BOV 24x7 eservices. Information Security Best Practices

Size: px
Start display at page:

Download "BOV 24x7 eservices. Information Security Best Practices"

Transcription

1 Information Security Best Practices

2 Important to Read & Adopt Notwithstanding all the security features that the Bank of Valletta p.l.c. has put into its 24x7 electronic services, customers play a very important role in ensuring the overall security of the system. The following are simple precautions that customers must take to ensure a reasonable level of security when using BOV s Internet Banking, Mobile Phone Banking and Mobile Payments services: It is always a good practice to type the BOV url ( directly on your browser. Phishing s often contain a link to a website to lure you by clicking on the link and be taken to a fake website to steal your login credentials and other confidential information. Make sure that your PC, tablet or mobile phone is updated regularly with a good antivirus software and that this software is active at all times. There are products that update themselves automatically as soon as you log on to the Internet. Do not download from the Internet or install pirated software or programs of dubious origin, as these may contain coding that could cause serious security problems on your PC, tablet or mobile phone. Never open the file attachments in unsolicited , as they may contain malware that could cause serious security problems on your PC or mobile phone. Internet browsers (e.g. Internet Explorer) may have a feature that stores the User ID to enable quick logon we strongly recommend that this feature is not used. Check your account regularly. If you find a transaction you cannot remember making, or if cash is transferred unexpectedly, note down the exact details and report this to BOV immediately. Ensure that before using Wi-Fi adequate security must be enabled on your PC/tablet/mobile phone especially if you are accessing the Internet via a Hot Spot in a public place e.g. airport, café or hotel, as otherwise the privacy and accuracy of your information may be at risk. HotSpot users may compromise the confidentiality and integrity aspects of their information on their PC by way of unprotected File & Printer Sharing, since these resources may be used by others using the same HotSpot and the Internet in general, if not protected at least by a password to access these resources. Remove or disable your wireless card if you are working offline on your computer and you are not planning to connect to a HotSpot Service. PIN Management You require a PIN to gain access to the BOV Securekey. A separate PIN, the BOV Mobile PIN, is required to access your BOV Mobile Banking Channel or BOV Mobile Pay. Your BOV Mobile PIN should be different from the one you use for your BOV Securekey. Please remember that the BOV Mobile PIN will also be used to effect/authorise transactions in either BOV Mobile Banking Channel or BOV Mobile Pay transactions. When choosing a PIN, do NOT use number combinations that may be easily guessed, such as using consecutive numbers (e.g. 3456, 9876) or using repetitive numbers (e.g or 2222). Such combinations just make it easier for a person to break the security code. Do not respond to electronic mail that ask you for your PIN and other related security information, especially those that may seem to have been sent by Bank of Valletta or any of its subsidiaries. BOV staff do not have a need to ask for such information. Do not disclose your PIN to anyone else, not even family members or friends - BOV staff do not have a need to ask you for the PIN either. Do not write down the PIN or have it stored in a place easily accessible by anyone. Keep your BOV Securekey in a safe place - if lost or stolen, you must report it immediately to the Bank s Customer Service Centre on Tel: on a 24 hour basis. BOV Protect powered by Trusteer Rapport A free security software, branded as BOV Protect, provided by Bank of Valletta for its Internet Banking Channel Banking customers is available and recommended. This can be downloaded from our official website Once installed in your PC, this protects you from different malware attacks by creating a safe and secure communication line while you are using our online services. You may also protect other websites you access apart from BOV websites wherein you detail any personal or login information with this Trusteer Rapport software. page 2 of 6

3 Internet Banking Never leave your PC unattended while logged on to BOV 24x7 Internet Banking. The BOV Internet Banking service provides the customer with the time and date of the last online session after initial login - make it a habit to check this information each time you log on to ensure that no other unauthorised session was carried out. We recommend that you install a personal firewall on your PC, which will prevent third parties accessing your computer and guard against the introduction of malware onto your PC. Ensure that your operating system e.g. Windows 8/7/Vista is updated regularly with security patches issued by Microsoft from time to time as known vulnerabilities may be exploited by attackers. To ensure that you are accessing BOV s Internet Banking Services, check its online digital certificate. You can easily do this by double-clicking your mouse on the yellow padlock symbol displayed at the bottom right hand corner of your browser screen. The certificate should be checked to ensure it belongs to Bank of Valletta p.l.c. (ebanking.bov.com) and the certificate date is valid. If prompted with a security alert window advising you that there is a problem with the site security digital certificate, you must immediately terminate the online session, and report the incident to the BOV Customer Service Centre on Tel: The BOV Internet Banking application includes controls not to leave residual information relating to your Internet online banking sessions. However, to be on the safe side, especially when using at a Cyber café or Kiosk, we recommend clearing the cache memory of your Internet browser (i.e. stored information in the PC s memory). You must not use the BOV Internet Banking service in a manner that would: deny the use of the service to others, deny the use of any other computer system to others; aid the unauthorised access to any other BOV computer system. A BOV Internet Banking session remains active for 10 minutes without any customer intervention, so do not leave your PC unattended throughout the duration of the session make sure you log off (button at the top right of the screen) to terminate the session. This also ensures that no residual information is available (especially when using a Cyber café or Kiosk) to other people to see. Mobile Phone Banking Keep your mobile phone safe at all times. Treat your mobile phones like your own computer when it comes to security. You may install security softwares on your mobile phone such as an anti-virus to protect it from malware. When receiving SMS, or s be cautious in opening files and on clicking on any link provided in the SMS or . The BOV Mobile App, is free and easy to download and use, but make sure that you download the official BOV Mobile App. If you are using an Apple iphone TM make sure that you download the App only from the Apple Appstore, and if you are using an Android TM smartphone, make sure that you use only the Google Play - Android Market. Disable Bluetooth or set its status to hidden when not in use. It is possible to infect your mobile phone with a malware through Bluetooth connection. Disable Wi-Fi access by default and avoid connection to Wi-Fi hotspots. Use caution when connecting your mobile phone to any computer via USB port as this may allow the spread of a malware. Enable PIN/password protection i.e used as a lock, on your mobile phone. Configure your mobile phone to automatically lock the keypad after a certain time and will require a PIN to unlock. Encrypt data stored on your mobile phone. Do not store confidential information such as PIN on your mobile phone. If you are still conducting Mobile Banking via WAP, you must enable the security feature (WTLS Wireless Transport Layer Security) on your mobile phone handset to ensure that any transmissions are sent securely. If you do not enable security on your mobile phone handset, data will be transmitted via an unsecure connection. A BOV Mobile Banking session remains active for 5 minutes without any customer intervention, so do not leave your mobile unattended throughout the duration of the session make sure you log off (button at the top right of the screen and then press the Logout Toolbar Menu Icon at the bottom of the screen) to terminate the session. This also ensures that no residual information is available to other people to see. page 3 of 6

4 Frequently Asked Questions Instructions on how to clear your cache What is a Digital Certificate? What is Secure Socket Layer (SSL)? What is Encryption? What is a Firewall? What is a Mobile App? What is phishing? What is pharming? What does malware mean? What does Anti-virus software do? What is WAP? What is WTLS? What is GPRS? What is Wi-Fi? What is a HotSpot? Instructions on how to clear your cache To ensure all the information you have seen on the Internet is deleted from your system, please follow these instructions: Microsoft Internet Explorer 8 or above: Click on Internet Options. Choose the General tab and find the Browsing History section then click the Delete button. A new Delete Browsing History window will appear and tick the Temporary Internet Files then click Delete button. Mozilla Firefox 3.5 and above: Click on and select Clear Recent History. From the Time Range to Clear, select the desired range or select Everything if you want to clear your entire cache. Then press Clear Now. We suggest that for the numerous other different browsers, you may check the Help Menus for instructions purposes in clearing your cache memory. Same applies for your Smartphone browsing. What is a Digital Certificate? Digital Certificates form an essential part of providing reassurance to our customers that the website that they are visiting is genuine and not a rogue website purporting to represent BOV. A digital certificate is required in the web browser and on the web server in order that a Secure Socket Layer (SSL) session can be started and enable secure communications. What is Secure Socket Layer (SSL)? SSL is a method of encryption that allows communication between a web browser and a web server to be private. Many web sites use SSL to secure customer information in transit such as your banking details. Normally you will not be aware of SSL as it works automatically when your web browser accesses a secure web site such as BOV s Internet Banking Services. You can tell if you are in a secure web site by checking that the URL (uniform resource location) on the screen begins with https rather than just http. See also at the bottom right-hand corner of the screen you should see the yellow padlock that means that a secure session is in force. What is Encryption? Encryption is the transformation of plaintext i.e. readable information, into cipher text i.e. unreadable information. Decryption is the reverse of encryption i.e. changing the cipher text back to plaintext. Throughout an SSL session, any information is transmitted in cipher text so that any eavesdroppers cannot read the information. page 4 of 6

5 What is a Firewall? A personal firewall is generally software based that provides a security barrier between your PC and the Internet. A firewall will prevent unauthorised access to your computer while on the Internet, however it will not necessarily protect your PC from computer viruses. Only an updated antivirus software can detect and neutralise computer viruses. What is a Mobile App? A Mobile App is an application you may install on a mobile phone which can provide an additional function or use to it other than a phone call. What is phishing? Phishing is when a fraudster attempts to send fake s pretending to be coming from a legitimate organization with the intention of stealing your confidential information. The phishing contains a link to a fake website prompting you to login with your valid credentials which will enable the fraudster to obtain your personal and account information. The stolen information will then be used to commit other fraudulent online transactions. What is pharming? Pharming is a form of attack where you are taken to a fraudulent website even if you type the correct address (url) in your browser. This does not require a phishing and thus it is often described as phishing without a lure. This is caused by a malware installed on your PC which had poisoned the host file or DNS in your computer which redirects the user to a fake website. What does malware mean? The term malware refers to any type of computer program that can cause problems on a pc/tablet or mobile phone eg. computer virus. What does antivirus software do? This software will detect and eliminate computer viruses from your computer, however it must be kept updated to the last virus alert issued by the vendor, otherwise your PC could easily become infected with the latest strains of computer viruses that propagate themselves via the Internet. What is WAP? Wireless Application Protocol (WAP) is an application environment and set of communication protocols used to standardize the way that wireless devices interface with each other and the Internet. What is WTLS? Wireless Transport Layer Security (WTLS) is the wireless version of the industry standard Transport Layer Security (TLS), which is equivalent to the widely used Secure Socket Layer (SSL) that is also used by BOV s Internet Banking Services. The use of WTLS ensures that any transmissions between the mobile phone handset and the WAP server are encrypted i.e. the confidentiality aspect of the contents is assured. What is GPRS? General Packet Radio Service (GPRS) is a non-voice value added service that allows information to be sent and received across a mobile telephone network. page 5 of 6

6 What is Wi-Fi? Wi-Fi (Industry brand designation for wireless Ethernet) is a wireless technology that enables computers to send and receive data without the need to be hooked up to a wired network. Users are advised to ensure that adequate security is enabled before using this technology as otherwise the confidentiality i.e. privacy and integrity i.e. accuracy of their information may be compromised. What is a HotSpot? Public place (café, hotel, airport etc.) that provides easy access to a wireless network, which makes it possible for users of mobile terminals (portable PCs, PDAs) to connect easily to the Internet. Users are advised to ensure that adequate security is enabled before using Wi-Fi via a HotSpot as otherwise the confidentiality i.e. privacy and integrity i.e. accuracy of their information may be compromised. Where in doubt better not use these services unless you have taken the precautions to protect your information eg. encrypting your information, properly configured firewall, updated antivirus software, latest security patches from Microsoft in place. Issue Date: v bov.com Issued by Bank of Valletta p.l.c. 58, Triq San Żakkarija, Il-Belt Valletta VLT Malta page 6 of 6

Advice about online security

Advice about online security Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP

More information

Contents Security Centre

Contents Security Centre Contents Security Centre... 1 1. Search Engines... 2 2. Online Applications... 2 3. Virgin Money Credit Card Online Banking Security Measures... 2 3.1 Access Number, PIN and Password... 2 3.2 Keypad...

More information

Deutsche Bank db easynet. Secure method of use of the db easynet e-banking system

Deutsche Bank db easynet. Secure method of use of the db easynet e-banking system Deutsche Bank Secure method of use of the e-banking system Introduction Deutsche Bank pays particular attention to your security. Therefore, the funds entrusted to us by our Customers are protected, using

More information

OUTLOOK WEB ACCESS. User Guide

OUTLOOK WEB ACCESS. User Guide OUTLOOK WEB ACCESS User Guide V3 2 August 2013 Not protectively marked GETTING STARTED Outlook Web Access (OWA) provides a useful means to remotely access Council email from outside of the council access.

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

General Security Best Practices

General Security Best Practices General Security Best Practices 1. One of the strongest physical security measures for a computer or server is a locked door. 2. Whenever you step away from your workstation, get into the habit of locking

More information

How To Protect Yourself Online

How To Protect Yourself Online NetBank security guide Commonwealth Bank Personal 1 Contents Page 4 5 5 5 7 7 9 9 9 11 12 12 13 13 13 14 14 14 16 16 16 17 18 18 19 19 20 21 Section Peace of mind with NetBank What are the common online

More information

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS $ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security

More information

Safe Use of Electronic Services

Safe Use of Electronic Services Safe Use of Electronic Services Electronic banking is not only quick, cost-effective and convenient but also safe. However, each system is only as safe as its weakest link. The security foundations of

More information

Spring Hill State Bank Mobile Banking FAQs

Spring Hill State Bank Mobile Banking FAQs Spring Hill State Bank Mobile Banking FAQs What is Mobile Banking? Mobile Banking enables you to access your account information using the Bank online banking website. You must first be enrolled as an

More information

Desktop and Laptop Security Policy

Desktop and Laptop Security Policy Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious

More information

Oriental Bank s NetBanking Services

Oriental Bank s NetBanking Services Oriental Bank s NetBanking Services User Guidelines Oriental Bank s NetBanking Services have been launched to maximize the customer satisfaction. The NetBanking Services can be availed by any customer

More information

Leonardo Hotels Group Page 1

Leonardo Hotels Group Page 1 Privacy Policy The Leonardo Hotels Group, represented by Sunflower Management GmbH & Co.KG, respects the right to privacy of every individual who access and navigate our website. Leonardo Hotels takes

More information

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

When visiting online banking's sign-on page, your browser establishes a secure session with our server. The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server. How Encryption

More information

The Hidden Dangers of Public WiFi

The Hidden Dangers of Public WiFi WHITEPAPER: OCTOBER 2014 The Hidden Dangers of Public WiFi 2 EXECUTIVE SUMMARY 4 MARKET DYNAMICS 4 The Promise of Public WiFi 5 The Problem with Public WiFi 6 MARKET BEHAVIOR 6 Most People Do Not Protect

More information

Basic Security Considerations for Email and Web Browsing

Basic Security Considerations for Email and Web Browsing Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable

More information

Tips for Banking Online Safely

Tips for Banking Online Safely If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining

More information

Installation Instructions

Installation Instructions Avira Free Android Security Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other

More information

Customer Education to Combat Scams and Fraud

Customer Education to Combat Scams and Fraud Customer Education to Combat Scams and Fraud How you can protect your identity and accounts: Do not click suspicious links or open unexpected attachments. Do not provide account info to links in emails

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Sophos Mobile Control User guide for Android

Sophos Mobile Control User guide for Android Sophos Mobile Control User guide for Android Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control

More information

Online Security Information. Tips for staying safe online

Online Security Information. Tips for staying safe online Online Security Information ProCredit Bank is committed to protecting the integrity of your transactions and bank account details. ProCredit Bank therefore uses the latest security software and procedures

More information

Safety precautions for Internet banking or shopping How to avoid identity theft online

Safety precautions for Internet banking or shopping How to avoid identity theft online Winter 2016 A Customer s Guide to Cybersecurity To Help Prevent Online Fraud and Theft Safety precautions for Internet banking or shopping How to avoid identity theft online Protect Your Cyber Home With

More information

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1 P a g e 1 Internet Basics ABOUT THIS CLASS This class is designed to provide a basic introduction to accessing and navigating the internet (a.k.a. the world wide web or the web ). Throughout the class,

More information

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES 01 One must remember that everyone and anyone is a potential target. These cybercriminals and attackers often use different tactics to lure different

More information

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover Sound Business Practices for Businesses to Mitigate Corporate Account Takeover This white paper provides sound business practices for companies to implement to safeguard against Corporate Account Takeover.

More information

Online Business Banking FREQUENTLY ASKED QUESTIONS

Online Business Banking FREQUENTLY ASKED QUESTIONS Online Business Banking FREQUENTLY ASKED QUESTIONS» BSP Online Business Banking» Frequently Asked Questions GENERAL Q. What is BSP Online? A. BSP Online allows customers to securely access their BSP Bank

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Internet Banking. Getting Started Guide Australia

Internet Banking. Getting Started Guide Australia Internet Banking Getting Started Guide Australia 2 Rabobank Internet Banking Welcome to Rabobank Internet Banking Access with peace of mind With Rabobank Internet Banking, you can control your money anywhere,

More information

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. By completing this module and the quiz, you will receive credit for CW 170, which is required

More information

Secure Your Information and Communication Technology Devices

Secure Your Information and Communication Technology Devices You should pay attention to the following items bef the Internet: Secure Your Information and Communication Technology Devices Install proper anti-virus software P.3 Log on as a user and not as an administrator

More information

Sophos Mobile Control User guide for Android. Product version: 4

Sophos Mobile Control User guide for Android. Product version: 4 Sophos Mobile Control User guide for Android Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set up

More information

Wireless Network Best Practices for General User

Wireless Network Best Practices for General User Wireless Network Best Practices for General User I n Hong Kong, the number of Wi-Fi access points (hotspots) has reached 31,000 in 2015 1. Unfortunately, not all of them are well-protected. In fact, wireless

More information

PROTECT YOUR FINANCIAL TRANSACTIONS

PROTECT YOUR FINANCIAL TRANSACTIONS PROTECT YOUR FINANCIAL TRANSACTIONS Caisses populaires acadiennes www.acadie.com/en It s a wealth of ways to strengthen the security of your financial transactions. By implementing simple measures to mitigate

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

This manual will help you connect your Microsoft Windows XP, Vista, or 7, or Apple OS X computer to the University of Maryland campus data network.

This manual will help you connect your Microsoft Windows XP, Vista, or 7, or Apple OS X computer to the University of Maryland campus data network. This manual will help you connect your Microsoft Windows XP, Vista, or 7, or Apple OS X computer to the University of Maryland campus data network. Prerequisites for Network Registration: 1. In order to

More information

F-Secure Mobile Security for Business. Getting Started Guide

F-Secure Mobile Security for Business. Getting Started Guide F-Secure Mobile Security for Business Getting Started Guide F-Secure Mobile Security for Business TOC 3 Contents Chapter 1: F-Secure Mobile Security Portal...5 Overview...6 Administrator access levels...6

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Keep Hackers Guessing: Protecting Corporate Information While On The Go

Keep Hackers Guessing: Protecting Corporate Information While On The Go Keep Hackers Guessing: Protecting Corporate Information While On The Go Proactive tips for wireless information security for traveling professionals. In today s world where WiFi hotspots are available

More information

SECURITY RECOMMENDATIONS INTERNET BANKING TRANSACTIONAL

SECURITY RECOMMENDATIONS INTERNET BANKING TRANSACTIONAL SECURITY RECOMMENDATIONS INTERNET BANKING TRANSACTIONAL This page should provide customers with all the information they need concerning the security of a transactional Internet banking site and, in particular,

More information

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government. END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010

More information

Secure Email Client Guide

Secure Email Client Guide PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing

More information

Policy for Staff and Post 16 Student BYOD (Bring Your Own Device)

Policy for Staff and Post 16 Student BYOD (Bring Your Own Device) Policy for Staff and Post 16 Student BYOD (Bring Your Own Device) Date approved: 7 th May 2015 Review Schedule: Annual Reviewed: Next review: 1 Context Aims of this Policy Definitions CONTENTS 1. OVERVIEW...

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the

More information

Reliance Bank Fraud Prevention Best Practices

Reliance Bank Fraud Prevention Best Practices Reliance Bank Fraud Prevention Best Practices May 2013 User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters and numbers.

More information

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide Document Revision Date: Nov. 13, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Introduction... 1 Exchange 2010 Outlook

More information

Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault

Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault Outlook Plugin... 13 Using KiteDrive to Send Large

More information

Secure Socket Layer (SSL) Machines included: Contents 1: Basic Overview

Secure Socket Layer (SSL) Machines included: Contents 1: Basic Overview Secure Socket Layer (SSL) Machines included: HL-4040CN HL-4050CDN HL-4070CDW DCP-9040CN DCP-9045CDN MFC-9440CN MFC-9840CDW Contents 1) Basic overview 2) Brief history 3) Benefit of using SSL 4) How to

More information

Safe Practices for Online Banking

Safe Practices for Online Banking November 2012 Follow these guidelines to help protect your information while banking online. At First Entertainment Credit Union, our goal is to provide you with the best all around banking experience.

More information

Hang Seng HSBCnet Security. May 2016

Hang Seng HSBCnet Security. May 2016 Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

Massey University Wireless Network Client Configuration Mac OS X 10.6 10.9

Massey University Wireless Network Client Configuration Mac OS X 10.6 10.9 Massey University Wireless Network Client Configuration Mac OS X 10.6 10.9 MAC wireless network Requirements Information Technology Services You must have an active Massey username and password (i.e. you

More information

AkrutoSync 4.0 User Guide

AkrutoSync 4.0 User Guide AKRUTO AkrutoSync 4.0 User Guide Welcome Thank you for choosing AkrutoSync. AkrutoSync can synchronize your Contacts, Calendar and Tasks between Outlook on your computer and your Windows Phone. AkrutoSync

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The

More information

MOBILE BANKING USER GUIDE

MOBILE BANKING USER GUIDE MOBILE BANKING USER GUIDE CentricBank.com DrCentricBank.com 717.657.7727 Centric Bank does not currently charge a fee for Mobile Banking. However, your mobile phone provider may charge data usage fees

More information

User Guide Vodafone Pocket WiFi Extreme. Designed by Vodafone

User Guide Vodafone Pocket WiFi Extreme. Designed by Vodafone User Guide Vodafone Pocket WiFi Extreme Designed by Vodafone Welcome to the world of mobile communications 1 Welcome 2 Device overview 3 Getting started: setup 4 Getting started: use 5 Pocket WiFi online

More information

User Guide FOR TOSHIBA STORAGE PLACE

User Guide FOR TOSHIBA STORAGE PLACE User Guide FOR TOSHIBA STORAGE PLACE (This page left blank for 2-sided "book" printing.) Table of Contents Overview... 5 System Requirements... 5 Storage Place Interfaces... 5 Getting Started... 6 Using

More information

Internet and Email Help. Table of Contents:

Internet and Email Help. Table of Contents: Internet and Email Help The following tips are provided to assist you in troubleshooting and managing your Plex Internet and email services. For additional issues or concerns, you may also call our Product

More information

2X SecureRemoteDesktop. Version 1.1

2X SecureRemoteDesktop. Version 1.1 2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3

CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3 CLEO ~Remote Access Services Remote Desktop Access User guide CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3 August 2007 page 1 of 16 CLEO 2007 CLEO Remote Access Services 3SGD

More information

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire

More information

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com

More information

STRONGER ONLINE SECURITY

STRONGER ONLINE SECURITY STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial

More information

Cybersecurity Best Practices

Cybersecurity Best Practices Ten Essential Cybersecurity Best Practices Banking Business Employees Brought to you by: 1 Did you know? One in five small-to-medium-sized companies were the victims of cyber breaches in 2013.1 In 76%

More information

Nokia E90 Communicator Using WLAN

Nokia E90 Communicator Using WLAN Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia

More information

General tips for increasing the security of using First Investment Bank's internet banking

General tips for increasing the security of using First Investment Bank's internet banking General tips for increasing the security of using First Investment Bank's internet banking Dear Clients, First Investment Bank (Fibank, the Bank) provides you with high level of protection and security

More information

Wi-Fi is a popular technology that allows Internet-enabled devices

Wi-Fi is a popular technology that allows Internet-enabled devices WI-FI: NOTHING IS PRIVATE WHEN DONE IN PUBLIC You have to take all necessary measures to protect yourself, your information, and your identity for no matter what, cyber criminals are out to get you Wi-Fi

More information

REDCap project creation is not possible in the Mobile App

REDCap project creation is not possible in the Mobile App About the REDCap Mobile App REDCap software provides its online users with the ability to create and manage surveys and databases quickly and securely to facilitate data collection. The REDCap mobile app

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot

More information

User guide. Business Email

User guide. Business Email User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook

More information

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Business Internet Banking / Cash Management Fraud Prevention Best Practices Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Online Giving User Guide for Church Members

Online Giving User Guide for Church Members User Guide for Church Members Pub 111, February 2011 2009-2011 ParishSOFT LLC, all rights reserved. ParishSOFT grants licensed users the right to unlimited duplication of this publication for internal

More information

Enhanced Security for Online Banking

Enhanced Security for Online Banking Enhanced Security for Online Banking MidSouth Bank is focused on protecting your personal and account information at all times. As instances of internet fraud increase, it is no longer sufficient to use

More information

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted

More information

Deltek Touch Time & Expense for Vision 1.3. Release Notes

Deltek Touch Time & Expense for Vision 1.3. Release Notes Deltek Touch Time & Expense for Vision 1.3 Release Notes June 25, 2014 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or technical

More information

UC-One 2014 R20.0.3 Frequently Asked Questions

UC-One 2014 R20.0.3 Frequently Asked Questions UC-One 2014 R20.0.3 Frequently Asked Questions August 2014 z Version Control Version Issue Date Document Author Purpose of Amendment 1.0 01/04/2013 DI Initial Release 2.0 TBA BM Updated for UC-One 2014

More information

CITRIX TROUBLESHOOTING TIPS

CITRIX TROUBLESHOOTING TIPS CITRIX TROUBLESHOOTING TIPS The purpose of this document is to outline the Most Common Frequently Asked Questions regarding access to the County of York Computer Systems via Citrix. SYSTEM REQUIREMENTS:

More information

User Guide Vodafone Pocket WiFi 4G. Designed by Vodafone

User Guide Vodafone Pocket WiFi 4G. Designed by Vodafone User Guide Vodafone Pocket WiFi 4G Designed by Vodafone Welcome to the world of mobile communications 1 Welcome 2 Device overview 3 Getting started: setup 4 Getting started: use 5 Pocket WiFi online dashboard

More information

Follow the instructions below for first-time users only

Follow the instructions below for first-time users only Whittier Law School Law Library Cisco NAC Agent Wireless Installation Guide For Microsoft Windows In order to access the wireless network on campus, Microsoft Windows laptop users must go through the Cisco

More information

NextGen Patient Portal User Guide. Version 2.0

NextGen Patient Portal User Guide. Version 2.0 NextGen Patient Portal User Guide Version 2.0 Copyright 2014 NextGen Healthcare Information Systems, LLC. All Rights Reserved. NextGen and the registered trademarks listed at http://www.nextgen.com/about-nextgen/legalnotices.aspx

More information

MelbourneOnline Hosted Exchange Setup

MelbourneOnline Hosted Exchange Setup MelbourneOnline Hosted Exchange Setup Your email on our Hosted Exchange servers can be accessed by multiple devices including PC, Mac, iphone, IPad, Android, Windows Phone and of course webmail. It s all

More information

E-mail Policy Of Government of India

E-mail Policy Of Government of India E-mail Policy Of Government of India October 2014 Version 1.0 Department of Electronics and Information Technology Ministry of Communications and Information Technology Government of India New Delhi -

More information

Business ebanking Fraud Prevention Best Practices

Business ebanking Fraud Prevention Best Practices Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special

More information

McAfee.com Personal Firewall

McAfee.com Personal Firewall McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...

More information

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Why should you be concerned? There are over 1 million known computer viruses. An unprotected computer on the

More information

SSL Guide. (Secure Socket Layer)

SSL Guide. (Secure Socket Layer) SSL Guide (Secure Socket Layer) To find basic information about network and advanced network features of your Brother machine: uu Network User's Guide. To download the latest manual, please visit the Brother

More information

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues.

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. The latest tactic currently being used by malware creators

More information

Password Depot for Android

Password Depot for Android Password Depot for Android Table Of Contents Table Of Contents... 2 User interface... 3 Action Bar... 3 Overflow Menu... 4 Entry menu... 5 Context Bar... 6 Settings... 7 Creating a password file... 8 Opening

More information

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home. Remote Desktop Gateway Accessing a Campus Managed Device (Windows Only) from home. Contents Introduction... 2 Quick Reference... 2 Gateway Setup - Windows Desktop... 3 Gateway Setup Windows App... 4 Gateway

More information

E21 Mobile Users Guide

E21 Mobile Users Guide E21 Mobile Users Guide E21 Mobile is the Mobile CRM companion to TGI s Enterprise 21 ERP software. Designed with the mobile sales force in mind, E21 Mobile provides real-time access to numerous functions

More information

Securing mobile devices in the business environment

Securing mobile devices in the business environment IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile

More information

Websense Content Gateway HTTPS Configuration

Websense Content Gateway HTTPS Configuration Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco

More information

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account? Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply

More information

Guide to credit card security

Guide to credit card security Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely

More information

Mobile Banking. Click To Begin

Mobile Banking. Click To Begin Mobile Banking Click To Begin Click On Your Type Of Phone iphone Please select the method you would like to use for accessing your account from the options below: APP (Downloadable Application from itunes)

More information

How To Send Mail From A Macbook Access To A Pc Or Ipad With A Password Protected Email Address (Monroe Access) On A Pc (For Macbook) Or Ipa (For Ipa) On Pc Or Macbook (For

How To Send Mail From A Macbook Access To A Pc Or Ipad With A Password Protected Email Address (Monroe Access) On A Pc (For Macbook) Or Ipa (For Ipa) On Pc Or Macbook (For Email client settings: Incoming Mail (IMAP) Server requires SSL: Outgoing Mail (SMTP) Server requires TLS or SSL: Account Name: Email Address: Password: imap.gmail.com Use SSL: Yes Port: 993 smtp.gmail.com

More information