Vector
Vector

Choose your topics

Blogs
How to Prioritize Your Third-Party Risks

How can you prioritize effectively and enhance your organization’s security posture? Here are our top tips for setting up realistic, sustainable processes.

Third-Party Risk Management GRC
Blogs
Top Tips to Save Time When Assessing Third-Party Risks

Is assessing third-party risks taking up too much of your time? How can you make the process more effective and efficient? Find out in the latest post from SureCloud.

Third-Party Risk Management GRC
Blogs
The GRC Trends to Look Out for in 2024

Our GRC experts at SureCloud share their 2024 predictions for the world of governance, risk and compliance.

GRC
Blogs
The Top 5 Challenges of Third-Party Risk Management

With the supply chain now seen as a legitimate attack path, what can your organization do? Let’s explore 5 challenges of TPRM and how to overcome them.

Third-Party Risk Management GRC
Blogs
What is Third-Party Risk Management?

What is third-party risk management and how should you approach it? Find out in this post.

Third-Party Risk Management GRC
Blogs
The Top 4 Challenges of Risk Management

What are the top four challenges of risk management today and how can you overcome them? Find out in this post from SureCloud.

Third-Party Risk Management GRC
Blogs
Transform Compliance into Your Competitive Advantage

In GRC, compliance is often viewed as a cost that makes it harder to pursue growth. Here's how to make it your competitive advantage.

Compliance Management GRC
Blogs
Questions You Should Ask when Preparing For Your First Pen Test

Understand the processes that you and your chosen pentest provider will travel through for your first pen test, from the initial point to the day the test starts.

Penetration Testing
Blogs
TPRM Blog 6-Writing Clear Questions

Our GRC Practice Director explores the importance of clear communication and how to achieve it in your third party questionnaires. Read more here.

Third-Party Risk Management GRC
Vector (7)
Vector-1
Penetration Testing, Cyber Security

5 steps for Safer Online Banking

5 steps for Safer Online Banking
Written by

Luke Potter

Published on

10 Mar 2018

5 steps for Safer Online Banking

 

Following SureCloud’s recent feature as part of the BBC’s Rip Off Britain program, I wanted to share some tips we can all use to keep our personal information, and our cash, out of the hands of criminals with SureCloud’s data privacy solutions.

It is surprisingly easy for fraudsters to convincingly pose as a representative from your bank, either on the phone or by crafting a plausible-looking email. The following steps won’t take up your time or money, and can stop you from giving away your account details – and potentially, your savings.

  1. Take advantage of security features and data privacy solutions offered by your bank

Most banks have great security solutions on offer, but they aren’t always activated automatically. For example, if your bank’s app or online service offers 2-factor-authentication (2FA), make sure to use it. With 2FA, even if someone got hold of your username and password, they wouldn’t be able to access your full account. It adds an extra step when you log on, like providing a fingerprint or a code sent to your mobile phone.

If your bank gives you the option to activate ‘push’ notifications instead of communicating with SMS, it’s well worth selecting that option. SMS is now a relatively old and insecure technology that’s easy for criminals to spoof, whereas push notifications are much harder to hack.

  1. Never reveal any login or account details

To avoid passing your details to criminals, the safest thing to do is to never give away your login or account details to anyone claiming to be from your bank if you are asked to do so over the phone, via text message or email in a conversation that you have not initiated.

  1. If you receive an email asking you to log in via a link, never click it. Always log in directly through the bank’s website landing page or from the official mobile app. Use strong, unique passwords

This is something that we all hear regularly (and are probably bored of hearing), but it’s so often ignored. If all of your passwords are variations on the same theme, you may be putting your accounts at a cyber security risk. If a hacker manages to obtain one password, it makes it easier for them to guess other passwords too.

The most secure passwords are unique, chosen at random, and use a combination of lower-case and upper-case letters with numbers and special characters. It can be difficult to choose a strong password, and even more difficult to remember scores of unique codes – a password manager product can be a great help here.

  1. Don’t trust anyone claiming to be your bank

Phishing and “SMShing” attacks appear 100% genuine, using the way the bank communicates with customers to convince victims of their authenticity. If you ever want to check if a communication is genuinely from your bank, contact them directly using your banking app, their main phone number or website.

  1. Keep up with updates

The importance of keeping your web browser, operating system, and devices up to date cannot be understated. Older versions of software can contain vulnerabilities that criminals know how to exploit, so it’s important to make sure that you’re using the latest versions of any software or hardware you use to access your bank account. Replacing old PCs, smartphones and tablets is a small price to pay for protection against criminals.

These steps are simple to achieve, and while they are the absolute basics, getting them right will put you ahead of the majority of online banking customers. When it comes to staying ahead of cyber-security attackers, you don’t have to be more advanced than the criminals. It’s like being chased by a tiger – if you stay one step ahead of the person next to you, the chances are you won’t get caught out.

Learn about our Cybersecurity Services here to keep your organization secure.

About Luke Potter:

Luke oversees SureCloud Cybersecurity Solutions. He also manages our Secure Private Cloud. Luke is a recognized cybersecurity expert. He is a CHECK team leader, Tiger Scheme senior security tester, ISO 27001 lead auditor and Microsoft Certified enterprise administrator. Previously, Luke managed the IT team at a large UK insurance brokerage.