precautions while using internet banking

Check your banks Internet policy
1. Some banks have enhanced security features in Internet banking. For example, if the money that you want transferred to another account exceeds a particular sum, you will need to enter a specific password for high value deals to validate the transaction. .....
If you make a number of incorrect attempts to log in
2. If you make a number of incorrect attempts to log in, we will disable your access as a security measure. Please call our helpdesk immediately on 0845 456 1454 for information on how you can get back online. The helpdesk lines are open from 10.00 to 17.00 on Monday, and from 09.00 to 17.00 Tuesday to Friday. Outside of these hours you can leave a voicemail message, which will be picked up on the next working day. .....
Automatic termination of your connection
3. Automatic termination of your connection. Your secure connection has a time limit. If you have not sent any data within your secure session for a period (which you can define) of up to fifteen minutes, your connection will be terminated automatically. You must log in again to connect to internet banking. .....
Necessary SSL connection
4. When you log in to internet banking, a secure connection is established between our server and your computer using SSL (Secure Socket Layer) technology. This secure connection can be identified by the closed padlock in the browser status bar at the bottom of your screen. We recommend that you check that you have the necessary SSL connection. Click here to find out how to check your connection is secure. .....
Never write down or reveal your security details to anyone
5. Use your username and password to log in to internet banking, and to authorise transactions. Keep your username and password secure. Only someone with both these details can log in to your account and make authorisations. Remember, never write down or reveal your security details to anyone. .....
Always access our internet banking site
6. Always access our internet banking site via the triodos.co.uk site or by typing the address into your web browser.We will never send you an e mail with a link through to our internet banking site. The easiest way to tell if an email is fraudulent is to bear in mind that we will never ask you for your personal passwords, personal information numbers or login information in an email. Legitimate financial institutions do not include links to their .....
Treat e mails you receive with caution
7. Treat e mails you receive with caution and be very wary of e mails or calls asking you to reveal any personal security details. Triodos Bank (or the police) will never contact you to ask you for your internet banking password or username information .....
keep your username and passwords secret
8. keep your username and passwords secret. This includes (but is not limited to) taking the following precautions: (1) destroying any password notification immediately after receipt from us; (2) never writing your password or username details in a way that might be understood by someone else or recording them on any item or in any place that might be accessed by someone else; (3) taking all reasonable care to ensure that no one sees your password o .....
Keep your computer secure
9. keep your computer secure. Make sure that any computer you are using benefits from up to date anti virus and spyware software and a personal firewall. If you use a public computer (e.g. in an internet caf), you should ensure you do not leave any personal details stored on that computer after you have finished using it .....
Always check the URL
10. Always check the URL of your banks web site. When banking online, check the address of any pages that ask you to enter personal account information. In the toolbar at the top of the page any legitimate Internet banking website will begin with https to indicate that the page is secure. .....
Ignore any e mail asking for your password or PIN
11. Neither the police nor Banks ever contact you to ask you to reveal your online banking or payment card PINs, or your password information. Look for the padlock found in the lower right corner of your screen. If the page is legitimate, by clicking on the padlock, you can view the security certificate details for the site. A fraudulent site will not have these details. .....
Dont use the embedded links
12. Dont use the embedded links in any e mail to get to any web page. Type the link address (URL) in your web browser. Check your bank and credit card statements regularly to ensure that all transactions are legitimate. Type in our web address yourself to ensure you are transacting with our server. .....
Avoid use of cyber cafs or shared PCs
13. Avoid use of cyber cafs / shared PCs to access internet banking site. Contact Summerland & District Credit Union immediately if you suspect someone has gained knowledge of your PAC/PIN, or if you suspect any loss, theft or unauthorized use of your account. .....
Do not store your ID or PIN
15. Do not store your ID / PIN in the Internet Explorer Browser. Refrain from making e banking transactions at Internet cafes and other public places. If you do e banking, delete relevant information thoroughly after making transactions. .....
Keep changing your password
16. Keep changing your password at least once a month. And remember it! When making Internet banking transactions, if the transaction has stopped due to communication failure, You will be required to inquire and confirm the transaction details. .....
Check the panel whenever you log in
17. If your bank has logged in panel, check the panel whenever you log in. If you notice irregularities (like you are logging in after two days, but the panel says you logged in that morning!), report the matter at once to the bank and change your password immediately. .....
Dont open run install or use programmes
18. Dont open, run, install or use programmes or files obtained from a person or organization you do not know or from someone who is not a reputed vendor. While making important decisions about investment of your money, you should take adequate precautions to ensure the funds are safe and earn desired returns for you. .....
Keep your operating system
19. Keep your operating system (e.g.Windows 7) and web browser (e.g. Internet Explorer) up to date. Flaws are often found in these products and the manufacturers will issue patches to correct the problem. Visit your operating system and browser manufacturers website to ensure you have the latest updates. For example, Internet Explorer users should visit the Microsoft website. .....
Use a personal firewall and anti virus software
20. Use a personal firewall and anti virus software to prevent unauthorised access and viruses being downloaded onto your computer. A personal firewall is software that protects your computer against abuse from hackers and warns you if someone tries to gain access to your computer. This type of protection is very important for computers that have a permanent internet connection, e.g. with an (A)DSL (broadband) or cable connection. .....
Check your accounts regularly
21. Check your accounts regularly. Look for transactions you don t remember making or recognise. If in doubt, note the details and report it to our helpdesk immediately on 0845 456 1454. The helpdesk lines are open from 10.00 to 17.00 on Monday, and from 09.00 to 17.00 Tuesday to Friday. Outside of these hours you can leave a voicemail message, which will be picked up on the next working day. .....
Always log out after using internet banking
22. Always log out after using internet banking by selecting the log out menu option and never leave your computer unattended while you re logged in to the service. Online banking is an electronic payment system that enables customers of a financial institution to conduct financial transactions on a website operated by the institution, such as a retail bank, virtual bank, credit union or building society. Online banking is also referred as Internet b .....
Do not save encrypted pages on your hard drive
23. Do not save encrypted pages on your hard drive. It is standard practice not to save encrypted pages in your browser. This ensures that other users of the same computer cannot access these pages when you are finished with them. You can check and if necessary change the security setting for your browser. .....
Clearing your cache
24. Clearing your web browser cache forces the browser to load the latest versions of web pages and programs you visit.We automatically instruct most browsers not to store your personal information in the cache (memory).As this may be affected by the type of browser you use, always clear the cache yourself . For more information about clearing your cache the following links to external websites may be of help. However we accept no responsibility or l .....
Check your secure connection
25. We recommend you check that you have the necessary secure (SSL) connection with Triodos Bank.With Microsoft Internet Explorer the secure connection with Triodos Bank can be checked as follows: 1. in the address line HTTPS appears instead of HTTP. The S stands for secure 2. select Properties from the File menu 3. next to Connection it says SSL x.y, where x.y = version number 4. select Certificates for information about the certificate assigned to .....
Virtual Keyboard
26. Virtual Keyboard has been developed as a measure against viruses that trace pounded keys. It allows access by using the mouse only, without using the keyboard. To access a financial institutions online banking facility, a customer with Internet access would need to register with the institution for the service, and set up some password (under various names) for customer verification. The password for online banking is normally not the same as for .....
Single Use Log In PIN
27. To make banking transactions safer, a single use log in PIN to be used to access TEB E Banking is sent to the customers registered phone number via SMS. It generates a personal and single use PIN that cannot be known by any party other than the customer and that cannot be used again. The PIN that arrives via SMS is valid for 3 minutes and once the time is over it is de validated. This way, secure access to TEB E Banking anywhere is assured and al .....
Password
28. You need a username and a password to log in to TEB E Banking. When the access is made with your username and password, you will be asked for the PIN at the second stage. To access online banking, a customer would go to the financial institutions secured website, and enter the online banking facility using the customer number and password previously setup. Some financial institutions have set up additional security steps for access to online bank .....
Secret Message and Secret Picture
29. Personal message and personal picture is applied as a security measure. This way, after the customer types the username and password, and before entering PIN , can check if the picture and the message that comes out actually belongs to him or her and make sure that she or he is connected to TEB E Banking and not elsewhere. .....
Day and Time Settings
30. You can determine the days when you wish to use TEB E Banking and prevent access on any other day or time. The precursor for the modern home online banking services were the distance banking services over electronic media from the early 1980s. The term online became popular in the late 80s and referred to the use of a terminal, keyboard and TV (or monitor) to access the banking system using a phone line. Home banking can also refer to the use of .....
Instant Notification
31. You can define transfer limit and for all transfers that you will do with amount equal or more than defined limit, system will automatically send a SMS or Email. State Bank of India (SBI) is an Indian multinational banking and financial services company. It is a government owned corporation with its headquarters in Mumbai, Maharashtra. As of December 2013, it had assets of US$388 billion and 17,000 branches, including 190 foreign offices, making .....
IP Settings
32. You can define the IP address from where you wish to access the TEB E Banking and prevent all access from a different IP address. The bank traces its ancestry to British India, through the Imperial Bank of India, to the founding, in 1806, of the Bank of Calcutta, making it the oldest commercial bank in the Indian Subcontinent. Bank of Madras merged into the other two presidency banks in British India, Bank of Calcutta and Bank of Bombay, to form .....
Transaction Limits
33. You can define limits for daily transactions and for single transactions. Mobile banking is a system that allows customers of a financial institution to conduct a number of financial transactions through a mobile device such as a mobile phone or tablet. .....
Beneficiary Account Limitation
34. You can define accounts to which you can make money transfers, thereby preventing any money transfer to accounts not included in the list. Mobile banking differs from mobile payments, which involve the use of a mobile device to pay for goods or services either at the point of sale or remotely,[1] analogously to the use of a debit or credit card to effect an EFTPOS payment. .....
Tips for Your Security in TEB E Banking
35. Fraud methods have been changed and raised by time and depending on technology. The fraudulent mails are recently very much increased over internet and this kind of mails are seen as they are sent by any bank or other financial institutions. By links in these e mails, you will be asked to give personal information, card information and passwords and internet passwords. These kind of activities are fraud attempts over internet. For this reason, do .....
TEB E Banking
36. Do not enter TEB E Banking by clicking any link in the e mail what has been sent to you or by being directed from other web sites. Enter TEB E Banking only by using .....
Tips for Your Computer Security
37. Install anti virus software in your computer and keep it updated. Anti virus software will protect your system from known viruses and possible attacks. Keep your anti virus software working while file downloading from internet, and scan CD or disks before downloading any program to your computer. .....
Avoid using shared computers
38. Avoid using shared or public computers to access your accounts. Shared or public computers may have been installed with tracking software that could monitor your Internet Banking sessions. Security of financial transactions, being executed from some remote location and transmission of financial information over the air, are the most complicated challenges that need to be addressed jointly by mobile application developers, wireless network service .....
Avoid using Beta browsers
39. Avoid using Beta browsers. Beta browsers are browsers still in the process of testing and may contain security vulnerabilities. We suggest the use of the browsers final release versions. One time password (OTPs) are the latest tool used by financial and banking service providers in the fight against cyber fraud. Instead of relying on traditional memorized passwords, OTPs are requested by consumers each time they want to perform transactions using .....
Beware of questionable emails
40. Crooks may also send you emails asking for your personal information such as a password or pin. As we noted earlier, as time goes by, they get smarter and smarter. They have designed fake bank logos and use them when sending you an email, you may be easily lured to give personal information. You can detect fake emails from these crooks because their emails usually direct you to questionable internet sites. In addition, you will notice that they d .....
Inform your web bank immediately
41. If you discover you did submit private detail to these con artists, inform your web bank immediately: Make sure you give your bank your current contact information so that they can get in touch with you with any questions or any other mattersthat require your attention. .....
Encryption
42. Encryptionis the process of scrambling private information to prevent unauthorized access. To remind you that your transmission is encrypted, most Internet browsers display a small icon on your screen that looks like a lock or a key, when you conduct secure transactions online. Avoid sending sensitive information, such as account numbers, through unsecured e mail. .....
General security
43. General securityover your personal computer such as virus protection and physical access controls should be used and updated regularly. Contact your hardware and software suppliers, or Internet service provider, toensure you have the latest in security updates. .....
Never leave your computer
44. Never leave your computer unattended once you have signed in to online banking. Mobile banking is used in many parts of the world with little or no infrastructure, especially remote and rural areas. This aspect of mobile commerce is also popular in countries where most of their population is unbanked. In most of these places, banks can only be found in big cities, and customers have to travel hundreds of miles to the nearest bank. .....
Card number safe
45. Keep your password and card number safe. This seems like a no brainer, but surprisingly many users do forget this critical step in the process. Security of a customers financial information is very important, without which online banking could not operate. Financial institutions have set up various security processes to reduce the risk of unauthorized online access to a customers records, but there is no consistency to the various approaches adop .....
Do not share disclose or provide your bank card number
46. Do not share, disclose, or provide your bank card number, or password, to another party or website other than your bank. Most banks will not send you an email requesting this information. If your bank practices this very unsafe routine; you should change banks. .....
Don t use lazy passwords
47. Choosing password or 1234 is like putting a luggage lock on the front door of your house. Also, people will be able to guess it and hack. Instead, come up with a longer password that contains both letters and numbers/characters. .....
When signing up for installing agreeing to anything read the fine print
48. If you do not want to receive junk mail or get put on a telemarketer list, look for a small box near the bottom of the page that asks if you want to receive information and offers from other companies. The best sites will have a statement listed that they will not sell your name to other companies (though they may still spam you themselves). Some sites require you to give all your information to get the product. Only fill in required fields that .....
Do not give out your full name address or phone number
49. This especially important in chatrooms or when negotiating jobs or deals through meet up sites. Beware of stock letters (i.e. very general response letters that don t actually address any of the points you ve made), anyone who wants to negotiate a wire transfer, or anyone who wants to work out a business arrangement while they re .....
Keep your eyes peeled for online scams
50. Beware of spoof email claiming to be from eBay, PayPal, or a bank or a company you trust asking for personal or sensitive information. This is called phishing. The e mail may inform you that there is a problem with your account/password. There may be a link to click inside. Forward any of these e mails to the company it claims to be sent from. They will confirm whether the e mail you received was real or not. Also, bear in mind that e mail progra .....
Make sure to turn off file sharing and network discovery
51. These both put your files and system at risk for being opened by anyone on the wireless network, not just hackers. In Windows, these options can be found under Control Panel > Network and Internet > Network and Sharing Center. In Mac OS X, they are under System Preferences > Sharing. If you are within range of public wireless networks but don t need to be online, turn off your wireless capabilities altogether. On some devices, there is simply an .....
Always check for secure transaction info
52. The best companies will have many security devices in place. You may see a gold lock at the bottom of the page to indicate a secure site. When giving any bank details or other information, make sure the connection is secure and the site is trustworthy. .....
Only download files or software from sites that have been rated
53. Choose downloading resources that are up front about price and ratings and vet their downloads (ex. download.cnet.com). When in doubt, google the name of the site or download along with the word .....
If your computer was hacked through the internet
54. If your computer was hacked through the internet then all your information may have been compromised. Update your virus protection software and remove the virus. If important documents and information has been stolen or compromised, inform your bank or job accordingly. Report any crime to the police. .....
Never access the e banking using a link
55. Never access the e banking using a link that has been provided to you in an e mail. The Bank will never provide you the e banking link in an e mail nor will it allow or request you to open an e banking account online. The PIN/TAN system where the PIN represents a password, used for the login and TANs representing one time passwords to authenticate transactions. TANs can be distributed in different ways, the most popular one is to send a list of T .....
Never provide your identification data
56. Also never provide your identification data contract number, password or mobile code per e mail to anyone. The Bank will never request you to do so. More advanced TAN generators (chipTAN) also include the transaction data into the TAN generation process after displaying it on their own screen to allow the user to discover man in the middle attacks carried out by trojans trying to secretly manipulate the transaction data in the background of t .....
Read key information about the bank posted on its Web site
57. Most bank Web sites have an About Us section or something similar that describes the institution. You may find a brief history of the bank, the official name and address of the banks headquarters, and information about its insurance coverage from the FDIC. .....
Protect yourself from fraudulent Web sites
58. For example, watch out for copycat Web sites that deliberately use a name or Web address very similar to, but not the same as, that of a real financial institution. The intent is to lure you into clicking onto their Web site and giving your personal information, such as your account number and password. Always check to see that you have typed the correct Web site address for your bank before conducting a transaction. .....
Verify the banks insurance status
59. To verify a banks insurance status, look for the familiar FDIC logo or the words Member FDIC or FDIC Insured on the Web site. Also, you should check the FDICs online database of FDIC insured institutions. You can search for an institution by going to Bank Find (formerly Is My Bank Insured?). Search by name, city, state or zip code of the bank, and click the Find button. A positive match will display the official name of the bank, the date it beca .....
Chourishi Systems