precautions while using internet banking

Precautions while using Internet Banking

Instructions for safe banking and precautions while operating internet banking.
31. Instant Notification
You can define transfer limit and for all transfers that you will do with amount equal or more than defined limit, system will automatically send a SMS or Email. State Bank of India (SBI) is an Indian multinational banking and financial services company. It is a government owned corporation with its headquarters in Mumbai, Maharashtra. As of December 2013, it had assets of US$388 billion and 17,000 branches, including 190 foreign offices, making it the largest banking and financial services company in India by assets.
32. IP Settings
You can define the IP address from where you wish to access the TEB E Banking and prevent all access from a different IP address. The bank traces its ancestry to British India, through the Imperial Bank of India, to the founding, in 1806, of the Bank of Calcutta, making it the oldest commercial bank in the Indian Subcontinent. Bank of Madras merged into the other two presidency banks in British India, Bank of Calcutta and Bank of Bombay, to form the Imperial Bank of India, which in turn became the State Bank of India. Government of India owned the Imperial Bank of India in 1955, with Reserve Bank of India (Indias Central Bank) taking a 60% stake, and renamed it the State Bank of India. In 2008, the government took over the stake held by the Reserve Bank of India.
33. Transaction Limits
You can define limits for daily transactions and for single transactions. Mobile banking is a system that allows customers of a financial institution to conduct a number of financial transactions through a mobile device such as a mobile phone or tablet.
34. Beneficiary Account Limitation
You can define accounts to which you can make money transfers, thereby preventing any money transfer to accounts not included in the list. Mobile banking differs from mobile payments, which involve the use of a mobile device to pay for goods or services either at the point of sale or remotely,[1] analogously to the use of a debit or credit card to effect an EFTPOS payment.
35. Tips for Your Security in TEB E Banking
Fraud methods have been changed and raised by time and depending on technology. The fraudulent mails are recently very much increased over internet and this kind of mails are seen as they are sent by any bank or other financial institutions. By links in these e mails, you will be asked to give personal information, card information and passwords and internet passwords. These kind of activities are fraud attempts over internet. For this reason, do not respond to these e mails and do not enter information what is asked.
36. TEB E Banking
Do not enter TEB E Banking by clicking any link in the e mail what has been sent to you or by being directed from other web sites. Enter TEB E Banking only by using
37. Tips for Your Computer Security
Install anti virus software in your computer and keep it updated. Anti virus software will protect your system from known viruses and possible attacks. Keep your anti virus software working while file downloading from internet, and scan CD or disks before downloading any program to your computer.
38. Avoid using shared computers
Avoid using shared or public computers to access your accounts. Shared or public computers may have been installed with tracking software that could monitor your Internet Banking sessions. Security of financial transactions, being executed from some remote location and transmission of financial information over the air, are the most complicated challenges that need to be addressed jointly by mobile application developers, wireless network service providers and the banks IT departments.
39. Avoid using Beta browsers
Avoid using Beta browsers. Beta browsers are browsers still in the process of testing and may contain security vulnerabilities. We suggest the use of the browsers final release versions. One time password (OTPs) are the latest tool used by financial and banking service providers in the fight against cyber fraud. Instead of relying on traditional memorized passwords, OTPs are requested by consumers each time they want to perform transactions using the online or mobile banking interface. When the request is received the password is sent to the consumer s phone via SMS. The password is expired once it has been used or once its scheduled life cycle has expired.
40. Beware of questionable emails
Crooks may also send you emails asking for your personal information such as a password or pin. As we noted earlier, as time goes by, they get smarter and smarter. They have designed fake bank logos and use them when sending you an email, you may be easily lured to give personal information. You can detect fake emails from these crooks because their emails usually direct you to questionable internet sites. In addition, you will notice that they do not address you as you are used to being called by your bank. The emails may also contain poor grammar.