SECURITY RECOMMENDATIONS INTERNET BANKING TRANSACTIONAL

Size: px
Start display at page:

Download "SECURITY RECOMMENDATIONS INTERNET BANKING TRANSACTIONAL"

Transcription

1 SECURITY RECOMMENDATIONS INTERNET BANKING TRANSACTIONAL This page should provide customers with all the information they need concerning the security of a transactional Internet banking site and, in particular, best practices and security measures. Below is the text recommended by the International Retail Banking security team. Best practices IT security involves a set of techniques and best practices to adopt to protect your computers and your interests when using IT resources, such as Societe Generale's online banking service. These techniques and best practices have been developed by specialists in IT security, but it is important for you to know and apply the simplest of them. Protect your password Your password provides important protection to ensure that you can carry out online transactions in total security. However, to ensure optimum protection, the password should comply with the best practices listed below. o Choosing a password: the 6-figure password is designed to be entered using the virtual keypad. Choosing a "strong" password protects against identity theft. Your password should not be trivial (do not repeat the same figure or series of figures) and should not be easy for a third party to guess (e.g. your birthday). o Using your password: only enter your code using the virtual keypad on the secure login page of your online bank, at the Never disclose your password to anyone. Societe Generale will never ask you for your password. Log out when you have finished viewing your account: When you log in to the online banking service, a viewing session opens for your account. While this session is open, you can navigate from page to page and carry out certain operations without having to identify yourself again. While this feature is practical, it could allow someone using your computer to browse your account and carry out certain operations without your knowledge. It is vital to log out using the "Log out" button when you have finished viewing your accounts. It is not enough simply to close the page or the browser. Remember that Societe Generale will not be able to reject any transaction carried out during a session opened in your name.

2 Deactivate your browser's AutoComplete function: Most web browsers offer to save the usernames and passwords you use in login forms, including your online banking login details. The AutoComplete function allows you to access your account at a later time without having to re-enter your username. While this is practical, the AutoComplete function could help a person using your computer to access your account without your knowledge. It is vital to deactivate your browser's AutoComplete function. Remember that Societe Generale will not be able to reject any transaction carried out during a session opened in your name. Secure your computer: Before browsing the Internet, you should protect your computer against potential malicious attacks. To do this, follow the instructions below: o Update your operating system and software: keeping your operating system and software* upto-date is vital to protect your computer against malicious attacks. Closing known security loopholes renders the most common methods of attack ineffective. o Install anti-virus software: you should install anti-virus software on your computer, even if this software is free. Such software protects you by identifying and blocking malicious applications installed on your computer. Anti-virus software also checks the trustworthiness of the files you download from the Internet or receive by . You should also make sure you keep your antivirus software up-to-date. * the most important programs to update are those that access the Internet (browser, , etc.) and wellknown software (Office pack, Adobe suite, Java, etc.) Check the trustworthiness of the site you are on: Whether you are on a banking site or an e-commerce site, it is important to make sure that the site you are on is official and secure before entering your login details or carrying out any transactions. Follow these instructions to check the trustworthiness of the site you are on: o Check the URL of the site in the address bar: a URL is the unique identifier for the web page you are on and is visible in your browser's address bar. By checking this address carefully, you will be able to tell if the site you are on is fraudulent, as its address will necessarily be different from that of the official site (e.g. instead of o Check the prefix of the address: any official Internet banking or e-commerce site will use secure communication protocols with its clients. If you are on a secure site, the URL will be preceded by "https" (instead of "http"). The full address of Societe Generale's secure site is: o Check the security certificate: the certificate is used to provide assurance that the site belongs to the Societe Generale group. Your web browser can display the security certificate used by the page you are on. The certificate should look like this:

3 Each subsidiary should insert its own certificate. Specific protective measures for smartphones: The growing use of smartphones and the increasing development of banking services for such devices are leading to the emergence of new security risks. Smartphones are often likened to mobile telephones, but in reality, they are simply computers which can be used to make telephone calls. The security measures applicable to a computer (see above) are therefore equally valid for a smartphone. However, smartphones also require further specific protective measures: Protect your telephone with a (non-trivial) password and set your screen to lock automatically when it is not being used. o Make sure you apply all the updates recommended by your system provider o Only download applications from official application stores (e.g. Apple Store, Google Play Store). Otherwise, you risk downloading malicious applications onto your smartphone o Never unlock your smartphone's operating system (e.g. jailbreak, rooting), as doing so increases your exposure to risks o Do not store any unencrypted confidential data on your smartphone o Install anti-virus software and keep it up to date Remember that it is vital to take the same precautions with a smartphone as you would on a computer when browsing the Internet

4 Security measures Societe Generale is aware of the security risks that arise from the sensitivity of an online banking service, and implements state-of-the-art security measures to provide you with the highest possible level of security. Authentication mechanisms and procedures: Authentication is a key element of the security of the online banking service. This procedure, which gives you access to your accounts in order to view and manage them, allows Societe Generale to formally identify you. The elements used for authentication are your username and password. Your username is unique and is provided to you when you register for the online services. You are allocated a default password when you register for the online services, then presented with an online form to change your password the first time you log in. Authentication by password The new password, which should comply with the recommendations in "Best practices: protect your password" can be changed at any time at the following You use your username and password to access your accounts. Never disclose your password to anyone. Remember that Societe Generale will never ask you for your password Authentication by virtual keypad The new password you have chosen can be changed at any time at the following Your username and password are used to access your accounts through an innovative new system introduced by Societe Generale. The virtual keypad makes your password more secure by making it harder for a malicious individual to get hold of it. The virtual keypad can be used by the blind and partially-sighted.

5 Never disclose your password to anyone. Remember that Societe Generale will never ask you for your password Authentication by OTP The security of your password is guaranteed by an innovative Societe Generale system. The OTP calculator generates a new password each time you log in. You use your username and password to access your accounts. Confirmation by OTP In addition, it may be necessary to perform a further authentication operation in order to complete certain transactions, so as to confirm your identity, your consent, and the validity of the transaction. Societe Generale uses a One-Time Password solution. For those transactions that require confirmation in this way, you must enter on the OTP calculator: o The amount of the transaction o Part of the beneficiary's account number The calculator generates the one-time password you must enter on the site to confirm the transaction. Here is an example of an OTP calculator (different models exist): Encryption of communications: The Societe Generale online banking service uses the SSLv3/TLS (Secure Socket Layer version 3 / Transport Layer Security) encrypted communication protocol. Activating encryption reinforces HTTP communication, which is consequently renamed HTTPS (where the S stands for "Secure"). The HTTPS protocol ensures that all information exchanged on the site is safe and confidential. You can always check whether the site you are on is secure: o the address of the site will be preceded by the prefix "https" o In some browsers, a padlock logo will also be displayed in the status bar Extended Validation Certificate (EV) o In some browsers, the address bar will turn green and display a certification logo The full address of Societe Generale's secure site is:

6 Automatic logout procedure: For your security, you will automatically be logged out of the service after ten minutes of inactivity. This means noone can use the site in your place if you have left your computer without logging out. To log back in, you must enter your username and password again. It is vital to log out using the "log out" button when you have finished viewing your accounts. Remember that Societe Generale will not be able to reject any transaction carried out during a session opened in your name. Traceability and archiving: For security purposes, activity on your banking site is tracked and archived 24/7, in compliance with the banking regulations in effect and the relevant data protection laws. Any anomaly detected will give rise to an in-depth analysis, as well as ad hoc procedures to ensure the reliability and continuity of the service at any given time

U.S. Bank Secure Mail

U.S. Bank Secure Mail U.S. Bank Secure Mail @ Table of Contents Getting Started 3 Logging into Secure Mail 5 Opening Your Messages 7 Replying to a Message 8 Composing a New Message 8 1750-All Introduction: The use of email

More information

Secure Email Client Guide

Secure Email Client Guide PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing

More information

A guide to Internet Banking

A guide to Internet Banking A guide to Internet Banking 1 www.beyondbank.com.au Contents Getting Started Register for Internet Banking 3 Log in to Internet Banking 4 Using Internet Banking for the First Time 5 Setting up your Internet

More information

Empathy. ITSI Online ebook Purchasing and Activation System

Empathy. ITSI Online ebook Purchasing and Activation System Empathy ITSI Online ebook Purchasing and Activation System Contents Overview Empathy Registration and Login What is Empathy? Getting Started: Registration and Login Empathy Account Creation (Registration)

More information

Online Security Information. Tips for staying safe online

Online Security Information. Tips for staying safe online Online Security Information ProCredit Bank is committed to protecting the integrity of your transactions and bank account details. ProCredit Bank therefore uses the latest security software and procedures

More information

Spring Hill State Bank Mobile Banking FAQs

Spring Hill State Bank Mobile Banking FAQs Spring Hill State Bank Mobile Banking FAQs What is Mobile Banking? Mobile Banking enables you to access your account information using the Bank online banking website. You must first be enrolled as an

More information

https://weboffice.edu.pe.ca/

https://weboffice.edu.pe.ca/ NETSTORAGE MANUAL INTRODUCTION Virtual Office will provide you with access to NetStorage, a simple and convenient way to access your network drives through a Web browser. You can access the files on your

More information

What s the difference between my Home Banking password and my Enhanced Login Security?

What s the difference between my Home Banking password and my Enhanced Login Security? Common Questions about Enhanced Login Security 818-973-4900 or 800-973 - 4989 Mon. - Fri. 8:30 a.m. - 4:00 p.m. Enhanced Login Security is a new online security feature that will provide you additional

More information

MOBILE BANKING. Why should I use Mobile Banking?

MOBILE BANKING. Why should I use Mobile Banking? MOBILE BANKING What is Mobile Banking? With Mobile Banking, you can access your account, conduct transfers, and pay and manage bills from any mobile device that has web browsing capabilities and a data

More information

Beginner s Guide to SSL Certificates

Beginner s Guide to SSL Certificates WHITE PAPER: BEGINNER S GUIDE TO SSL CERTIFICATES White Paper Beginner s Guide to SSL Certificates Making the Best Choice When Considering Your Online Security Options Beginner s Guide to SSL Certificates

More information

Tips for Banking Online Safely

Tips for Banking Online Safely If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining

More information

Transferring data safely

Transferring data safely Transferring data safely Secure drop-box users guide INTRODUCTION You ve been registered to make use of a secure web-based drop-box in order to safely exchange data across the Internet between yourself

More information

Advice about online security

Advice about online security Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP

More information

How To Get A Certificate From Digicert On A Pc Or Mac Or Mac (For Pc Or Ipa) On A Mac Or Ipad (For Mac) On Pc Or Pc Or Pb (For Ipa Or Mac) For Free

How To Get A Certificate From Digicert On A Pc Or Mac Or Mac (For Pc Or Ipa) On A Mac Or Ipad (For Mac) On Pc Or Pc Or Pb (For Ipa Or Mac) For Free DigiCert User Guide Version 3.7 Contents 1 User Management... 7 1.1 Roles and Account Access... 7 1.1.1 Administrator Role... 7 1.1.2 User Role... 7 1.1.3 CS Verified User... 7 1.1.4 EV Verified User...

More information

Stewart Secure Email User Guide. March 13, 2015

Stewart Secure Email User Guide. March 13, 2015 Stewart Secure Email User Guide March 13, 2015 Table of Contents Introduction... 1 What is secure email?... 1 Why secure email?... 1 What is personal, non-public information?... 1 How is my data protected?...

More information

BEGINNERS GUIDE BEGINNERS GUIDE TO SSL CERTIFICATES: MAKING THE BEST CHOICE WHEN CONSIDERING YOUR ONLINE SECURITY OPTIONS

BEGINNERS GUIDE BEGINNERS GUIDE TO SSL CERTIFICATES: MAKING THE BEST CHOICE WHEN CONSIDERING YOUR ONLINE SECURITY OPTIONS BEGINNERS GUIDE TO SSL CERTIFICATES: MAKING THE BEST CHOICE WHEN CONSIDERING YOUR ONLINE SECURITY OPTIONS BEGINNERS GUIDE TO SSL CERTIFICATES INTRODUCTION Whether you are an individual or a company, you

More information

beginners guide Beginners Guide Certificates the best decision when considering your online security options.

beginners guide Beginners Guide Certificates the best decision when considering your online security options. Beginners Guide to Digital SSL Certificates the best decision when considering your online security options. Beginners Guide to Digital SSL Certificates introduction Whether you are an individual or a

More information

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Starting TeamDrive for Android for the First

More information

USERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM

USERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM USERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM User Manual Table of Contents Introducing OWL...3 Starting to use Owl...4 The Logging in page...4 Using the browser...6 Folder structure...6 Title Bar...6

More information

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to

More information

How To Protect Yourself Online

How To Protect Yourself Online NetBank security guide Commonwealth Bank Personal 1 Contents Page 4 5 5 5 7 7 9 9 9 11 12 12 13 13 13 14 14 14 16 16 16 17 18 18 19 19 20 21 Section Peace of mind with NetBank What are the common online

More information

EDGETECH FTP SITE CUSTOMER & VENDOR ACCESS

EDGETECH FTP SITE CUSTOMER & VENDOR ACCESS EDGETECH FTP SITE CUSTOMER & VENDOR ACCESS 1. The EdgeTech FTP site is a web hosted site, not a true FTP site, remember to use http:// not ftp:// in the web address. IMPORTANT: Do Not use FileZilla or

More information

INFORMATION SYSTEMS SERVICE NETWORKS AND TELECOMMUNICATIONS SECTOR. User Guide for the RightFax Fax Service. Web Utility

INFORMATION SYSTEMS SERVICE NETWORKS AND TELECOMMUNICATIONS SECTOR. User Guide for the RightFax Fax Service. Web Utility INFORMATION SYSTEMS SERVICE NETWORKS AND TELECOMMUNICATIONS SECTOR User Guide for the RightFax Fax Service Web Utility August 2011 CONTENTS 1. Accessing the Web Utility 2. Change Password 3. Web Utility:

More information

Password Depot for Android

Password Depot for Android Password Depot for Android Table Of Contents Table Of Contents... 2 User interface... 3 Action Bar... 3 Overflow Menu... 4 Entry menu... 5 Context Bar... 6 Settings... 7 Creating a password file... 8 Opening

More information

Terminal Four. Content Management System. Moderator Access

Terminal Four. Content Management System. Moderator Access Terminal Four Content Management System Moderator Access Terminal Four is a content management system that will easily allow users to manage their college web pages at anytime, anywhere. The system is

More information

General tips for increasing the security of using First Investment Bank's internet banking

General tips for increasing the security of using First Investment Bank's internet banking General tips for increasing the security of using First Investment Bank's internet banking Dear Clients, First Investment Bank (Fibank, the Bank) provides you with high level of protection and security

More information

White paper. How to choose a Certificate Authority for safer web security

White paper. How to choose a Certificate Authority for safer web security White paper How to choose a Certificate Authority for safer web security Executive summary Trust is the cornerstone of the web. Without it, no website or online service can succeed in the competitive online

More information

NYS OCFS CMS Contractor Manual

NYS OCFS CMS Contractor Manual NYS OCFS CMS Contractor Manual C O N T E N T S CHAPTER 1... 1-1 Chapter 1: Introduction to the Contract Management System... 1-2 CHAPTER 2... 2-1 Accessing the Contract Management System... 2-2 Shortcuts

More information

Security Tips You are here: Home» Security Tips

Security Tips You are here: Home» Security Tips Security Tips You are here: Home» Security Tips Click on a the Security Icon to view detailed information on: Responsibility of the Bank Password Policy Guide Online Security Internet Security Tips Scam

More information

Signup instructions for the End User

Signup instructions for the End User Wellnomics Risk Management Server Hosted by Wellnomics Ltd Signup instructions for the End User Wellnomics Risk Management is a series of assessments, designed to help you to manage your exposure to computer-based

More information

DigiCert User Guide. Version 4.1

DigiCert User Guide. Version 4.1 DigiCert User Guide Version 4.1 Contents 1 User Management... 7 1.1 Roles and Account Access... 7 1.1.1 Administrator Role... 7 1.1.2 User Role... 7 1.1.3 CS Verified User... 7 1.1.4 EV Verified User...

More information

STATE BANK OF BIKANER & JAIPUR

STATE BANK OF BIKANER & JAIPUR (Cover Page) STATE BANK OF BIKANER & JAIPUR RETAIL INTERNET BANKING User Manual Dear Customer, We take this opportunity to thank you for availing of our Internet banking services. You can experience a

More information

Weston Public Schools Virtual Desktop Access Instructions

Weston Public Schools Virtual Desktop Access Instructions Instructions for connecting to the Weston Schools Virtual Desktop Environment Notes: You will have to have administrator permission on your computer in order to install a VMWare Client application which

More information

Secure Email User Guide. Guidance for Recipients of Secure Email Messages from Lloyds Banking Group

Secure Email User Guide. Guidance for Recipients of Secure Email Messages from Lloyds Banking Group Guidance for Recipients of Secure Email Messages from Lloyds Banking Group Version: 1.3 Last updated: 14/04/2016 1 Introduction This user guide is intended for third party email users users who receive,

More information

SSL Certificates 101

SSL Certificates 101 Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer

More information

HTTPS GATEWAY INSTRUCTIONS

HTTPS GATEWAY INSTRUCTIONS HTTPS GATEWAY INSTRUCTIONS Definition of HTTPS (HyperText Transport Protocol Secure): The protocol for accessing a secure Web (internet) server. Using HTTPS in the URL or address bar instead of HTTP directs

More information

econtrol 3.5 for Active Directory & Exchange Self-Service Guide

econtrol 3.5 for Active Directory & Exchange Self-Service Guide econtrol 3.5 for Active Directory & Exchange Self-Service Guide This Guide Welcome to the econtrol 3.5 for Active Directory and Exchange Self-Service Guide. This guide is econtrol end-users who have been

More information

Apple Mac VPN Service Setting up Remote Desktop

Apple Mac VPN Service Setting up Remote Desktop Apple Mac VPN Service Setting up Remote Desktop After you have successfully connected via the VPN client to the University network you will then need to make the connection to your machine. To do this

More information

User guide. Business Email

User guide. Business Email User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook

More information

User Guide. The AMF's File Transfer Service (FTS)

User Guide. The AMF's File Transfer Service (FTS) User Guide The AMF's File Transfer Service (FTS) TABLE OF CONTENTS 1 INTENDED USERS... 3 2 SCOPE OF GUIDE... 3 3 BACKGROUND... 3 4 REQUIRED CONFIGURATION... 3 5 CONTACT INFORMATION FOR SUPPORT... 4 6 SECURITY...

More information

Payment Systems Department

Payment Systems Department v Note: Please follow these guidelines for your safety as you enjoy the convenience of technology. However these guidelines are general; therefore, specific precautions may be taken as warranted by the

More information

You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 sales@webvisions.com

You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 sales@webvisions.com SSL You re FREE Guide to (Secure Sockets Layer) What is a Digital Certificate? SSL Certificates, also known as public key certificates or Digital Certificates, are essential to secure Internet browsing.

More information

DSI File Server Client Documentation

DSI File Server Client Documentation Updated 11/23/2009 Page 1 of 10 Table Of Contents 1.0 OVERVIEW... 3 1.0.1 CONNECTING USING AN FTP CLIENT... 3 1.0.2 CONNECTING USING THE WEB INTERFACE... 3 1.0.3 GETTING AN ACCOUNT... 3 2.0 TRANSFERRING

More information

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government. END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010

More information

Proofpoint provides the capability for external users to send secure/encrypted emails to EBS-RMSCO employees.

Proofpoint provides the capability for external users to send secure/encrypted emails to EBS-RMSCO employees. Proofpoint provides the capability for external users to send secure/encrypted emails to EBS-RMSCO employees. To create a new email message to be sent securely to an EBS-RMSCO employee: 1. Click on the

More information

Agile ICT Website Starter Guides

Agile ICT Website Starter Guides Agile ICT Website Guide V1.0 1 Agile ICT Website Starter Guides 2 The purpose of this guide is to show you how to edit some of the basics of the website you have purchased through Agile ICT. The website

More information

How to Use Your UT WebSpace Account By Kimberly Pendell October 2004

How to Use Your UT WebSpace Account By Kimberly Pendell October 2004 How to Use Your UT WebSpace Account By Kimberly Pendell October 2004 WebSpace has many features and capabilities; in this tutorial we will cover some of the more basic functions and collaborative work

More information

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Electronic Payment Works

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Electronic Payment Works N-CAP Users Guide Everything You Need to Know About Using the Internet! How Electronic Payment Works How Electronic Payment Works By Jennifer Hord When it comes to payment options, nothing is more convenient

More information

Basic Security Considerations for Email and Web Browsing

Basic Security Considerations for Email and Web Browsing Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable

More information

Security and Trust: The Backbone of Doing Business Over the Internet

Security and Trust: The Backbone of Doing Business Over the Internet WHITE PAPER: SECURITY AND TRUST: THE BACKBONE OF DOING BUSINESS OVER THE INTERNET White Paper Security and Trust: The Backbone of Doing Business Over the Internet Security and Trust: The Backbone of Doing

More information

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management

More information

Business Mobile Banking

Business Mobile Banking Business Mobile Banking Union Bank & Trust Business Mobile Application User Guide Contents Overview... 2 Security... 2 Requirements... 3 Downloading the App... 3 Logging In... 4 One-time Passcode Entry...

More information

Aspire. Basic Steps for Remote Desktop Protocol (RDP) Setup

Aspire. Basic Steps for Remote Desktop Protocol (RDP) Setup Basic Steps for Remote Desktop Protocol (RDP) Setup Basic RDP Setup for a school hosted at USOE. Setting up an RDP connection Remote Desktop Protocol When a school begins using ASPIRE SOFTWARE for the

More information

Extended SSL Certificates

Extended SSL Certificates Introduction Widespread usage of internet has led to the growth of awareness amongst users, who now associate green address bar with security. Though people are able to recognize the green bar, there is

More information

WinSen Online Payment / Prelease Service

WinSen Online Payment / Prelease Service WinSen Online Payment / Prelease Service SENTINEL SYSTEMS CORPORATION 1620 Kipling St Lakewood, CO 80215 800-456-9955 303-242-2010 FAX www.sentinelsystems.com Revised 11/06/2006 Introduction This service

More information

Marcum LLP MFT Guide

Marcum LLP MFT Guide MFT Guide Contents 1. Logging In...3 2. Installing the Upload Wizard...4 3. Uploading Files Using the Upload Wizard...5 4. Downloading Files Using the Upload Wizard...8 5. Frequently Asked Questions...9

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

GMC Connect User Guide v1.1

GMC Connect User Guide v1.1 GMC Connect User Guide v1.1 CONTENTS 1 INTRODUCTION...3 2 ACCESSING GMC CONNECT...4 2.1 User Registration...4 2.2 Logging In...5 3 THE HOME PAGE...6 4 DOCUMENT FOLDERS...7 4.1 About Document Folders...7

More information

OKPAY guides. Security Guide

OKPAY guides. Security Guide Название раздела OKPAY guides www.okpay.com Security Guide 2012 Contents SECURITY GUIDE Contents Introduction 1. OKPAY Security Overview 2. Security Tips 3. Security Center 3.1. Basic Protection 3.2. Email

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Table of Contents. Page 1 of 6 (Last updated 30 July 2015)

Table of Contents. Page 1 of 6 (Last updated 30 July 2015) Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational

More information

RemotelyAnywhere. Security Considerations

RemotelyAnywhere. Security Considerations RemotelyAnywhere Security Considerations Table of Contents Introduction... 3 Microsoft Windows... 3 Default Configuration... 3 Unused Services... 3 Incoming Connections... 4 Default Port Numbers... 4 IP

More information

USING CAMPUS ANYWARE OVER THE VPN (WINDOWS XP)

USING CAMPUS ANYWARE OVER THE VPN (WINDOWS XP) USING CAMPUS ANYWARE OVER THE VPN (WINDOWS XP) This document will explain how to install Campus Anyware on your machine (if needed), and how to run Campus Anyware from your machine while you are connected

More information

The FlexiSchools Online Order Management System Installation Guide

The FlexiSchools Online Order Management System Installation Guide The FlexiSchools Online Order Management System Installation Guide FlexiSchools May 2012 Page 1 of 18 Installation Pack Welcome to the FlexiSchools system. You will have received a disc containing: Sato

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

Hang Seng HSBCnet Security. May 2016

Hang Seng HSBCnet Security. May 2016 Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of

More information

Secure Access Portal. Getting Started Guide for using the Secure Access Portal. August 2011. Information Services

Secure Access Portal. Getting Started Guide for using the Secure Access Portal. August 2011. Information Services Secure Access Portal Getting Started Guide for using the Secure Access Portal Information Services 1. Introduction The Secure Access Portal enables the authority to provide simple but secure remote access

More information

User s Guide For Department of Facility Services

User s Guide For Department of Facility Services Doc s File Server User s Guide For Department of Facility Services For Ver : 7.2.88.1020 Rev : 1_05-27-2011 Created by : Elliott Jeyaseelan 2 Table of Contents SERVER LOGIN & AUTHENTICATION REQUIREMENTS

More information

Enterprise Toolbar User s Guide. Revised March 2015

Enterprise Toolbar User s Guide. Revised March 2015 Revised March 2015 Copyright Notice Trademarks Copyright 2007 DSCI, LLC All rights reserved. Any technical documentation that is made available by DSCI, LLC is proprietary and confidential and is considered

More information

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage. Important Please read this User s Manual carefully to familiarize yourself with safe and effective usage. About This Manual This manual describes how to install and configure RadiNET Pro Gateway and RadiCS

More information

Securing your Online Data Transfer with SSL

Securing your Online Data Transfer with SSL Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does

More information

Using Foundstone CookieDigger to Analyze Web Session Management

Using Foundstone CookieDigger to Analyze Web Session Management Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.

More information

BEGINNER S GUIDE TO SSL CERTIFICATES: Making the best choice when considering your online security options

BEGINNER S GUIDE TO SSL CERTIFICATES: Making the best choice when considering your online security options BEGINNER S GUIDE TO SSL CERTIFICATES: Making the best choice when considering your online security options BEGINNERS GUIDE TO SSL CERTIFICATES Introduction Whether you are an individual or a company, you

More information

Using Internet or Windows Explorer to Upload Your Site

Using Internet or Windows Explorer to Upload Your Site Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting

More information

account multiple solutions

account multiple solutions Start Guide Salary Payments for Sage Pastel Payroll & HR 1 Our easy to use guide will get you up and running in no time! Sage Pay allows you to seamlessly transfer your salary payments from Sage Pastel

More information

IntelliPay Billpay Application Documentation

IntelliPay Billpay Application Documentation IntelliPay Billpay Application Documentation Contents Billpay Introduction First Time Payment (With username and password) First Time Payment (Without username and password) Returning Customer Introduction:

More information

REMOTE ACCESS - OUTLOOK WEB APP

REMOTE ACCESS - OUTLOOK WEB APP REMOTE ACCESS - OUTLOOK WEB APP Outlook Web App Outlook Web App (formally known as Outlook Web Access) offers basic e-mail, calendar and contact access. You will not be able to access any of your documents

More information

A Guide for Patients of Abington Park Surgery

A Guide for Patients of Abington Park Surgery A Guide for Patients of Abington Park Surgery This guide covers the following topics: About SystmOnline Logging in to SystmOnline Changing/Resetting Your Password Logging Out of SystmOnline Managing Appointments

More information

Safety& Security Tips

Safety& Security Tips Safety& Security Tips 1. Security measures adopted by IDBI Bank IDBI Bank has a strong online security policy to ensure our customers have a safe and secure online experience with us. We have 256 bit Secure

More information

The Benefits of SSL Content Inspection ABSTRACT

The Benefits of SSL Content Inspection ABSTRACT The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic

More information

Portal Administration. Administrator Guide

Portal Administration. Administrator Guide Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Fraud Prevention Tips

Fraud Prevention Tips Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back

More information

Click Studios. Passwordstate. Installation Instructions

Click Studios. Passwordstate. Installation Instructions Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior

More information

Assistant Enterprise. User Guide. www.lumosnetworks.com 3-27-08

Assistant Enterprise. User Guide. www.lumosnetworks.com 3-27-08 Assistant Enterprise User Guide www.lumosnetworks.com 3-27-08 Assistant Enterprise (Toolbar) Guide Copyright Notice Trademarks Copyright 2007 BroadSoft, Inc. All rights reserved. Any technical documentation

More information

Remember, this is not specific to your email address alone... the METHOD you retrieve your email is equally important.

Remember, this is not specific to your email address alone... the METHOD you retrieve your email is equally important. Securing Your Email Skip to Page 2 to Begin or Read this FYI Using Security Certificates: Background and FYI Securing email requires the use of a certificate in order to work. Once you sign up for a certificate

More information

/ 1. Online Banking User Guide SouthStateBank.com / (800) 277-2175

/ 1. Online Banking User Guide SouthStateBank.com / (800) 277-2175 / 1 Online Banking User Guide SouthStateBank.com / (800) 277-2175 Welcome Thank you for using South State s Online Banking. Whether you are a first time user or an existing user, this guide will walk you

More information

Word Secure Messaging User Guide. Version 3.0

Word Secure Messaging User Guide. Version 3.0 Word Secure Messaging User Guide Version 3.0 Copyright 2007-2013 WordSecure, LLC. All Rights Reserved. Page 1 of 7 1. Introduction Word Secure Messaging is a program that allows you to exchange encrypted

More information

PROTECT YOUR FINANCIAL TRANSACTIONS

PROTECT YOUR FINANCIAL TRANSACTIONS PROTECT YOUR FINANCIAL TRANSACTIONS Caisses populaires acadiennes www.acadie.com/en It s a wealth of ways to strengthen the security of your financial transactions. By implementing simple measures to mitigate

More information

Bank of Wisconsin Dells Personal Online Banking Agreement and Disclosures (01/2016)

Bank of Wisconsin Dells Personal Online Banking Agreement and Disclosures (01/2016) Bank of Wisconsin Dells Personal Online Banking Agreement and Disclosures (01/2016) 1. Coverage. This Agreement applies to your use of the Bank of Wisconsin Dells Online Banking Service which permits you

More information

Managed Devices - Web Browser/HiView

Managed Devices - Web Browser/HiView Managed Devices - Web Browser/HiView All Hirschmann managed devices have a web based GUI interface available for configuration purposes. This is typically the primary means of configuration used for most

More information

WHITE PAPER SECURITY AND TRUST: THE BACKBONE OF DOING BUSINESS OVER THE INTERNET

WHITE PAPER SECURITY AND TRUST: THE BACKBONE OF DOING BUSINESS OVER THE INTERNET SECURITY AND TRUST: THE BACKBONE OF DOING BUSINESS OVER THE INTERNET CONTENTS 1 INTRODUCTION 1 ENCRYPTION TECHNOLOGY AND SSL CERTIFICATES 4 VERISIGN SEAL-IN-SEARCH : COMMUNICATING TRUST EARLY 4 EXTENDED

More information

Lenovo Partner Access - Overview

Lenovo Partner Access - Overview Table of Contents: Lenovo Partner Access Overview How to Access the Lenovo Partner Access Portal Registration Process and Account Activation First time login Accepting the T s & C s and Selecting Challenge

More information

The types of personal information we collect and share depend on the product or service you have with us. This information can include:

The types of personal information we collect and share depend on the product or service you have with us. This information can include: Rev 02/2012 FACTS WHAT DOES HANCOCK HOLDING COMPANY DO WITH YOUR PERSONAL INFORMATION? Why? Financial companies choose how they share your personal information. Federal law gives consumers the right to

More information

Password Depot for ios

Password Depot for ios Password Depot for ios Table Of Contents First steps... 1 Creating a password file... 1 Creating new entries... 3 Adding entries / groups... 3 Copying or relocating entries / groups... 3 Deleting entries

More information

Version 2.0 01.10.15. BSP Personal Internet Banking Online Help

Version 2.0 01.10.15. BSP Personal Internet Banking Online Help BSP Personal Internet Banking FAQ Version 2.0 01.10.15 Version 1.0_ 24.09.15 BSP Personal Internet Banking Online Help Table of Contents 1. What is BSP Internet Banking?... 5 2. How do I apply for BSP

More information

Green Pharm is committed to your privacy. We disclose our information practices below and we agree to notify you of:

Green Pharm is committed to your privacy. We disclose our information practices below and we agree to notify you of: Privacy Policy is committed to your privacy. We disclose our information practices below and we agree to notify you of: 1. What personally identifiable information of yours or third party personally identification

More information

Welcome to the Protecting Your Identity. Training Module

Welcome to the Protecting Your Identity. Training Module Welcome to the Training Module 1 Introduction Does loss of control over your online identities bother you? 2 Objective By the end of this module, you will be able to: Identify the challenges in protecting

More information

GENERAL TERMS AND CONDITIONS OF ECOBANK ON LINE BANKING SERVICES

GENERAL TERMS AND CONDITIONS OF ECOBANK ON LINE BANKING SERVICES GENERAL TERMS AND CONDITIONS OF ECOBANK ON LINE BANKING SERVICES 1. PURPOSE The purpose of these general terms and conditions is to regulate the modalities for accessing and operating the on line banking

More information

1. Chat4Support Introduction

1. Chat4Support Introduction 1. Chat4Support Introduction Chat4Support is a CodingBest product that helps businesses to improve their sales and customer service on the Internet. Website visitors just only need to click on the chat

More information

Safe internet for business use: Getting Started Guide

Safe internet for business use: Getting Started Guide Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial

More information