Secure use of mobile phones and S-Banking

Mobile devices – mainly smart phones and tablets in the corporate world today are becoming increasingly common way of accessing and using business data and performing work tasks and commitments. Those devices are portable (mobile) and easily accessible, which on the other hand carries the risk of being lost, stolen or subject to unauthorized access. Contacts, email, SMS messages contain very sensitive information that could be misused if we do not protect them accordingly. For that purpose, follow up a few useful tips and instructions given below that every user of mobile devices (phones) needs to know and apply accordingly:

Mobile Application logon uses authentication with a PIN generated by the user. The PIN has the following characteristics:

  • Min 4 numeric digits;
  • Max 8 numeric digits;
  • The user may change it at any time;
  • Simple PIN codes are not allowed (for example, composed of same characters).
  • Authentication / verification of transactions – use your PIN for each transaction, which is entered after a window listing all payment information appears, for example: Dear user xxx do you want to make a transaction in the amount of xxx from the account xxx to the account xxx.
  • Be cautious when connecting wireless networks, so-called hotspot access points, especially in public places such as hotels, airports and etc. Get information from the responsible persons how to connect and what their official network is (access point). Be especially careful when you can connect to free networks from which you first must download a program to make the connection.
  • Do not reply (instantly) to SMS sent from unknown sources, which require to provide your personal data or other type of sensitive and confidential information. Inform yourself about the source, confirm their authenticity and check if and to what extent they really need that information. Like email messages, SMS messages are susceptible to the so-called phishing attacks.
  • Do not download (third-party) applications which are suspicious, not checked and supported by the relevant manufacturer of your mobile device, for example from App Store or Google Play.
  • Disable all communication protocols when you do not need them such as wireless, Bluetooth, NFC.
  • Make sure you always log out of the applications you have used.

Take measures for protection against fraud

Reduce the risk against frauds and abuse of your identity. Find the right tools and programs on your computer, but still raise your awareness.

If you perceive a suspicious activity or unauthorized access to your computer, please report it to the following link or call the Contact Center on 02/3200 600.