medium). 3

5 PIN/TAN online This service is available directly from our website. When using PIN/TAN authentication, security is ensured via SSL (secure socket layer) encryption, which is widely used for secure internet communications. This access method does not require any security hardware, and can thus be used from virtually any computer with access to the internet. You can access the service on: or Functionality Account statements and transaction details Your securities portfolio, valued using the previous day's closing prices Domestic payments Standard EC cross-border payments Standing orders Payments for a specific future date Special functions Templates for payment instructions Import function for electronic data interchange (DTA) files System requirements Internet access 4

6 Online banking security issues 1 Information for online banking users While the internet offers enormous advantages and opportunities, there are various security risks involved in its use, too. With this in mind, banks take extensive steps to protect the information transmitted and processed when banking online. This includes, for example, ensuring that confidential data sent over the internet cannot be accessed or modified by unauthorised third parties. However, banks generally have no control over the systems used by their clients, who are free to choose whichever system or platform they wish to use for online banking. Moreover, these systems a PC connected to the internet, for example are often for a number of other applications as well. The systems used by online banking clients are therefore exposed to risks beyond the banks control. For this reason, banks cannot assume liability for these systems. Typical threats internet users are currently exposed to include: third parties accessing, deleting or tampering with your data while it is being transmitted; viruses and worms: programs that self-replicate, or are sent over the internet by and can damage your PC; trojans: programs that carry out operations compromising the security of your PC, such as intercepting passwords, without the user being aware of this; masquerading or phishing : using a false name, website or address for fraudulent purposes; hacking: unauthorised access to your PC via the internet. 1 Taken from Online Banking Security - Information for online banking users ; a brochure published by the Association of German Banks (Bundesverband deutscher Banken e.v.), Berlin (June 2005) 5

7 Security rules Banks have a number of measures in place that offer effective protection against attacks when information is sent over the internet, or processed by the bank s server. But to ensure that these security measures cannot be undermined, it is important for you, too, to take steps to protect the systems you use. These include in particular being safety-conscious when using the internet, and checking your bank statements regularly. Naturally, dangers are not lurking everywhere in cyberspace. Not everyone you come into contact with will, or intends to harm you. Just by following the ten rules outlined below you can dramatically improve the security of the PC you use to bank online, and to reduce risks to an unavoidable minimum. Should you nevertheless suspect that you have come across internet fraudsters, report any irregularities to your bank without delay. If you suspect a scam, have access to your online account blocked immediately. Make sure the emergency contact details of your bank are to hand at all times. Keep copies of all relevant information so that any attempted (or actual) fraud can be traced. Rule 1: Protect sensitive data when sending it over open networks Any unsecured transmission of data over the internet may be intercepted, or viewed by unauthorised third parties Banks have taken steps to ensure that data sent when banking online is encrypted during transmission by secure technology. Enter your PIN and TANs only when you are sure that you are on your bank s secure internet pages, and have an encrypted connection. One of the ways you can verify this is by checking that the URL of your bank starts with You should also bear in mind that data transmitted during online banking sessions is not automatically encrypted when stored locally on your PC, and should therefore be protected by further security measures. Never send sensitive information over open networks unless it is encrypted. Protect your confidential correspondence by using secure encryption methods. Rule 2: Be sure you know who you are dealing with. Not everyone on the internet is who they claim to be. It is comparatively easy for an expert to forge an address, or even fake a whole website perhaps that of the bank you use to bank online, for instance. Check the URL in the address box of the browser, and make sure your bank s internet address is correctly spelt: even the tiniest discrepancy may be a sign that the site is fake. You should also check the security information provided by the browser such as the results of certificate verification. This allows, among other things, the credentials of the server to which you are connected to be confirmed by an independent authority. You should not trust an address if the (apparent) owner is also the issuer of the certificate. If in doubt, ask your bank for information about trustworthy certification authorities which issue server certificates for the online banking service you use. You should divulge information only if you are certain who is receiving it and what will happen to it. Be suspicious of any departure from the usual routine, such as a request to enter your PIN when you are not expecting one. One of hackers favourite tricks is to obtain the information they need by impersonating someone in a position of trust. In a scam known as phishing ( password fishing ), for example, you will be asked by the fraudsters to update or re-enter your confidential access codes (such as your PIN and TANs) on your bank s website. You may receive such a request by or via manipulated internet pages. But the link will take you to a bogus website created by the phisher, who will then be able to capture your confidential 6

8 access details. So it is very important to verify that you are entering your confidential access codes on your bank s genuine website. One way to make sure of this is to enter your bank s internet address manually in the address bar of your browser. A more convenient method is to bookmark the address, and to ensure that you always use this route to access your online banking service. Be sure to look out for anything unusual when you are banking online, such as differences in the appearance of your bank s website. Rule 3: Be careful with sensitive data and access media. Protect your access codes and access media (e.g. PINs, chip cards) from unauthorised use. Never divulge confidential access data to a third party. Do not store sensitive data, such as passwords, PINs or TANs, credit card numbers especially not on your hard drive: if the PC is not used by you alone (your computer at work, for instance), this could otherwise enable third parties to view the information. In addition, special spy programs which may have managed to gain access your computer might be able to capture your data and send it on by , for example. If you use security-enhancing equipment such as a chip-card reader with a PIN keypad, make sure you enter your confidential codes only when requested to do so by the device. A very important point is not to store your dial-up password for connecting to the internet this will help to protect you from unwanted connections. Before entering personal access data such as your PIN, always make sure that the recipient is, in fact, your bank. Your bank would never contact you by or telephone and ask for your secret access details (PIN or TANs, for example). Do not answer such s or follow any instructions of this kind, even if you are advised that failure to do so may result in your account being blocked. Inform your bank about the attempted fraud. 7

9 Rule 4: Choose a secure password. If you want to use your PC to start an application such as online banking, you normally have to begin by entering a password. This enables you to prove who you are, and to show that you are authorised to work on a particular computer or with a particular application. So it is vitally important not to share this information with anyone. It also means that you should not write it down anywhere, and that your password should be unique and difficult to guess. A good password is usually six to eight characters long, and consists of a combination of upper- and lower-case letters, numbers and special symbols. When banking on the internet, the desired level of security may also be achieved by means of a combination of PIN and TAN codes. In any case, you should avoid proper names, well-known colloquial terms, repetitions of single characters (e.g. AAA-AAA ) or keyboard patterns (e.g. qwerty ). There are various strategies for selecting a combination that is difficult to guess: a simple method is to create a password from the first letters of a saying or a poem. Adding special symbols or numbers can add further complexity. 2hRbt1 might stand for two heads are better than one, for example. Change your password if you have reason to suspect someone may have discovered it. Rule 5: Only use software from trustworthy sources. Do not download programs from the internet, and/or install them onto your hard drive, unless you can be sure the source is reliable. Verify the identity of the provider. Viruses or Trojans may be introduced by downloading programs or opening an attachment. Do not open an attachment if you do not know who it is from, or what is in it. First save the content, then check it with a security software before opening any files or attachments. Think carefully about whether to install browser plug-ins, such as audio or 3-D applications, since these can also pose uncontrollable security risks. Rule 6: Use up-to-date software versions. Use only an up-to-date version of your preferred internet browser and PC operating system. Only the most recent versions of popular internet software can ensure that all known security gaps have been filled. Software manufacturers also develop small programs known as bug fixes or patches to solve security problems they have discovered. You should install these bug fixes/patches as soon as possible, to protect your PC from known vulnerabilities. Keep abreast of the latest developments: most manufacturers operate information services for this purpose. 8

10 Rule 7: Run security checks on your PC. Before you use your PC to bank online, take a few minutes to run a personal security check. Activate the security features that protect your computer from unauthorised access. These include, for example, the password that the operating system or screen saver asks you to enter when you start (or re-start) your PC. To make unauthorised access more difficult, you should not use an administrator account for online activities instead, use an account with minimum user rights. Bear in mind that if a PC is not used by you alone as is the case in an internet café, for example you can never be certain whether access is protected by up-todate security software, and what programs are actually being run on this computer. It is even possible that the keyboard might have been tampered with. You cannot expect one hundred per cent security in such an environment, which is why we generally recommend to refrain from online banking in such places. If, however, you must use an internet café for online banking, always clear the cache of the browser afterwards so that subsequent users cannot call up the pages you visited, and view any passwords you may have entered. Rule 8: Activate the browser s security settings. Activate the security settings of your internet browser. You can enhance your security on the internet considerably just by making intelligent use of your browser s security options. It is especially important that you block ActiveX Controls and allow Java Applets to be run only after confirmation. These so-called active controls are small, independent, active content programs that are run on your PC; in certain circumstances, they can trigger undesired actions (such as ing your password to a third party). Do not use your browser s auto-complete function, which saves any user names and passwords you enter, and suggests matches. Cookies store information in a special file on your hard drive, but do not read any other data. If in doubt, decide against permitting a website to write information onto your hard drive because this can later be used to create a user profile. Yet rejecting cookies as a matter of course is not always the best strategy. If you reject a cookie, you may be unable to use some websites. By accepting it, the web server will recognise you every time you return to the site. This enables the server to build up a file, and create a user profile, recording details such as which search terms you use and which pages you visit. Once your preferences and interests are known, targeted advertising banners can be placed. Special security software can prevent user profiles from being compiled, however. This allows you to have the benefits of cookies while preventing unauthorised third parties from tracking your behaviour for unwanted purposes. 9

11 Rule 9: Install virus scanners and additional security software. Install additional security software. Some security problems cannot be solved with your operating system s standard tools alone. An important additional tool is an efficient virus scanner provided that it is continuously updated and thus able to detect new viruses. New viruses are being discovered almost every day, and it is quite possible for you to become infected while surfing the web. Remember that as long as you are online, third parties can construct a profile of what information is on your PC, because your computer has its own address on the web and can thus be accessed from outside. If you do not have adequate security in place, you run the risk of unauthorised persons gaining access to the data on your PC by means of surreptitiously installed spyware applications. These can gather sensitive data, such as account information and passwords, without your knowledge or they may even record your keystrokes. The data is then sent to an unknown external address or server. Spyware programs may be hidden by fraudsters inside internet pages, s or attachments, and are therefore sometimes also called Trojan horses, or just Trojans. As soon as an infected program is opened, the spyware will install itself on your computer without your knowledge. Therefore, delete suspicious s without opening them. Do not open any suspicious attachments, even if they appear to come from a familiar sender address. Deactivate your client s autopreview function to avoid s being opened automatically. A personal firewall can protect you from such attacks. A firewall is a program that monitors all incoming and outgoing traffic between your PC and the internet, and permits only known or authorised connections. Computer stores also offer a wide range of other software that can help to improve the security of your PC, such as access protection and encryption devices. Keep abreast of any new security threats on the internet, and of the steps you can take to protect yourself against them. You will find information about how to bank online safely on your bank s website. Moreover, the German Federal IT Security Authority (BSI) website ( in German only) offers a wealth of information on internet security. Rule 10: Back up your data on a regular basis. Maintaining backups of your files is one of the golden rules for using a computer regardless of whether or not you bank online. It is usually extremely difficult, if not impossible, to salvage data once it has been deleted or corrupted. A convenient way of making backups is to use a removable hard drive, a CD or DVD writer, or a tape drive. Whichever method you choose, do not forget to make backups of new or modified files on a regular basis. And keep your backups in a safe place that is to say, separate from your PC and secure from unauthorised access. 10

12 Glossary ActiveX Control An ActiveX control is a small Windows program which can be run using a web browser, for example. ActiveX controls may already be present on your computer, or may be automatically downloaded when calling up a website. Cache A cache is a temporary storage space, on the hard drive of your own computer, or on an external computer. Cookie A cookie is a small text file stored on your PC by a web browser, upon the instructions of a web server, containing details such as your online requests or preferences. Cookies mainly act as a kind of electronic note-taker for servers, recording user-specific browsing habits, including which websites were visited, how often and for how long, or whether a website should be sent to the user in a personalised form. Firewall A firewall is a computer that monitors and controls data traffic between a local network (or a stand-alone computer) and other networks, such as the internet. The function of a firewall is to protect the local network or computer from unauthorised access. A personal firewall is a program performing the functions of a firewall on your PC: protecting you from unauthorised access without having to use separate hardware. Java applet Java is a programming language which was developed in the early 1990s. A Java applet is a small program that is interpreted and executed in a browser after having been downloaded from the internet. Java commands are integrated into HTML pages, and executed when these pages are loaded. Masquerading Using a false name, website or address for fraudulent purposes. Patch Small program developed to solve security problems detected in existing software as quickly as possible. Phishing Phishing attacks use addresses or web pages pretending to be from familiar sources, such as internet providers, retailers, or banks, with the aim of inducing customers to divulge their account details, PINs, TANs or passwords on a fake website. PIN Personal Identification Number used to authenticate a person s identity. Spyware Spyware is a term for hidden software programs which send user information to third parties without the user s knowledge, let alone approval. This information may include data stored on the user s PC, surfing habits, or personal information such as confidential access codes for online banking. 11

13 TAN Transaction Number; used to authorise a transaction. Trojan A Trojan is a program that carries out operations compromising the security of a PC, without the user being aware of this. The objective of most Trojans is to capture sensitive information, such as passwords, and to disclose it to the Trojan s owner either by or via the internet. So-called back-door Trojans give hackers remote access to computers, which they can then control. Viruses Computer viruses are harmful programs that replicate themselves, and spread over the internet by , for example. Some viruses can inflict considerable damage on infected PCs. Worms Worms are self-replicating harmful programs that spread from computer to computer across a network. The purpose of a worm is to infect as many computers as possible within a network, and to inflict damage. Your contacts Electronic Banking KGaA Königsallee 21/23, D Düsseldorf Tel: Fax: electronic.banking@trinkaus.de 12

ONLINE BANKING SECURITY

ONLINE BANKING SECURITY 1 ONLINE BANKING SECURITY Seventh revised edition Information for online banking users Berlin, November 2007 ASSOCIATION OF GERMAN BAN KS Introduction While the internet offers enormous advantages and

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

STRONGER ONLINE SECURITY

STRONGER ONLINE SECURITY STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial

More information

Advice about online security

Advice about online security Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP

More information

CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3

CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3 CLEO ~Remote Access Services Remote Desktop Access User guide CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3 August 2007 page 1 of 16 CLEO 2007 CLEO Remote Access Services 3SGD

More information

Don t Fall Victim to Cybercrime:

Don t Fall Victim to Cybercrime: Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security

More information

How to stay safe online

How to stay safe online How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware

More information

Guide to credit card security

Guide to credit card security Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information

Payment Fraud and Risk Management

Payment Fraud and Risk Management Payment Fraud and Risk Management Act Today! 1. Help protect your computer against viruses and spyware by using anti-virus and anti-spyware software and automatic updates. Scan your computer regularly

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Network Security. Demo: Web browser

Network Security. Demo: Web browser Network Security Demo: Web browser Email Messages An email message can be instantly forwarded around the globe, even if accidentally. Do not write anything in a message that you will later regret! Read

More information

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS $ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security

More information

Keep Hackers Guessing: Protecting Corporate Information While On The Go

Keep Hackers Guessing: Protecting Corporate Information While On The Go Keep Hackers Guessing: Protecting Corporate Information While On The Go Proactive tips for wireless information security for traveling professionals. In today s world where WiFi hotspots are available

More information

Remote Deposit Quick Start Guide

Remote Deposit Quick Start Guide Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you

More information

Online Security Information. Tips for staying safe online

Online Security Information. Tips for staying safe online Online Security Information ProCredit Bank is committed to protecting the integrity of your transactions and bank account details. ProCredit Bank therefore uses the latest security software and procedures

More information

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES 01 One must remember that everyone and anyone is a potential target. These cybercriminals and attackers often use different tactics to lure different

More information

COMPUTER-INTERNET SECURITY. How am I vulnerable?

COMPUTER-INTERNET SECURITY. How am I vulnerable? COMPUTER-INTERNET SECURITY How am I vulnerable? 1 COMPUTER-INTERNET SECURITY Virus Worm Trojan Spyware Adware Messenger Service 2 VIRUS A computer virus is a small program written to alter the way a computer

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

How To Protect Yourself Online

How To Protect Yourself Online NetBank security guide Commonwealth Bank Personal 1 Contents Page 4 5 5 5 7 7 9 9 9 11 12 12 13 13 13 14 14 14 16 16 16 17 18 18 19 19 20 21 Section Peace of mind with NetBank What are the common online

More information

Statistical Analysis of Internet Security Threats. Daniel G. James

Statistical Analysis of Internet Security Threats. Daniel G. James Statistical Analysis of Internet Security Threats Daniel G. James ABSTRACT The purpose of this paper is to analyze the statistics surrounding the most common security threats faced by Internet users. There

More information

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Guideline for Prevention of Spyware and other Potentially Unwanted Software Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,

More information

OIG Fraud Alert Phishing

OIG Fraud Alert Phishing U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a

More information

Countermeasures against Spyware

Countermeasures against Spyware (2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?

More information

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire

More information

Information Security Guide for Students

Information Security Guide for Students Information Security Guide for Students August 2009 Contents The purpose of information security and data protection...1 Access rights and passwords...2 Internet and e-mail...3 Privacy protection...5 University

More information

Frequently Asked Questions (FAQ)

Frequently Asked Questions (FAQ) Your personal information and account security is important to us. This product employs a Secure Sign On process that includes layers of protection at time of product log in to mitigate risk, and thwart

More information

A Guide to Information Technology Security in Trinity College Dublin

A Guide to Information Technology Security in Trinity College Dublin A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

Practical guide for secure Christmas shopping. Navid

Practical guide for secure Christmas shopping. Navid Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

Email Security. 01-15-09 Fort Mac

Email Security. 01-15-09 Fort Mac Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

Payment Systems Department

Payment Systems Department v Note: Please follow these guidelines for your safety as you enjoy the convenience of technology. However these guidelines are general; therefore, specific precautions may be taken as warranted by the

More information

Corporate Account Take Over (CATO) Guide

Corporate Account Take Over (CATO) Guide Corporate Account Take Over (CATO) Guide This guide was created to increase our customers awareness of the potential risks and threats that are associated with Internet and electronic- based services,

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Why should you be concerned? There are over 1 million known computer viruses. An unprotected computer on the

More information

Business ebanking Fraud Prevention Best Practices

Business ebanking Fraud Prevention Best Practices Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special

More information

Countermeasures against Bots

Countermeasures against Bots Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer

More information

The Hidden Dangers of Public WiFi

The Hidden Dangers of Public WiFi WHITEPAPER: OCTOBER 2014 The Hidden Dangers of Public WiFi 2 EXECUTIVE SUMMARY 4 MARKET DYNAMICS 4 The Promise of Public WiFi 5 The Problem with Public WiFi 6 MARKET BEHAVIOR 6 Most People Do Not Protect

More information

Protecting your business from fraud

Protecting your business from fraud Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.

More information

Contents Security Centre

Contents Security Centre Contents Security Centre... 1 1. Search Engines... 2 2. Online Applications... 2 3. Virgin Money Credit Card Online Banking Security Measures... 2 3.1 Access Number, PIN and Password... 2 3.2 Keypad...

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Internet Security. For Home Users

Internet Security. For Home Users Internet Security For Home Users Basic Attacks Malware Social Engineering Password Guessing Physical Theft Improper Disposal Malware Malicious software Computer programs designed to break into and create

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Tips for Banking Online Safely

Tips for Banking Online Safely If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining

More information

To p t i p s f o r s a f e o n l i n e b a n k i n g a n d s h o p p i n g

To p t i p s f o r s a f e o n l i n e b a n k i n g a n d s h o p p i n g To p t i p s f o r s a f e o n l i n e b a n k i n g a n d s h o p p i n g The Internet offers the opportunity to bank and shop in safety whenever you want. More than 15 million people in the UK now use

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot

More information

SECURITY RECOMMENDATIONS INTERNET BANKING TRANSACTIONAL

SECURITY RECOMMENDATIONS INTERNET BANKING TRANSACTIONAL SECURITY RECOMMENDATIONS INTERNET BANKING TRANSACTIONAL This page should provide customers with all the information they need concerning the security of a transactional Internet banking site and, in particular,

More information

Man-in-the-Middle Attacks against the chiptan comfort Online Banking System

Man-in-the-Middle Attacks against the chiptan comfort Online Banking System Man-in-the-Middle Attacks against the chiptan comfort Online Banking System RedTeam Pentesting GmbH November 23, 2009 ChipTAN comfort is a new system which is supposed to securely authorise online banking

More information

Boston University Security Awareness. What you need to know to keep information safe and secure

Boston University Security Awareness. What you need to know to keep information safe and secure What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately

More information

Secure Email Frequently Asked Questions

Secure Email Frequently Asked Questions Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support

More information

COSC 472 Network Security

COSC 472 Network Security COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: ealu@salisbury.edu Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html

More information

Desktop and Laptop Security Policy

Desktop and Laptop Security Policy Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious

More information

Online Banking Security Guide Internet-based version

Online Banking Security Guide Internet-based version Online Banking Security Guide Internet-based version Contents Introduction to the Security Guide... 2 Security Guide... 2 Using the internet securely... 2 Security solutions in Online Banking... 3 What

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

Network Security and the Small Business

Network Security and the Small Business Network Security and the Small Business Why network security is important for a small business Many small businesses think that they are less likely targets for security attacks as compared to large enterprises,

More information

Content Teaching Academy at James Madison University

Content Teaching Academy at James Madison University Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

More information

SHORT MESSAGE SERVICE SECURITY

SHORT MESSAGE SERVICE SECURITY SHORT MESSAGE SERVICE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

When you listen to the news, you hear about many different forms of computer infection(s). The most common are: Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How

More information

ON-LINE BANKING, BILL PAYER and MOBILE BANKING Terms and Conditions Effective 5/14/12

ON-LINE BANKING, BILL PAYER and MOBILE BANKING Terms and Conditions Effective 5/14/12 ON-LINE BANKING, BILL PAYER and MOBILE BANKING Terms and Conditions Effective 5/14/12 By proceeding, you acknowledge that you have already read and agreed to the Online Banking agreement and disclosures.

More information

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

E-BUSINESS THREATS AND SOLUTIONS

E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-business has forever revolutionized the way business is done. Retail has now a long way from the days of physical transactions that were

More information

User Documentation Web Traffic Security. University of Stavanger

User Documentation Web Traffic Security. University of Stavanger User Documentation Web Traffic Security University of Stavanger Table of content User Documentation... 1 Web Traffic Security... 1 University of Stavanger... 1 UiS Web Traffic Security... 3 Background...

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

WEB ATTACKS AND COUNTERMEASURES

WEB ATTACKS AND COUNTERMEASURES WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Online Cash Manager Security Guide

Online Cash Manager Security Guide Online Cash Manager Security Guide You re the One who can protect your business from the threat of a Corporate Account Takeover. 102 South Clinton Street Iowa City, IA 52240 1-800-247-4418 Version 1.0

More information

Hiding Tracks on the Net

Hiding Tracks on the Net Hiding Tracks on the Net Ways one might hide their tracks Private Browsing Anonymizers & Proxy Servers SSL / TLS Passwords False Information Public Networks Email Services Encryption Firewalls Private

More information

Getting a Secure Intranet

Getting a Secure Intranet 61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like

More information

Austin Peay State University

Austin Peay State University 1 Austin Peay State University Identity Theft Operating Standards (APSUITOS) I. PROGRAM ADOPTION Austin Peay State University establishes Identity Theft Operating Standards pursuant to the Federal Trade

More information

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

When visiting online banking's sign-on page, your browser establishes a secure session with our server. The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server. How Encryption

More information

Is your data secure?

Is your data secure? You re not as safe as you think Think for a moment: Where do you keep information about your congregants or donors? In an Excel file on someone s desktop computer? An Access database housed on your laptop?

More information

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Business Internet Banking / Cash Management Fraud Prevention Best Practices Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization

More information

Secure Your Information and Communication Technology Devices

Secure Your Information and Communication Technology Devices You should pay attention to the following items bef the Internet: Secure Your Information and Communication Technology Devices Install proper anti-virus software P.3 Log on as a user and not as an administrator

More information

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person

More information

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500 INFO 1500 9. Information Assurance and Security, Protecting Information Resources 11. ecommerce and ebusiness Janeela Maraj Tutorial 9 21/11/2014 9. Information Assurance and Security, Protecting Information

More information

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Definitions Malware is term meaning malicious software. Malware is software designed to disrupt a computer system.

More information

What you need to know to keep your computer safe on the Internet

What you need to know to keep your computer safe on the Internet What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these

More information

10 Things You Need to Know About Internet Security

10 Things You Need to Know About Internet Security INFORMATION SECURITY 10 Things You Need to Know About Internet Security Presented by: Steven Blanc IT Security Officer, Bowdoin College Internet Security Versus Internet Safety Security: We must secure

More information

Computer Viruses: How to Avoid Infection

Computer Viruses: How to Avoid Infection Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

Online Business Banking FREQUENTLY ASKED QUESTIONS

Online Business Banking FREQUENTLY ASKED QUESTIONS Online Business Banking FREQUENTLY ASKED QUESTIONS» BSP Online Business Banking» Frequently Asked Questions GENERAL Q. What is BSP Online? A. BSP Online allows customers to securely access their BSP Bank

More information

Business Identity Fraud Prevention Checklist

Business Identity Fraud Prevention Checklist Business Identity Fraud Prevention Checklist 9 Critical Things Every Business Owner Should Do Business identity thieves and fraudsters are clever and determined, and can quickly take advantage of business

More information

STOP THINK CLICK Seven Practices for Safer Computing

STOP THINK CLICK Seven Practices for Safer Computing Seven Practices for Safer Computing Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than earlier generations

More information