Octopus Online Service Safety Guide

Size: px
Start display at page:

Download "Octopus Online Service Safety Guide"

Transcription

1 Octopus Online Service Safety Guide This Octopus Online Service Safety Guide is to provide you with security tips and reminders that you should be aware of when using online and mobile services provided by Octopus Cards Limited ( us, we, our, our company, OCL ) 1. When using online services provided by OCL 1.1. Do not use untrusted mobile device or public computer to access our services Access OCL s website only by entering in your web browser Only download Octopus mobile applications through the links from OCL website or authorized apps stores Google Play Store or Apple App Store When carrying out online transactions provided by us via the Internet browser, a pad lock will appear. When you click on the lock, a digital certificate issued to our company will be shown When carrying out services with Octopus cards and products ( Octopus ), you are required to provide the Octopus number and the bracketed digit for validation and authentication. You can use your registered Octopus ( Registered Octopus ) for making online payment after successful registration Remember to close the services and log-out (if applicable) after you have finished using it We will not display your personal information in any s or short messages (SMS) sent by OCL or ask you to confirm any personal data or credentials such as password by replying to the or SMS sent by OCL When using Octopus Online Payment During the purchase process, the online merchant may request information such as your name, address, phone number and shipping address for the fulfilment of your purchase. Unless otherwise specified, such data will not be shared with or kept by OCL OCL will not collect your personal information when you use the online payment service. 1 / 8

2 1.9. When using Octopus O! epay ( O! epay ) Only apply your O! epay account through designated channels When applying for O! epay account ( O! epay Account ), OCL may request you to provide information such as your name, address, phone number, and the image of identification document. These information are securely stored in our servers for the purposes of O! epay application and customer service. Details of the purpose(s) and use of your personal data can be found in the Conditions of Issues of Octopus To use the O! epay Fund Transfer with Bank Service, OCL will request you to provide information such as your bank and bank account number, and use your full name and O! epay account number for setup and operation of the service. These information are securely stored in our servers for operating the service. Details of the purpose(s) and use of your personal data can be found in the Terms and Conditions Relating to Fund Transfer with Banks under Octopus O! epay Service Keep the account password to yourself. Do not write it down and please change it regularly. Choose a strong password with alphanumeric combinations and difficult to guess Do not disclose your password to anyone. OCL will never ask for your password when communicating with you If you are using an ios device that supports Touch ID, you may choose to login to your O! epay Account with your ios Touch ID. Please be ensured that we only rely on ios to store and authenticate your fingerprint and do not capture or store any of your fingerprint data Before using the Touch ID option, please ensure the Touch ID includes no other persons than the O! epay Account Holder, e.g. yourself, to prevent any unauthorised access to your O! epay Account Review the requests from others carefully. When other users invite you as a friend, the mobile number will be shown for your review prior to approval. Please make sure the other user is someone you know and trustworthy You will receive payment request and payment reminder notifications only in the O! epay App. Such notifications will not be sent to you through or SMS. You can review payment request after logging-in to your O! epay Account Before accepting a payment request or sending a P2P payment 2 / 8

3 ( P2PPayment ), review the payment details carefully, including the recipient and the payment amount. All payment transactions of O! epay are final and irreversible upon confirmation of the payment instruction If you have changed your mobile phone number or other personal information, please call Octopus Customer Service Hotline at at your earliest convenience to update your record with us If you have changed your address, you should update your address through your O! epay App as soon as possible to prevent missing any important notifications Please input your mobile number carefully in order to receive SMS notification alerts for your O! epay transactions Check your O! epay Account and Registered Octopus transactions regularly. If you have any questions or found any activity suspicious, please report to us immediately by calling Octopus Customer Service Hotline at You can keep your O! epay Account monthly statement by downloading it through the O! epay App. 2. What has OCL done to protect you? 2.1. Our servers and infrastructure are protected by firewall and intrusion prevention/detection systems to prevent unauthorised access All communications between our servers, your device and Octopus are transmitted with industry recognized encryption standard If the transaction is not completed within a set period of time, it will be cancelled automatically Our system logs the usage of each Octopus for online services. If there are 5 attempts for inputting the non-matching Octopus number, the online functions of the Octopus will be suspended for 24 hours To ensure transactions are carried out securely, the mobile application provided by OCL may block your access if your mobile device has been detected as rooted or jailbroken. We will not access other information in your mobile device when detecting your device s status For Octopus Online Payment The merchant information and transaction amount are shown on the Octopus App, O! epay App or website, allowing you to check the 3 / 8

4 merchant name and amount prior to making a payment When using online payment service with Octopus PC Reader (i) The service is provided to you on a website with https connection. Make sure there is a pad lock displayed on your browser when using the Octopus Online Payment service. When viewing the certificate, it will show OCL as the owner. (ii) Transport Layer Security is used when you use Octopus Online Payment. Your information input in Octopus Online Payment is encrypted before transmission through Internet, no one except us or authorized party with the key will be able to read it. Octopus Online Payment uses 128bit encryption which conforms with industry encryption standard for secure information transmission through Internet. (iii) When using Octopus Online Payment, only this domain will be used for payment transactions For O! epay You can access your O! epay Account from two registered devices at any time.when using O! epay, we will display the last login attempt and status. If you find any suspicious activities, please call Octopus Customer Service Hotline at immediately for investigation When using the service, your login session will expire after a set period of idle time When you contact us to make enquiry about the operation of your O! epay Account, we will ask for your authentication code or personal information to authenticate your identity for the protection of your account information A verification code will be sent to your registered mobile number through SMS when you login from a new mobile device or increase your daily transaction limit. Such SMS will include the verification code and the purpose of that transaction. Please review the SMS content before entering the verification code to the O! epay App. If you receive any suspicious SMS relating to the service, please report to us immediately for investigation by calling Octopus Customer Service Hotline at If you have subscribed to SMS forwarding service from your mobile network operator, the SMS will not be forwarded regardless of the service setting. You are also reminded not to forward the SMS verification code to other mobile devices. 4 / 8

5 We will temporarily suspend your account if we detect a series of unsuccessful login attempts. If you find your account locked, please contact our customer service hotline at for assistance We will provide updates on your account activities by push notification messages/ s. For important transactions such as device registration / de-registration, and add payee/friend, notifications will be sent via both push notifications and alternative channel of your registered address. Please check such activities in a timely manner and if suspicious activities found, please call Octopus Customer Service Hotline at immediately After you add a new friend or register a new Octopus to your O! epay Account, a daily summary will be sent to your address. Please check such activities in a timely manner and if suspicious activities found, please call Octopus Customer Service Hotline at immediately We will never ask our customers to validate their personal and/or account related information (e.g. ID number or login password) by s or through any hyperlinks embedded in such s. 3. What to do to protect yourself? 3.1. Do not leave your Octopus unattended. This protects you against unauthorised registration and usage for online payment Enable the screen lock function of your mobile device and do not leave your mobile device unattended. If your mobile device is left unattended, other people may steal it and / or retrieve the information you have stored in it without your notice. Enabling the screen lock function of the mobile device can prevent your personal information, such as messages, browser history and your contact list from being accessed by others Use the remote locate and remote erase features Some devices or operating systems may enable you to locate or erase your mobile device in case of loss. By enabling these features, you can request a remote erase to clear all the data in the mobile device if in case of loss, thereby preventing your information from being accessed by others Do not click on any links attached in s or SMS that request you to start a payment transaction. 5 / 8

6 3.5. When using online service on mobile device, be extra careful to the security arrangement as it may not on the same level for online service provided through personal computers When setting your password: - Avoid using the same password you use to access other services. - Do not use easy to remember personal information, such as your contact numbers, date of birth, HKID card number, license number as part of your password. - Use a combination of upper, and lower case letters and numbers to make the password difficult to guess. - Do not write down your password or store your password on any computer or mobile device. Change your password regularly When using O! epay, beware of any abnormal login process, suspicious pop-ups or request for additional personal information. Logout your O! epay Account after using it Registration of partial Octopus number is required as a safety precaution for online payment and enquiry. For added protection, you may consider using protective shield holder to further protect against potential unauthorised use of your Octopus After using Octopus App or Octopus Mobile SIM, you are advised to disable any wireless network functions (e.g Wi-Fi, Bluetooth, NFC) of your mobile device to protect against potential unauthorised use of your Octopus Check the transaction of your Octopus. If you find any suspicious transactions, report immediately to us for investigation by calling Octopus Customer Service Hotline at Use legitimate software from original sources Using legitimate software will reduce the risk of the software being tampered and the chance of contamination by computer virus or spyware Do not jailbreak, root or modify the operating system These activities reduce the system stability, making it vulnerable to computer virus and spyware attack that can cause harm or leakage of your personal information. We may be unable to provide the service you requested on a jail-broken or rooted mobile device Update your operating system and Internet browser regularly 6 / 8

7 Updating your operating system regularly will protect your mobile device against weaknesses of the software. Use latest versions of operating systems and mobile applications. Download and apply security patches to mobile devices when they are made available for prompt protection against know security vulnerabilities Use anti-virus software and update it regularly Using anti-virus software will protect your mobile device from computer virus attack from numerous sources. Moreover, you also need to update the virus definition file regularly to protect your mobile device effectively. For details, please refer to the Help section of the software Use anti-spyware software and update it regularly Using anti-spyware software will help block malware or spyware from being installed on your mobile device and tracking your usage behaviour. Some anti-spyware software can also detect and block phishing websites and help you differentiate the official genuine sites from the fraudulent ones Use firewall software and update it regularly Firewall software may have already been bundled with your operating system or you may have installed additional firewall software from third party suppliers. It is necessary to keep your firewall software up-to-date regularly to protect your computer or mobile device from network attacks Do not use pirated software or software from unknown sources Pirated software or software from unknown sources may be tampered or modified by spyware, virus or other program changes that are not included in the original software package. This may increase the risk of your mobile device of being infected by virus, spyware or other software that can cause damage to your device or leakage of your personal information Secure your wireless network While using wireless network to connect to the Internet provides a lot of convenience, the technology behind wireless Internet relies on radio signals. As a result, people nearby can also gain access to your network without your prior approval. Many wireless network devices (or known as wireless routers) support password-based secured access or encryption to enhance the security of communication between your computer or mobile device and the Internet, and prevent unauthorised access to your 7 / 8

8 network at the same time. You are advised to disable any wireless network functions (e.g. Wi-Fi, Bluetooth, NFC) of your mobile device when it is not in use Beware of fake / phishing s You may receive s that pretend to be sent from OCL. These s attempt to trick you into providing your personal information. OCL will never ask for your personal information or password through s or links in the s. Do not open / reply / click these s Block spam s Spam mails may include links diverting you to some fraudulent sites. They may be disguised as being sent by companies you have dealt with previously, and attempt to gain your trust and obtain your information. Be extra careful when handling spam s. It is normally recommended to switch on the spam block / filter function of your client or online service provider Beware of look-alike websites Sometimes fraudsters and scammers may set up pages that look like websites you trust, asking for your personal or private information. Be very careful to ensure the pages you visit are actually of your trusted companies by checking their locations / URL information Smart tips on using Stored Value Facilitates For smart tips and educational video provided by the HKMA, please refer to this link. 8 / 8

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

Online Security Information. Tips for staying safe online

Online Security Information. Tips for staying safe online Online Security Information ProCredit Bank is committed to protecting the integrity of your transactions and bank account details. ProCredit Bank therefore uses the latest security software and procedures

More information

Tips for Banking Online Safely

Tips for Banking Online Safely If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining

More information

Advice about online security

Advice about online security Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP

More information

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Business Internet Banking / Cash Management Fraud Prevention Best Practices Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization

More information

Business ebanking Fraud Prevention Best Practices

Business ebanking Fraud Prevention Best Practices Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special

More information

Online Banking Fraud Prevention Recommendations and Best Practices

Online Banking Fraud Prevention Recommendations and Best Practices Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know

More information

Contents Security Centre

Contents Security Centre Contents Security Centre... 1 1. Search Engines... 2 2. Online Applications... 2 3. Virgin Money Credit Card Online Banking Security Measures... 2 3.1 Access Number, PIN and Password... 2 3.2 Keypad...

More information

Reliance Bank Fraud Prevention Best Practices

Reliance Bank Fraud Prevention Best Practices Reliance Bank Fraud Prevention Best Practices May 2013 User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters and numbers.

More information

Business Identity Fraud Prevention Checklist

Business Identity Fraud Prevention Checklist Business Identity Fraud Prevention Checklist 9 Critical Things Every Business Owner Should Do Business identity thieves and fraudsters are clever and determined, and can quickly take advantage of business

More information

Hang Seng HSBCnet Security. May 2016

Hang Seng HSBCnet Security. May 2016 Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of

More information

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS $ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security

More information

Secure Use of Electronic Banking Services. George Chou Hong Kong Monetary Authority Dec 2013

Secure Use of Electronic Banking Services. George Chou Hong Kong Monetary Authority Dec 2013 Secure Use of Electronic Banking Services George Chou Hong Kong Monetary Authority Dec 2013 Agenda Recent Development of Internet Banking in Hong Kong Regulatory Requirements on Internet Banking Supervisory

More information

Spring Hill State Bank Mobile Banking FAQs

Spring Hill State Bank Mobile Banking FAQs Spring Hill State Bank Mobile Banking FAQs What is Mobile Banking? Mobile Banking enables you to access your account information using the Bank online banking website. You must first be enrolled as an

More information

F-Secure Mobile Security for Business. Getting Started Guide

F-Secure Mobile Security for Business. Getting Started Guide F-Secure Mobile Security for Business Getting Started Guide F-Secure Mobile Security for Business TOC 3 Contents Chapter 1: F-Secure Mobile Security Portal...5 Overview...6 Administrator access levels...6

More information

Online Banking Customer Awareness and Education Program

Online Banking Customer Awareness and Education Program Online Banking Customer Awareness and Education Program Electronic Fund Transfers: Your Rights and Responsibilities (Regulation E Disclosure) Indicated below are types of Electronic Fund Transfers we are

More information

Basic Security Considerations for Email and Web Browsing

Basic Security Considerations for Email and Web Browsing Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable

More information

General Security Best Practices

General Security Best Practices General Security Best Practices 1. One of the strongest physical security measures for a computer or server is a locked door. 2. Whenever you step away from your workstation, get into the habit of locking

More information

Secure Your Information and Communication Technology Devices

Secure Your Information and Communication Technology Devices You should pay attention to the following items bef the Internet: Secure Your Information and Communication Technology Devices Install proper anti-virus software P.3 Log on as a user and not as an administrator

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire

More information

How To Protect Yourself Online

How To Protect Yourself Online NetBank security guide Commonwealth Bank Personal 1 Contents Page 4 5 5 5 7 7 9 9 9 11 12 12 13 13 13 14 14 14 16 16 16 17 18 18 19 19 20 21 Section Peace of mind with NetBank What are the common online

More information

Online Banking Security Guide Internet-based version

Online Banking Security Guide Internet-based version Online Banking Security Guide Internet-based version Contents Introduction to the Security Guide... 2 Security Guide... 2 Using the internet securely... 2 Security solutions in Online Banking... 3 What

More information

STRONGER ONLINE SECURITY

STRONGER ONLINE SECURITY STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial

More information

Why is a strong password important?

Why is a strong password important? Internet Security Why is a strong password important? Identity theft motives: To gain access to resources For the challenge/fun Personal reasons Theft methods Brute forcing and other script hacking methods

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Frequently Asked Questions (FAQ)

Frequently Asked Questions (FAQ) Your personal information and account security is important to us. This product employs a Secure Sign On process that includes layers of protection at time of product log in to mitigate risk, and thwart

More information

E-MAIL & INTERNET FRAUD

E-MAIL & INTERNET FRAUD FRAUD ALERT! FRAUD ALERT! Guarding Against E-MAIL & INTERNET FRAUD What credit union members should know to counter Phishing Pharming Spyware Online fraud On-Line Fraud Is Growing E-Mail and Internet Fraud

More information

Why you need. McAfee. Multi Acess PARTNER SERVICES

Why you need. McAfee. Multi Acess PARTNER SERVICES Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

Enhanced Security for Online Banking

Enhanced Security for Online Banking Enhanced Security for Online Banking MidSouth Bank is focused on protecting your personal and account information at all times. As instances of internet fraud increase, it is no longer sufficient to use

More information

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted

More information

Personal Online Banking & Bill Pay. Guide to Getting Started

Personal Online Banking & Bill Pay. Guide to Getting Started Personal Online Banking & Bill Pay Guide to Getting Started What s Inside Contents Security at Vectra Bank... 4 Getting Started Online... 5 Welcome to Vectra Bank Online Banking. Whether you re at home,

More information

Frequently Asked Questions For Investors

Frequently Asked Questions For Investors Frequently Asked Questions For Investors 1. What is trade day (T) and settlement day (T+2)? Trade day (T) means a normal working day for securities trading under the regulation of stock exchange. To a

More information

OKPAY guides. Security Guide

OKPAY guides. Security Guide Название раздела OKPAY guides www.okpay.com Security Guide 2012 Contents SECURITY GUIDE Contents Introduction 1. OKPAY Security Overview 2. Security Tips 3. Security Center 3.1. Basic Protection 3.2. Email

More information

Protect yourself online

Protect yourself online Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice

More information

Deutsche Bank db easynet. Secure method of use of the db easynet e-banking system

Deutsche Bank db easynet. Secure method of use of the db easynet e-banking system Deutsche Bank Secure method of use of the e-banking system Introduction Deutsche Bank pays particular attention to your security. Therefore, the funds entrusted to us by our Customers are protected, using

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

Internet Banking. Business Call Account. Keeping things simple. That s what we do.

Internet Banking. Business Call Account. Keeping things simple. That s what we do. Internet Banking Business Call Account Keeping things simple. That s what we do. Heartland Internet Banking Heartland s Internet Banking service is a fast and convenient way to keep up-to-date with, and

More information

Internet basics 2.3 Protecting your computer

Internet basics 2.3 Protecting your computer Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from

More information

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Why should you be concerned? There are over 1 million known computer viruses. An unprotected computer on the

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Safe Practices for Online Banking

Safe Practices for Online Banking November 2012 Follow these guidelines to help protect your information while banking online. At First Entertainment Credit Union, our goal is to provide you with the best all around banking experience.

More information

Sophos Mobile Control User guide for Android

Sophos Mobile Control User guide for Android Sophos Mobile Control User guide for Android Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control

More information

Business Online Banking & Bill Pay Guide to Getting Started

Business Online Banking & Bill Pay Guide to Getting Started Business Online Banking & Bill Pay Guide to Getting Started What s Inside Contents Security at Vectra Bank... 4 Getting Started Online... 5 Welcome to Vectra Bank Business Online Banking. Whether you re

More information

PROTECT YOUR FINANCIAL TRANSACTIONS

PROTECT YOUR FINANCIAL TRANSACTIONS PROTECT YOUR FINANCIAL TRANSACTIONS Caisses populaires acadiennes www.acadie.com/en It s a wealth of ways to strengthen the security of your financial transactions. By implementing simple measures to mitigate

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

Safety& Security Tips

Safety& Security Tips Safety& Security Tips 1. Security measures adopted by IDBI Bank IDBI Bank has a strong online security policy to ensure our customers have a safe and secure online experience with us. We have 256 bit Secure

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

Security Guide. for electronic transactions. UniBank is a division of Teachers Mutual Bank Limited

Security Guide. for electronic transactions. UniBank is a division of Teachers Mutual Bank Limited Security Guide for electronic transactions UniBank is a division of Teachers Mutual Bank Limited Teachers Mutual Bank Limited ABN 30 087 650 459 AFSL/Australian Credit Licence 238981 Who We Are UniBank

More information

Business Online Banking Quick Users Guide

Business Online Banking Quick Users Guide Business Online Banking Quick Users Guide Business Online Banking Quick Users Guide Table of Contents Overview 2 First Time Login 2 Security 4 Contact Points 4 Registering your Browser / Computer 5 Adding,

More information

Internet Banking. Keeping things simple. That s what we do.

Internet Banking. Keeping things simple. That s what we do. Internet Banking Keeping things simple. That s what we do. Heartland Internet Banking Heartland s Internet Banking service is a fast and convenient way to keep up-to-date with, and manage your accounts

More information

Protect your personal data while engaging in IT related activities

Protect your personal data while engaging in IT related activities Protect your personal data while engaging in IT related activities Personal Data (Privacy) Ordinance Six Data Protection Principles Principle 1 purpose and manner of collection of personal data Collection

More information

Sophos Mobile Control User guide for Android. Product version: 4

Sophos Mobile Control User guide for Android. Product version: 4 Sophos Mobile Control User guide for Android Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set up

More information

CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3

CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3 CLEO ~Remote Access Services Remote Desktop Access User guide CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3 August 2007 page 1 of 16 CLEO 2007 CLEO Remote Access Services 3SGD

More information

Guide to credit card security

Guide to credit card security Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely

More information

PREVENTING HIGH-TECH IDENTITY THEFT

PREVENTING HIGH-TECH IDENTITY THEFT 1 PREVENTING HIGH-TECH IDENTITY THEFT Presented by The Monument Group Companies Featured speaker: David Floyd November 19, 2014 2 Introduction Preventing Identity Theft (this session) Monitoring for Theft

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms

More information

Electronic Fraud Awareness Advisory

Electronic Fraud Awareness Advisory Electronic Fraud Awareness Advisory Indiana Bankers Association Fraud Awareness Task Force February, 2012 Electronic Fraud Awareness Advisory Purpose/Summary The Indiana Bankers Association (IBA) was involved

More information

Online Services User Guide

Online Services User Guide Online Services User Guide Welcome to online banking! Whether you re online or using a mobile device, access your accounts whenever and wherever it s convenient for you. Log In: BankMidwest.com Online

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

Countermeasures against Spyware

Countermeasures against Spyware (2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?

More information

PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents

PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents 1 PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents Email Access via a Web Browser... 2 Email Client Setup... 3 Outlook 2013 for Windows... 3 Outlook for Mac 2011... 4 Mac OS X 10.6+... 4 iphone

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems

P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems Procedure P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems P309 - Page: Page 1 of 12 Date of Release: 23 February 2011 Status: Final Document Reference: Title: P309 Release Number:

More information

Your Digital Dollars Online & Mobile Banking

Your Digital Dollars Online & Mobile Banking Your Digital Dollars Online & Mobile Banking There are a lot of benefits to being able to bank or make payments from just about anywhere, but it s important to know how to do these things safely. Understanding

More information

Welcome to the Protecting Your Identity. Training Module

Welcome to the Protecting Your Identity. Training Module Welcome to the Training Module 1 Introduction Does loss of control over your online identities bother you? 2 Objective By the end of this module, you will be able to: Identify the challenges in protecting

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Online Cash Manager Security Guide

Online Cash Manager Security Guide Online Cash Manager Security Guide You re the One who can protect your business from the threat of a Corporate Account Takeover. 102 South Clinton Street Iowa City, IA 52240 1-800-247-4418 Version 1.0

More information

SHORT MESSAGE SERVICE SECURITY

SHORT MESSAGE SERVICE SECURITY SHORT MESSAGE SERVICE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Getting Started. Business Link. User Name Rules. Hardware/Software Requirements. Password Rules

Getting Started. Business Link. User Name Rules. Hardware/Software Requirements. Password Rules Getting Started User Name Rules All user names must: Be unique. Be between six and 40 characters in length. Notes: It is recommended that user names consist only of alphanumeric characters (A-Z, 0-9).

More information

Protecting your business from some of the current fraud threats

Protecting your business from some of the current fraud threats Protecting your business from some of the current fraud threats This literature provides guidance on fraud prevention and is provided for information purposes only. Where noted the guidance provided has

More information

Phishing Scams Security Update Best Practices for General User

Phishing Scams Security Update Best Practices for General User Phishing Scams Security Update Best Practices for General User hishing refers to the malicious attack Pmethod by attackers who imitate legitimate companies in sending emails in order to entice people to

More information

Safe Use of Electronic Services

Safe Use of Electronic Services Safe Use of Electronic Services Electronic banking is not only quick, cost-effective and convenient but also safe. However, each system is only as safe as its weakest link. The security foundations of

More information

Mobile Iron User Guide

Mobile Iron User Guide 2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4

More information

How To Protect The Time System From Being Hacked

How To Protect The Time System From Being Hacked WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/21/13 2014 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer

More information

For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1

For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1 For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1 Talk America Services Customer Service 1-855-546-5000, press 3 TALK

More information

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES 01 One must remember that everyone and anyone is a potential target. These cybercriminals and attackers often use different tactics to lure different

More information

MOBILE BANKING. Why should I use Mobile Banking?

MOBILE BANKING. Why should I use Mobile Banking? MOBILE BANKING What is Mobile Banking? With Mobile Banking, you can access your account, conduct transfers, and pay and manage bills from any mobile device that has web browsing capabilities and a data

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Desktop and Laptop Security Policy

Desktop and Laptop Security Policy Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

U.S. Cellular Mobile Data Security. User Guide Version 00.01

U.S. Cellular Mobile Data Security. User Guide Version 00.01 U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4

More information

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey

More information

Google 2 factor authentication User Guide

Google 2 factor authentication User Guide Information Technology Services Centre Google 2 factor authentication User Guide Description: This guide describes how to setup Two factor authentication for your Google account. Version: 1.0 Link: Effective

More information

How to access and reply to an Egress Switch Secure Email free of charge. Opening a Switch Secure Email New User

How to access and reply to an Egress Switch Secure Email free of charge. Opening a Switch Secure Email New User How to access and reply to an Egress Switch Secure Email free of charge As an Egress Switch Secure Email recipient, you can access encrypted files quickly and easily. You can also communicate securely

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover Sound Business Practices for Businesses to Mitigate Corporate Account Takeover This white paper provides sound business practices for companies to implement to safeguard against Corporate Account Takeover.

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

ESET Mobile Security Windows Mobile

ESET Mobile Security Windows Mobile ESET Mobile Security Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3

More information

Use of Exchange Mail and Diary Service Code of Practice

Use of Exchange Mail and Diary Service Code of Practice Use of Exchange Mail and Diary Service Code of Practice Introduction This code of practice outlines the support mechanisms in place for the security of the Exchange mail and diary service. References are

More information

Payment Systems Department

Payment Systems Department v Note: Please follow these guidelines for your safety as you enjoy the convenience of technology. However these guidelines are general; therefore, specific precautions may be taken as warranted by the

More information

/ 1. Online Banking User Guide SouthStateBank.com / (800) 277-2175

/ 1. Online Banking User Guide SouthStateBank.com / (800) 277-2175 / 1 Online Banking User Guide SouthStateBank.com / (800) 277-2175 Welcome Thank you for using South State s Online Banking. Whether you are a first time user or an existing user, this guide will walk you

More information

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure! INFOCOMM SEC RITY is INCOMPLETE WITHOUT Be aware, responsible secure! U HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD FASTEN UP!

More information

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions. Internet Quick Start Guide Get the most out of your Midco internet service with these handy instructions. 1 Contents Internet Security................................................................ 4

More information

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues.

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. The latest tactic currently being used by malware creators

More information