Deutsche Bank db easynet. Safe Use of Internet Banking System db easynet

Size: px
Start display at page:

Download "Deutsche Bank db easynet. Safe Use of Internet Banking System db easynet"

Transcription

1 Safe Use of Internet Banking System

2 Table of content Introduction... 3 General Safety Rules... 3 Safe computer, tablet, smartphone... 3 Browser Configuration... 4 Safe Logging-in... 5 Customer Identification Number (NIK) and Access Code Protection... 7 INstruction Autorization... 8 Security measures applied to the system... 8 Customer Identification Number (NIK) and Access Code... 8 SMS passwords... 8 TAN Card... 9 Virtual keyboard... 9 Emergency situations /10

3 Introduction Deutsche Bank places your safety in the centre of attention. Respectively, we protect the funds you entrusted to us by taking recourse to the state-of-art and highly effective security measures. Your security online also depends on you. Please - see the instructions that will help you enjoy our services in a safe manner. This manual aims to introduce you the basic principles of safety and to show you the security measures that will better protect your computer, tablet and smartphone against possible attempts to capture confidential data. General Safety Rules Safe use of the system depends largely on you! Safe computer, tablet, smartphone Keep your device safe! Adequate set-up of the device and software installed in it makes one of the pivotal steps prior to use of the Internet Banking system. Below you will find detailed information on how to protect your computer, tablet and smartphone. 1. Use a licensed operating system with regular updates provided by the manufacturer to access your Internet Banking. 2. Install only licensed software, do not install software from unknown sources. 3. Protect your computer, tablet and smartphone with anti-virus and anti-spam software. 4. Use a personal firewall - it will allow you to better protect yourself against interference from the outside and restrict access to the data on your device. 5. Be sure to regularly update your operating system and software installed on it, including in particular anti-virus software (including virus signature database). 6. Remember to run a cyclic anti-virus scan of the entire system according to the anti-virus software manufacturer's recommendations. Protect your mail system against incoming spam. Remember that your is one of the most popular ways of access for viruses and phishing designed to steal your confidential data (such as NIK and Access Code). 7. Do not open attachments that you did not expect to receive (or the messages the title or sender of which makes you suspicious of attempted fraud). 8. Remember that the Bank never sends s which prompt you to install additional software (update or revealing sensitive data). 9. Access the Internet Banking only on trusted devices. It is not recommended to log in to the system of public facilities (eg. in Internet cafes) and through the public WiFi network (the so-called hot-spots). 10. Your web browser should be set up according to the Bank recommendations (see "Browser Configuration"). 11. Never leave the device unattended at a time when you are logged on to the Internet Banking system. 12. Once you have completed your transactions conducted via the make sure to log out of the system. To log out of the use the "Log out". Never close down the system by closing the tab or browser window. 3/10

4 Browser Configuration Protect your browser! 1. Use the latest versions of Internet browsers. We recommend upgrade your web browser to the latest release available on the market. The system supports the following browsers Web browser name and version (1) mobile device PC / laptop Microsoft Internet Explorer 10.x n/a - Microsoft Internet Explorer version 11.x n/a + Microsoft EDGE n/a + Microsoft Internet Explorer Mobile version11.x + n/a Mozilla Firefox version 46.x n/a + Mozilla Firefox Mobile version39.x + n/a Google Chrome version 50.x n/a + Google Chrome Mobile version 44.x + n/a Apple Safari version 9.x n/a + Apple Safari Mobile version 9.x + n/a (1) Available at: You can find information about the version of your browser and protocol encryption by selecting the "Help" option from the menu and next depending on your browser : Microsoft Internet Explorer Internet Explorer information Google Chrome Google Chrome settings Google Chrome information Mozilla Firefox About Mozilla Firefox Apple Safari Safari 2. Before logging, check whether your browser supports cookies. Cookies are text files that are stored in the terminal equipment (eg. phone, tablet or computer) used by the user. The are intended to access the Bank's website and the system via the Internet. Cookies contain no software and are not software themselves. Accordingly, they cannot contain a virus nor be virus. Restrictions on the use of cookies may affect some of the functionalities available on the Bank's website and in the db easynet system, while blocking the automatic handling of cookies in your web browser configuration will desactivate access to the system. The Cookies Policy contents are available in open access format on the Bank's website. 3. Never agree to the browser recording your NIK or the Access Code. The Bank recommends that you disable the store passwords function and forms in a Web browser. If the store passwords function and forms remain on, NIK and Access Code are automatically entered when you log into the db easynet system. Disabling this option prevents third persons from logging in to the system. Microsoft Internet Explorer Menu "Tools" "Internet Options" "Content" tab "AutoComplete" section "Settings" - uncheck the "User names and passwords in the forms" fields. Google Chrome Menu "Google Chrome Settings" "Settings" "Privacy" "Passwords and forms" - uncheck the "Offer to save passwords when I go online "field. Mozilla Firefox Menu "Tools" "Options" "Security" "Password" uncheck the "Store passwords for sites" field. 4. Check for server certificate revocation, this resulting in an open padlock symbol displayed next to website address or a change in the background in the address bar into red. Do not save encrypted websites on the disk to prevent unauthorized redirection to other sites. 5. To ensure the correct browser operation, delete temporary files which are stored in the cache. Microsoft Internet Explorer Menu "Tools" "Internet Options" "General" tab, select "Browsing history," click "Delete" - select "Delete cookies..." and "Temporary Internet Files" Menu "Tools" "Internet Options" "General" tab, select "Browsing history," click "Settings" in the "Check for newer versions of stored pages" select "Every time I visit the webpage". Mozilla Firefox "Tools" "Delete browsing history" select the option "Cookies" and "Cache" and click "Clear now". You can also specify the period to be deleted from the cache. 4/10

5 Google Chrome Menu "Google Chrome Settings" "Tools" "Delete browsing history " - select the option "Empty the cache" and "Delete cookies and other site data" and press "Clear browsing data". You can also specify the period to be deleted from the cache. 6. Do not ignore the warnings displayed in the internet browser window. The new versions of popular browsers provide special tools to check whether the website displayed is not intended to steal confidential information. These are the so-called anti-phishing filters. They do not give full guarantee that the site is 100% safe. Nonetheless, they allow you to reduce the risk of identity theft. The Bank recommends that you activate the antiphishing protectino: Microsoft Internet Explorer "Tools" in the "Phishing Filter" option and select "Turn on automatic checking of Web". Mozilla Firefox "Tools" "Options" in the "Security", tab select the option: "Warn when sites try to install addons"; "Block sites reported as posing a threat" and "Block sites reported as attempts of online fraud". 7. Use the navigation from the system menu to move between the individual functions. Do not use the "Back" or "Next" in the browser window. 8. Never use the copy function while completing the transaction data. Safe Logging-in Log in safely! 1. Always log on via the website: or enter the address in the browser window manually 2. Never log in via a link received in an Never use search engines to find the login site for the Bank transaction system. 4. Remember that the Bank never asks a person loggin in for: Providing the SMS code which has been sent to user's mobile device. Providing debit / credit card data (card number, CVV, expiration date of the card, PIN). Downloading certificates or additional software on computers or mobile devices. 5. Communication between the User device and the Bank server is encrypted by the TLS protocol. The secure (encrypted) connection is confirmed by a URL starting with https (instead of the standard http), where "s" stands for "secure" - secure. Make sure that the web address starts with "https" rather than "http". Check for a locked padlock symbol being displayed on the login site in the address bar or at the bottom of the site. The latest browser displays information about the institution, for which the certificate was issued next to the address bar. Screenshot made in Microsoft Internet Explorer browser. Screenshot made in Chrome browser. 5/10

6 Screenshot made in Mozilla Firefox browser. Double-click the padlock to verify that the displayed certificate is valid and has been issued by VeriSign for Deutsche Bank AG. Screenshot made in Microsoft Internet Explorer browser. Check the validity of the certificate. To this end, click on the above mentioned closed padlock symbol. This following is the valid certificate for : Screenshot made in Microsoft Internet Explorer browser. 6/10

7 Screenshot made in Microsoft Internet Explorer browser. Should you happen to notice one or more of the following symptoms: The padlock in the site address bar fails to be locked or shows with the warning symbol. The certificate is invalid or has been issued to institutions other than Deutsche Bank AG. The Certificate print - "Fingerprint" (Thumbprint, Fingerprint) should be consistent with that shown above. Prior to or following the log-in the Internet Banking site looks different, or presents other messages than usual. The process of logging in to the looks different than usual (other windows appear, it takes longer than usual, there are requests for additional information). Abort logging in and contact a Bank employee forthwith! Report the above-referred to situations and any case of non-compliance with the date and time of logging in to the system to a Bank employee forthwith (by calling , * or visit your local Deutsche Bank branch office). * The fee for calls by the applicable rates of the operator. 6. While entering the Customer Identification Number and Access Code pay attention to whether people are not watching the entered data. 7. Once you have logged in to the system, check whether the date of last login (information available in the upper right corner of the screen of the system) is correct each time. 8. Once you have completed transaction conducted in the system, always use the "Logout" option located in the upper right corner of the system screen. Customer Identification Number (NIK) and Access Code Protection 1. Never disclose data used to log into the system (NIK, Access Code) to a third party. 2. If you suspect that someone may know your Access Code - introduce the changes forthwiths. You can do this directly in the system. 3. Change your password from time to time. Make sure that it contains no information which may be in any way linked with you (eg. date of birth, name, etc.). The Bank recommends changing your password every 90 days. 4. Send no sensitive data (such as NIK, Access Code) by Try not to save NIK and the access code either in paper form or electronic form. However, if it is necessary, however, this type of record - use the software to store passwords offered by well-known suppliers. 6. Do not save sensitive data permanently in the memory of web browsers (see Browser Configuration). 7/10

8 Instruction Autorization The instructions performed in the system are protected with popular and proven solutions, such as convenient SMS passwords or TAN code card. To safely use them, remember the basic safety rules. 1. Prior to confirmation of transactions accurately verify the correctness of the instructed transaction (eg the account number of recipients). 2. Once you have received the SMS password, compare whether the transaction data contained in its content are in line with your submitted instruction. 3. Determine the limits of the transfer operations. Security measures applied to the system Customer Identification Number (NIK) and Access Code User authentication when logging into the system follows the entrance of a unique Customer Identification Number and Access Code to the system. Customer Identification Number (NIK) a 10-digit number which you received in the Starter Package, submitted once you have entered into the agreement for the provision of electronic banking services.. Access Code an 8-digit code known only to you which was generated by you during the first connection to the Teleservice (under one of the following numbers: , ). Remember that you can enhance security through the use of a few simple rules. Access Code should not: be a component of NIK, contain strings of the same digits, contain dates directly associating with your (the date of your birth, dates important to your loved ones, etc.). SMS passwords If you have selected transaction authorization in the Deutsche Bank Polska SA system of Internet Banking based on secure and convenient SMS passwords prior to the authorization, you should fill in the instruction form with the SMS password that you received to your mobile phone number further to the instruction. Remember! Report any change of a phone number to the Bank to be able to freely continue the authorization with the use of this convenient Authorization Method. Note! When using the Authorization Method based on SMS passwords, remember to always validate the log-in site (see: Log-in) and never quote data related both to your phone and the SMS Passwords. The Bank never asks its customers for this type of information. Providing it may render you liable to hacking. The Bank never asks its customers to install additional software on their phones. Never install the software of uncertain origin on your phone. Please lock the SIM card with the operator in the event if a loss or theft of your phone. If you use authorization based on SMS Passwords, refer to the following information concerning the dangerous Zeus Trojan (ZitMo) Trojan attack takes place in several steps, Trojan: captures login and password to access the electronic banking system from your computer, obtains the victim's mobile phone number, installing malicious form in a victim s browser, provides a link to the "certificate" with a request to install it in your phone via SMS (installation version contains a dangerous Trojan). After installation, criminals can take control of your mobile phone and initiate online banking transactions, confirming them with the captured SMS messages sent by the Bank to the designated cell phone. 8/10

9 TAN card If you have selected transaction authorization in the Deutsche Bank Polska SA system of Internet Banking based on TAN codes of TAN cards prior to the authorization you should enter a pair of Codes of the card, as indicated by the system. Remember to adequately protect your TAN card. To this end: Store it in a safe place. Never reveal to third parties. If you suspect that an unauthorized person could take possession of your TAN card or TAN card codes, lock the card forthwith. Remember! The Bank never requires you to enter the TAN codes when logging into online banking. TAN card reverse Virtual keyboard The virtual keyboard is available upon logging into and instruction confirmation. The virtual keyboard is available on computers and mobile devices with a minimum horizontal resolution of 1280 pixels. 9/10

10 When using the Authentication Method based on TAN Codes - safety level raises as a result of using dynamic images, indicating the fields on the TAN Card, generated upon transaction authorization. Emergency situations If you detect the occurrence of any of the following cases: failed / successful attempt to log on to your account by unauthorized persons, failed / successful attempt of unauthorized transactions from system, suspicion of capture of login data by the unauthorized person(s), suspicion of capture of payment card number by the unauthorized person(s), contact the Bank forthwith by calling: , * or visit your local branch of Deutsche Bank. Once you have presented the issue to our employee, follow their instructions. In addition, when the case is related to the suspected hacking into your account change the Access Code to the system forthwith. * The fee for calls by the applicable rates of the operator. 10/10

Deutsche Bank db easynet. Secure method of use of the db easynet e-banking system

Deutsche Bank db easynet. Secure method of use of the db easynet e-banking system Deutsche Bank Secure method of use of the e-banking system Introduction Deutsche Bank pays particular attention to your security. Therefore, the funds entrusted to us by our Customers are protected, using

More information

General tips for increasing the security of using First Investment Bank's internet banking

General tips for increasing the security of using First Investment Bank's internet banking General tips for increasing the security of using First Investment Bank's internet banking Dear Clients, First Investment Bank (Fibank, the Bank) provides you with high level of protection and security

More information

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly

More information

Optimal Browser Settings for Internet Explorer Running on Microsoft Windows

Optimal Browser Settings for Internet Explorer Running on Microsoft Windows Optimal Browser Settings for Internet Explorer Running on Microsoft Windows If you have Internet Explorer 7 or 8: Each time you log in to our web site, it evaluates whether you are using the same computer

More information

Secure Email Client Guide

Secure Email Client Guide PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing

More information

Safe Use of Electronic Services

Safe Use of Electronic Services Safe Use of Electronic Services Electronic banking is not only quick, cost-effective and convenient but also safe. However, each system is only as safe as its weakest link. The security foundations of

More information

How To Protect Yourself Online

How To Protect Yourself Online NetBank security guide Commonwealth Bank Personal 1 Contents Page 4 5 5 5 7 7 9 9 9 11 12 12 13 13 13 14 14 14 16 16 16 17 18 18 19 19 20 21 Section Peace of mind with NetBank What are the common online

More information

Portal Recipient Guide

Portal Recipient Guide Portal Recipient Guide Lindenhouse Software Limited 2015 Contents 1 Introduction... 4 2 Account Activation... 4 3 Forgotten Password... 9 4 Document signing... 12 5 Authenticating your Device & Browser...

More information

Advice about online security

Advice about online security Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP

More information

Frequently Asked Questions for logging in to Online Banking

Frequently Asked Questions for logging in to Online Banking Frequently Asked Questions for logging in to Online Banking Why don t I recognize any of the phone numbers on the Secure Code page? I can t remember my password; can I reset it myself? I know I have the

More information

Secure File Transfer Help Guide

Secure File Transfer Help Guide Secure File Transfer Help Guide Establish a Secure File Transfer Account When a package is sent to your email address, you will receive an email from the sender that includes a link to instructions to

More information

New Online Banking Guide for FIRST time Login

New Online Banking Guide for FIRST time Login New Online Banking Guide for FIRST time Login Step 1: Login Enter your existing Online Banking User ID and Password. Click Log-In. Step 2: Accepting terms and Conditions to Proceed Click on See the terms

More information

OUTLOOK WEB ACCESS. User Guide

OUTLOOK WEB ACCESS. User Guide OUTLOOK WEB ACCESS User Guide V3 2 August 2013 Not protectively marked GETTING STARTED Outlook Web Access (OWA) provides a useful means to remotely access Council email from outside of the council access.

More information

Customer Education to Combat Scams and Fraud

Customer Education to Combat Scams and Fraud Customer Education to Combat Scams and Fraud How you can protect your identity and accounts: Do not click suspicious links or open unexpected attachments. Do not provide account info to links in emails

More information

Internet Bank with certificates First steps

Internet Bank with certificates First steps Internet Bank with certificates First steps 2 Content BEFORE YOU START...3 Minimum requirements for your computer...3 Support for service Internet Bank...3 Useful links...3 Security...3 Parameters of certificates...3

More information

Instructions to Sign On and Off of Self Service Applications. Internet Explorer 9 (IE9) Users: Turn Off Compatibility View:

Instructions to Sign On and Off of Self Service Applications. Internet Explorer 9 (IE9) Users: Turn Off Compatibility View: Instructions to Sign On and Off of Self Service Applications NOTE: Internet Explorer 7 and 8 are the only supported Browsers for the PeopleSoft Student Self Service applications. If you experience technical

More information

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

When visiting online banking's sign-on page, your browser establishes a secure session with our server. The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server. How Encryption

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

Section 1.0 Getting Started with the Vālant EMR. Contents

Section 1.0 Getting Started with the Vālant EMR. Contents Section 1.0 Getting Started with the Vālant EMR Contents Getting Started with the Valant EMR application:... 2 Hardware Requirements for the Vālant EMR:... 3 Software Requirements for the Vālant EMR:...

More information

Infor Xtreme Browser References

Infor Xtreme Browser References Infor Xtreme Browser References This document describes the list of supported browsers, browser recommendations and known issues. Contents Infor Xtreme Browser References... 1 Browsers Supported... 2 Browser

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the

More information

OKPAY guides. Security Guide

OKPAY guides. Security Guide Название раздела OKPAY guides www.okpay.com Security Guide 2012 Contents SECURITY GUIDE Contents Introduction 1. OKPAY Security Overview 2. Security Tips 3. Security Center 3.1. Basic Protection 3.2. Email

More information

Internet Banking. Getting Started Guide Australia

Internet Banking. Getting Started Guide Australia Internet Banking Getting Started Guide Australia 2 Rabobank Internet Banking Welcome to Rabobank Internet Banking Access with peace of mind With Rabobank Internet Banking, you can control your money anywhere,

More information

The current case DNSChanger what computer users can do now

The current case DNSChanger what computer users can do now The current case DNSChanger what computer users can do now Content What happened so far? 2 What is going to happen on 8 March 2012? 2 How can I test my Internet settings? 2 On the PC 3 On the router 5

More information

Online Business Banking FREQUENTLY ASKED QUESTIONS

Online Business Banking FREQUENTLY ASKED QUESTIONS Online Business Banking FREQUENTLY ASKED QUESTIONS» BSP Online Business Banking» Frequently Asked Questions GENERAL Q. What is BSP Online? A. BSP Online allows customers to securely access their BSP Bank

More information

Quick Start Guide to Logging in to Online Banking

Quick Start Guide to Logging in to Online Banking Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s

More information

XCM Internet Explorer Settings

XCM Internet Explorer Settings XCM Internet Explorer Settings For best results, you must prepare your Internet Explorer (IE) browser so that interactions with the XCM site are fully trusted (XCM only supports Microsoft s Internet Explorer).

More information

Mini-Guide for Using MyBRD Net

Mini-Guide for Using MyBRD Net Mini-Guide for Using MyBRD Net BANCA TA. ECHIPA TA Contents: 1. Introduction 2. Conditions of Use and Security 3. Accesing the MyBRD Net Service 4. Autentification and Transaction Signing 5. Main Menu

More information

KUB Website Troubleshooting

KUB Website Troubleshooting KUB Website Troubleshooting Are you having problems getting to the KUB website at http://www.kub.org/? If you type in your user ID and password and press the login button, are you routed right back to

More information

Learning Management System (LMS) Quick Tips. Contents LMS REFERENCE GUIDE

Learning Management System (LMS) Quick Tips. Contents LMS REFERENCE GUIDE Learning Management System (LMS) Quick Tips Contents Process Overview... 2 Sign into the LMS... 3 Troubleshooting... 5 Required Software... 5 Mobile devices are not supported... 5 Using the Check System

More information

Contents Security Centre

Contents Security Centre Contents Security Centre... 1 1. Search Engines... 2 2. Online Applications... 2 3. Virgin Money Credit Card Online Banking Security Measures... 2 3.1 Access Number, PIN and Password... 2 3.2 Keypad...

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

Internet basics 2.3 Protecting your computer

Internet basics 2.3 Protecting your computer Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from

More information

Scenario One: YOU CANNOT CONNECT TO THE LIBRARY S WIRELESS NETWORK

Scenario One: YOU CANNOT CONNECT TO THE LIBRARY S WIRELESS NETWORK Scenario One: YOU CANNOT CONNECT TO THE LIBRARY S WIRELESS NETWORK Possible cause: The wireless button on your laptop is off Most modern Windows laptops have a physical button or switch that turns the

More information

How To Login To A Website On A Pc Or Mac Or Mac (For Pc Or Ipad)

How To Login To A Website On A Pc Or Mac Or Mac (For Pc Or Ipad) What browser types are supported? Do I need to allow cookies? What are session cookies? The system is asking me to login again and says my session has timed out. What does this mean? I am locked out after

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

WatchGuard QMS End User Guide

WatchGuard QMS End User Guide WatchGuard QMS End User Guide WatchGuard QMS Overview The WatchGuard QMS device enables spam messages from the WatchGuard XCS to be directed to a local quarantine area that provides spam storage for each

More information

PROTECT YOUR FINANCIAL TRANSACTIONS

PROTECT YOUR FINANCIAL TRANSACTIONS PROTECT YOUR FINANCIAL TRANSACTIONS Caisses populaires acadiennes www.acadie.com/en It s a wealth of ways to strengthen the security of your financial transactions. By implementing simple measures to mitigate

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

the barricademx end user interface documentation for barricademx users

the barricademx end user interface documentation for barricademx users the barricademx end user interface documentation for barricademx users BarricadeMX Plus The End User Interface This short document will show you how to use the end user web interface for the BarricadeMX

More information

Security Tips You are here: Home» Security Tips

Security Tips You are here: Home» Security Tips Security Tips You are here: Home» Security Tips Click on a the Security Icon to view detailed information on: Responsibility of the Bank Password Policy Guide Online Security Internet Security Tips Scam

More information

Fraud Information and Security

Fraud Information and Security Fraud Information and Security Updated: January 13, 2015 How We Protect You At WySTAR Global Retirement Solutions security is a top priority. We understand that your trust in us depends on how well we

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot

More information

mystanwell.com Installing Citrix Client Software Information and Business Systems

mystanwell.com Installing Citrix Client Software Information and Business Systems mystanwell.com Installing Citrix Client Software Information and Business Systems Doc No: 020/12 Revision No: Revision Date: Page: 1 of 16 Contents Overview... 3 1. Microsoft Internet Explorer... 3 2.

More information

Green Climate Fund Online Accreditation System: User s Guide

Green Climate Fund Online Accreditation System: User s Guide Green Climate Fund Online Accreditation System: User s Guide Page b Table of Contents I. Introduction 1 II. Contacting the Fund s administrator 1 III. Setting your account 1 IV. Accessing and logging into

More information

Student ANGEL FAQs. General Issues: System Requirements:

Student ANGEL FAQs. General Issues: System Requirements: Student ANGEL FAQs General Issues: What is ANGEL? How do I log in? What is my username and password? How do I activate my account? I forgot my C number/password, what do I do? I registered after the first

More information

Law School Computing Services User Memo

Law School Computing Services User Memo Law School Computing Services User Memo Accessing and Using Shared No. 37 7/28/2015 Email Accounts in Outlook Overview: Many Law School departments and organizations use shared email accounts. Shared email

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

F-Secure Mobile Security for Business. Getting Started Guide

F-Secure Mobile Security for Business. Getting Started Guide F-Secure Mobile Security for Business Getting Started Guide F-Secure Mobile Security for Business TOC 3 Contents Chapter 1: F-Secure Mobile Security Portal...5 Overview...6 Administrator access levels...6

More information

MSGCU SECURE MESSAGE CENTER

MSGCU SECURE MESSAGE CENTER MSGCU SECURE MESSAGE CENTER Welcome to the MSGCU Secure Message Center. Email is convenient, but is it secure? Before reaching the intended recipient, email travels across a variety of public servers and

More information

Installation Instructions

Installation Instructions Avira Free Android Security Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other

More information

Clearing Browser Cache/History

Clearing Browser Cache/History Clearing Browser Cache/History A number of concerns in RamCT can usually be resolved by clearing the Browser Cache on your local computer. The browsers that are supported with RamCT are Internet Explorer,

More information

General Security Best Practices

General Security Best Practices General Security Best Practices 1. One of the strongest physical security measures for a computer or server is a locked door. 2. Whenever you step away from your workstation, get into the habit of locking

More information

How To Use Secureanything On A Mac Or Ipad (For A Mac)

How To Use Secureanything On A Mac Or Ipad (For A Mac) User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

Feature List for Kaspersky Password Manager

Feature List for Kaspersky Password Manager Feature List for Kaspersky Password Manager Overview... Features by Platform...3 Feature Descriptions...4 Glossary...7 PAGE Feature List for Kaspersky Password Manager Overview Kaspersky Password Manager

More information

Secure Email Recipient Guide

Secure Email Recipient Guide Secure Email Recipient Guide Contents How to open your first Encrypted Message.... 3 Step-by-Step Guide to Opening Your First Envelope... 3 Step One:... 3 Step Two:... 4 Step Three:... 4 Step Four:...

More information

BROWSER TIPS FOR PEOPLESOFT

BROWSER TIPS FOR PEOPLESOFT BROWSER TIPS FOR PEOPLESOFT Please note: This document is designed to be used online and has a number of embedded links to processes and additional information. We discourage the printing of these documents

More information

Welcome to Highlands State Bank Internet Banking Center. Important Information for New Users. System Security and Browser Information

Welcome to Highlands State Bank Internet Banking Center. Important Information for New Users. System Security and Browser Information Welcome to Highlands State Bank Internet Banking Center You must have a deposit account, loan account or a Highlands State Bank ATM/Debit Card to enroll in Internet Banking. We are sure you will find Internet

More information

M&T Web InfoPLU$ GETTING STARTED GUIDE

M&T Web InfoPLU$ GETTING STARTED GUIDE M&T Web InfoPLU$ GETTING STARTED GUIDE Web InfoPLU$ Getting Started Guide Welcome to Web InfoPLU$, M&T s Internet reporting and payment service. The purpose of this guide is to help you log on for the

More information

This guide will walk you through the process of disabling pop-up blockers found in three popular web browsers.

This guide will walk you through the process of disabling pop-up blockers found in three popular web browsers. Disable Pop-Up Blockers for MyCPD This guide will walk you through the process of disabling pop-up blockers found in three popular web browsers. Popup blockers interfere with proper functioning of the

More information

Technical Guide for Remote access

Technical Guide for Remote access Technical Guide for Remote access Frequently Asked Questions about using EZ Proxy to access Library resources off campus. Login Help Who is allowed access? I m having trouble logging in. Finding Articles

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Configuring Internet Explorer for CareLogic

Configuring Internet Explorer for CareLogic Configuring Internet Explorer for CareLogic March 19, 2014 1 P a g e Table of Contents Configuring Internet Explorer for CareLogic... 3 Configuring Internet Explorer Security Settings... 4 Internet Explorer

More information

STRONGER ONLINE SECURITY

STRONGER ONLINE SECURITY STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial

More information

2010 Outlook Web App Client Overview

2010 Outlook Web App Client Overview 2010 Outlook Web App Client Overview The upgrade to Microsoft Exchange 2010 includes an updated web-based e-mail client, OWA. OWA stands for Outlook Web App and gives you access to your district e-mail

More information

BUT. Before you start shopping on the Internet, there are a number of questions you need to ask yourself.

BUT. Before you start shopping on the Internet, there are a number of questions you need to ask yourself. We've all heard how great Internet Shopping can be; some say you can find goods at prices far cheaper than at traditional stores, as online platforms don t have to manage expensive overheads. Online shoppers

More information

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire

More information

Getting Started Guide

Getting Started Guide Page 2 of 9 Introduction This guide is designed to provide you with the information you need to complete your Payment Gateway account set up and begin processing live payment transactions. As a quick overview,

More information

Frequently Asked Questions Ag Banking Online

Frequently Asked Questions Ag Banking Online Table of Contents Note: To quickly navigate to the answer, click on the question. What is Multi-Factor Authentication (MFA) and its purpose?... 2 This is my first time accessing the online application.

More information

Protection from Fraud and Identity Theft

Protection from Fraud and Identity Theft Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...

More information

Intelligent Office: Web Optimisation Guide. Published Date: 06/11/2015. Version: 3.3

Intelligent Office: Web Optimisation Guide. Published Date: 06/11/2015. Version: 3.3 Intelligent Office: Web Optimisation Guide Published Date: 06/11/2015 Version: 3.3 Table of Contents System Requirements:... 3 Introduction... 3 Difficulties Logging on to Intelligent Office (io)... 3

More information

Online Security Information. Tips for staying safe online

Online Security Information. Tips for staying safe online Online Security Information ProCredit Bank is committed to protecting the integrity of your transactions and bank account details. ProCredit Bank therefore uses the latest security software and procedures

More information

Reference Guide for WebCDM Application 2013 CEICData. All rights reserved.

Reference Guide for WebCDM Application 2013 CEICData. All rights reserved. Reference Guide for WebCDM Application 2013 CEICData. All rights reserved. Version 1.2 Created On February 5, 2007 Last Modified August 27, 2013 Table of Contents 1 SUPPORTED BROWSERS... 3 1.1 INTERNET

More information

Safe Practices for Online Banking

Safe Practices for Online Banking November 2012 Follow these guidelines to help protect your information while banking online. At First Entertainment Credit Union, our goal is to provide you with the best all around banking experience.

More information

Google 2 factor authentication User Guide

Google 2 factor authentication User Guide Information Technology Services Centre Google 2 factor authentication User Guide Description: This guide describes how to setup Two factor authentication for your Google account. Version: 1.0 Link: Effective

More information

D3 TECHNOLOGIES SPAM FILTER

D3 TECHNOLOGIES SPAM FILTER D3 TECHNOLOGIES SPAM FILTER The D3 Technologies spam filtering provides virus, attachment, and spam filtering services for email. We check all emails for viruses and malicious content, since we feel these

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The

More information

SECURE EMAIL USER GUIDE OUTLOOK 2000

SECURE EMAIL USER GUIDE OUTLOOK 2000 WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP

More information

MyReports Recommended Browser Settings MYR-200a

MyReports Recommended Browser Settings MYR-200a MyReports Recommended Browser Settings MYR-200a Note: If you have installed an additional Tool Bar on your browser, such as Yahoo Tool Bar or Google Tool Bar, be sure that it is also configured to allow

More information

Tips for Banking Online Safely

Tips for Banking Online Safely If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining

More information

Reading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM)

Reading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM) Reading an email sent with Voltage SecureMail Using the Voltage SecureMail Zero Download Messenger (ZDM) SecureMail is an email protection service developed by Voltage Security, Inc. that provides email

More information

Network Connect Installation and Usage Guide

Network Connect Installation and Usage Guide Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing

More information

AT&T Business Messaging Account Management

AT&T Business Messaging Account Management AT&T Business Messaging Account Management Admin User Guide December 2015 1 Copyright 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

Protection of Personal Computer Best Practices for General User

Protection of Personal Computer Best Practices for General User Protection of Personal Computer Best Practices for General User ccording to the Government survey conducted in 2013 1, over 80% of Hong Kong households own a computer. Thanks to the extensive broadband

More information

Secure Email Portal. A Step-by-Step Guide for Using KRS ZixCorp Secure Email Solution

Secure Email Portal. A Step-by-Step Guide for Using KRS ZixCorp Secure Email Solution Secure Email Portal User Manual A Step-by-Step Guide for Using KRS ZixCorp Secure Email Solution This manual can be found online at https://kyret.ky.gov in the Agency Employers Employer Publications section.

More information

Payment Systems Department

Payment Systems Department v Note: Please follow these guidelines for your safety as you enjoy the convenience of technology. However these guidelines are general; therefore, specific precautions may be taken as warranted by the

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Send and receive encrypted e-mails

Send and receive encrypted e-mails Manual Send and receive encrypted e-mails Bank J. Safra Sarasin Ltd Document Owner Security Classification Document Type Bank J. Safra Sarasin Ltd internal and external use Manual Document change history

More information

Optum ID Migration for Provider Express Users

Optum ID Migration for Provider Express Users Introducing Optum ID FREQUENTLY ASKED QUESTIONS Optum ID Migration for Provider Express Users 1. What is Optum ID? A1. Optum ID is a centralized, secure identity management solution that enables a single

More information

How to stay safe online

How to stay safe online How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware

More information

Shentel (Shentel.net)

Shentel (Shentel.net) Shentel (Shentel.net) Email Quick Start Guide Your new webmail is now powered by Contents If you are forwarding your Shentel.net email to a third party address...2 If you use an email program other than

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

Outlook Web App User Guide

Outlook Web App User Guide Outlook Web App Table of Contents QUICK REFERENCE... 2 OUTLOOK WEB APP URL... 2 Imagine! Help Desk...... 2 OUTLOOK WEB APP MAIN WINDOW... 2 KEY NEW FEATURES... 3 GETTING STARTED WITH OUTLOOK... 4 LOGGING

More information

Kaspersky Internet Security User Guide

Kaspersky Internet Security User Guide Kaspersky Internet Security User Guide APPLICATION VERSION: 15.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding

More information

Imhotep Academy BYOD Policy (Bring Your Own Device) 4th-8th Grades Only

Imhotep Academy BYOD Policy (Bring Your Own Device) 4th-8th Grades Only Imhotep Academy BYOD Policy (Bring Your Own Device) 4th-8th Grades Only Imhotep Academy is committed to staying on the forefront of educational practices of the 21st century. We are piloting a new policy

More information

CUNY TUMBLEWEED (SECURE TRANSPORT) USER GUIDE

CUNY TUMBLEWEED (SECURE TRANSPORT) USER GUIDE CUNY TUMBLEWEED (SECURE TRANSPORT) USER GUIDE INTRODUCTION Tumbleweed (Secure Transport) is used to provide secure file transfer of critical business files, financial transactions and sensitive data such

More information

Secure Mail Registration and Viewing Procedures

Secure Mail Registration and Viewing Procedures Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email

More information

avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide

avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide 1 Introduction Welcome to avast! Free Antivirus for Mac. avast! Free Antivirus for Mac contains the same ICSA Certified scan engine as all avast! antivirus

More information