electronic channels security copy · damage to your machine. system settings turning off your...
TRANSCRIPT
![Page 1: Electronic Channels Security copy · damage to your machine. System settings Turning off your computer to prevent others from using your PC after business hours Shut down your computer](https://reader034.vdocuments.net/reader034/viewer/2022050423/5f92127abd78906db6221b86/html5/thumbnails/1.jpg)
sambacaresamba customer care
World class banking solutionsfor the most important things in lifethink samba 800 124 1010 l www.samba.com
Always remember these rules,especially in the work environment
Use a screen saver recommended by your company and protect it with a strong password to prevent anyone from using your computer in case you’re not at your desk even for a few minutes. This also applies to mobile phones. Don’t let the standby period before the automatic lock screen longer than 3 minutes, especially in open-plan offices.
Screen saversYour device and the data it contains is your company’s property and should not be for any personal use. Avoid saving files which are not work-related, as well as using remov-able media or any device without prior permission.
Office use only
Don't change any security setting in your device. Don’t change it to avoid causing damage to your machine.
System settings
Turning off your computer to prevent others from using your PC after business hours
Shut down your computerat the end of the day
Don’t download pirated and unlicensed software. They violate laws on intellectu-al property rights and increase your risk from malware that could damage your machine.
Use only licensed software
Always remember to seek help and advice from your company’s IT department who are responsible for managing information security.
Many email services are public and don’t always offer complete privacy, so incoming emails are often unsafe. Make sure your emails do not contain confidential and important information.
Observe laws and regulations governing the dissemination of news and information and make sure that you are not involved in spreading false information about other people.
Emails are common carriers of malwares and viruses. Ensure that you are using a legitimate antivirus software.
Be wary of phising emails that contain harmful links and files.
Don’t send or receive information about financial transactions through email.
Avoid opening links from unknown sources.
E-mail security Secure banking transactions
Internet Security The Internet comes with certain security risksAlways follow the common rules for using the Internet
The Internet is a huge repository of knowledge
and information. Day after day, as the number
of Internet users increase, more cybercriminals
are actively finding new ways and tools to
victimize users.
Any computer or mobile phone connected to the internet is connected to an extensive worldwide network and therefore is susceptible to the invasion of harmful viruses that threaten the safety of these devices and the security of their information. These devices should be equipped with certified protection systems against viruses and malicious programs.
Viruses
Spyware software
Phising
1
2 3
Security for computer/mobile devices
Social engineering
Samba will never ask for your password or confidential informa-
tion by phone or e-mail.
Always remember
Samba Tipsfor Information Security
Information security is everyone's responsibility
What isinformation
?
Bank account numbers
Credit cardnumbers
I.D.Numbers
Passwordsfor all e-media
Debit/ATM cardpasswords
Credit cardpasswords
PIN number and access code for
your bank account through
online and mobile banking
services
Financial and otherbanking information
What isInformation security?
Protection for data and information from risks associat-ed with activities and attempts to penetrate databases.
Control and protection of systems from IT crimes and developing legislation to strengthen these protections.
Portabledevices/phones
RemovableUSB flash drives
Charging ports for mobile phones which
contain memory storage
Desktop and portable computers
Examples of electronic storageData stored electronically on cell phones contains sensitive information. Take special care in protecting them from theft and access by other people.
Information Security
Why should we protect theintegrity of our information?
A shared responsibilty
Securing and protecting confidential information is a common gol and a shared responsibility of Samba, our employees, customers, and regulatory and supervisory bodies.
What is the risk of exposure?
Disclosure or loss of confidential information to unauthorized persons can result in losses and financial damage. The level of damage varies depending on the size and significance of the
compromised information.
Example
Losses can vary from person to person, but it is not limited to loss of funds alone. It also includes loss of reputation, time and credibility.
Protectyourself
Samba has the highest standards and systems to maintain information security and confidentiality and provide the safest banking environment for custom-ers. But it is also important to be always mindful of protecting the confidentiality of all your sensitive
personal and financial information.
Remember that you are ultimately responsible for eveything that happens in your device. If others know your password or
pin number and was easy to identify and access them, you are exposing
yourself to risks.
كيف تحافظ على ا»رقامالسرية وكلمات المرور نقاط يجب مراعاتها
First and most important, never share your password with anyone. Here are some tips for choosing your password:
Change your password from time to time, especially returning from a trip.Change your password if you suspect that some-one has seen them.Your password should be treated as a secret: never share it with anyone.Do not use the same password for more than one application.Do not use a password for more than 6 months at least.If you need to write your password to remember it, never keep it in your wallet and keep it safe where no one can access it.
The password should be easy to remember but hard for others to guess.
Should contain letters, numbers and symbols.
Should not be so obvious such as your name or that of a family member, your birth date, phone number or I.D. number, and should not contain repeated or consecutive numbers.
You are responsible for keeping additional backup copies of your important files.
Additional backups
Electronic channels security
Is a program which collects user information secretly by connecting the user to the Internet without his knowledge. These programs can collect addresses, credit card numbers and passwords, as well as analyze user behavior when choosing a secret number and compare it with his birthday, holiday or identity numbers.
Is a method of fraud to acquire personal
user data, passwords and
credit card numbers, using
social engineering
tactics. Fraudsters use email messages to convince the user
that they are an official authority asking for sensitive information, or use fake websites which pretend to be legitimate entities to make the user believe that he has won an award and
must provide his bank account number.
Samba electronic banking services Samba electronic banking services made it easy for samba customer to do all banking remote,banking transactions remotely, instantly and securely. Samba takes maximum care and effort to ensure the integrity and security of all Samba electronic banking transactions. Always remember, for your own protection, be aware of the guidelines when using Samba electronic banking services such as the ATM, SambaMobile and SambaOnline. When logging on to your SambaOnline account, always make sure that you are on the official Samba website link.
The following pointsshould be considered
It is a term used to describe a type of fraud where strangers request information they are
not authorized to get by pretending that they are from a bank or a party that you have a
financial relationship with.
Personal electronic devices have become very popular. These devices can contain
a large amount of confidential and personal information, or the organization or
company you work for. Today more than ever, it’s important to protect data and
information from theft , loss and fraud and any electronic crime.
In the Information Age, we have become more
dependent on our Internet and digital
electronic devices to manage our
financial and banking affairs.
That’s why cyber criminals are
constantly seeking
ways to diversify
their phishing
tactics on the
Internet, social
media and other electronic
channels. Their aim is to steal data
and use stolen personal information
to victimize bank customers.
If you lose your wallet and your credit card, the loss can be limited to the available balance on
your card. But if you also exposed your password and online account password, fraudsters can also transfer funds from your account repeatedly, which could be substantial if you have a significant account balance.