In addition to the strict security measures our Internet & Mobile Banking Services apply, you can also protect your privacy and account information by reading and following the below listed tips.
- To help protecting yourself against security threats, make sure that your PC or Device you use to access the internet has an up to date operating system, internet browser and plug-ins including the recent update Microsoft released to fix the security vulnerability on its Internet Explorer versions 6 to 11. For more information on Microsoft Internet Explorer vulnerability, please visit Microsoft’s Website.
- Make sure that you have a trusted and up to date Anti-Virus software installed on your PC or any Device you use to access the Internet banking Service "ATBNET".
- It is also advisable to install a Firewall Software on your PC to protect your PC against intruders, virus attacks or malicious programs.
In addition to the above, kindly read the below listed tips to ensure utmost privacy and confidentiality of your Electronic Banking experience.
|
- Select a user name and password that are difficult for others to guess. Do not associate your password with anything personal such as birthdays, names, phone numbers or other familiar words or numbers. Choose password that contains letters, numbers and special characters.
- Change your password on a regular basis.
- Keep your personal and / or banking information (e.g. User name, password, Credit card number,... etc) confidential. Your PIN / Password should be memorized and not recorded anywhere.
- Avoid accessing the Internet / Mobile Banking Service from Internet Cafes or public places.
- You should always be careful when receiving unsolicited emails asking you to disclose any personal or banking details. Arab Tunisian Bank plc will never ask you for such details (e.g. User name, password, Credit card number,... etc) through email. If you receive such a request, do not respond and please report it to us immediately.
- To access Arab Tunisian Bank’s Internet Banking Service, use the Logon button on the homepage of your Country website. Never follow a link received by email to access the Internet Banking Service.
- Whenever you log on to Internet BankingMobile banking, verify the last access date & time displayed at the left corner on the top of the page.
- Always remember to log out using the "Log Off" and never leave the PCsmart Device unattended when logged on.
- When logging on to Arab Tunisian Bank Internet Banking site, look for the Security Certificate before entering the User name & Password. To view the security certificate, click on the "lock" icon next to the URL if you are using Internet Explorer, Google Chrome, Mozilla Firefox or Safari.
- Check your account balances and statements regularly to ensure your accounts have not been accessed by anyone else and to identify any unusual transactions. If you want us to alert you whenever a transaction takes place on your account / Credit Card, you can register for our SMS Banking Service.
- Be ware of emails offering you the chance to make easy money in exchange of services & / or using your account to transfer large amounts to. Do business only with companies / individuals you know and trust.
- Keep your smart device operating system up to date as newer versions may contain security updates which will protect you against virus and intruder attacks.
- Keep your ATB Mobile application up to date while using the service if a new version is available.
- Avoid using ATB Mobile service from jailbroken or rooted phones as they will be more susceptible to security risks.
- Never leave your smart device unattended when logged on, and always lock it when not in use. It is recommended that you set a passcode which will protect your information.
- Only download ATB Mobile and any other applications from official app stores, such as apple iTunes, Google Play store or other official app stores.
- If possible, Install security software on your smart device to further protect it from potential threats.
- Do not use your smart device to store sensitive personal information or any login credentials.
- If you wish to report an electronic fraud attempt, please call our Customer Contact Center or fill a contact us form on our website.
|
For more information on common computer security threats, please read the below
- Computer Security Threats
Computer security threats are persistently inventive. Protect yourself with information and resources to safeguard against complex and growing computer security threats and stay safe online.
- Phishing Threat
Masquerading as a trustworthy person or business, phishers attempt to steal sensitive financial or personal information through fraudulent email or instant messages.
- Spam
Electronic sending of mass unsolicited messages. The most common medium for spam is email. While spam is not actually a type of malware, it is very common for malware to spread through spamming. Users can prevent getting spammed by avoiding unfamiliar emails and keeping their email addresses as private as possible.
- Backdoor
Much the same as Trojans or worms, except that they open a "backdoor" onto a computer, providing a network connection for hackers or other Malware to enter or for viruses or SPAM to be sent.
- Key-logger
Records everything you type on your PC in order to glean your log-in names, passwords, and other sensitive information, and send it on to the source of the keylogging program. Many times key-loggers are used by corporations and parents to acquire computer usage information.
- Malware
Malicious software is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
Types of Malware:
- Viruses
The most well known computer security threat, a computer virus is a program written to alter the way a computer operates, without the permission or knowledge of the user.
- Trojan horses
Any program that invites the user to run it, concealing harmful or malicious executable code of any description.
- Worm
A program that replicates itself and destroys data and files on the computer. Worms work to "eat" the system operating files and data files until the drive is empty.
- Spyware
Spyware is software that spies on you, tracking your internet activities in order to send advertising (Adware) back to your system.
- Rootkit
A stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued root privileged access to a computer.
Examples of Malware:
- Zbot/Zeus: Zeus, also known as Zbot: Is a notorious Trojan which infects Windows users and tries to retrieve confidential.
- Zeus Gameover (P2P) (Zeus family): Is a variant of the Zeus family – the infamous family of financial stealing malware – which relies upon a peer-to-peer botnet infrastructure.
- SpyEye (Zeus family): This malicious software is capable of stealing bank account credentials, social security numbers and financial information.
- Ice IX (Zeus family): This modified variant is used by cybercriminals with the same malicious purpose of stealing personal and financial information, such as credentials or passwords for the e-mail or the online bank accounts.
- Citadel (Zeus family): Due to its open source character, the software code has been reviewed and improved by IT criminals for various malware attacks.
- Carberp (Zeus family): Carberp is a Trojan designed to give attackers the ability to steal private information from online banking platforms accessed by the infected PCs.
- Bugat (Zeus family): Bugat is another banking Trojan, with similar capabilities to Zeus – the notorious data-stealing Trojan – which is used by IT criminals to steal financial credentials.
- Shylock (Zeus family): Shylock is a banking malware, designed to retrieve user’s banking credentials for fraudulent purposes.
- Torpig (Zeus family): Torpig is a sophisticated type of malware program designed to harvest sensitive information, such as bank account and credit card information from its victims.
- CryptoLocker: This malware encrypts your data and displays a message which states that your private information can be decrypted for a sum of money in a limited period of time.
|