Home » Cybersecurity
Zemen Bank takes a great care to protect customer’s sensitive data. Maintaining our customers trust and confidence is our priority.
More and more frequently, customers are using their mobile devices for online banking, payments, and shopping. We can now check our bank account balances, deposit a check using a mobile device’s camera, pay bills, transfer money between friends, and make purchases directly on our mobile devices. However, since these activities require users to provide sensitive personal information such as their names, account numbers, email addresses, and passwords, it is important to weigh the perceived benefits and potential risks associated with mobile payments and banking.
Be cyber secure at home.
When you pay with a credit card, there is a risk of an employee misusing your number. If you make a purchase over the telephone, the person you’re speaking to may not be who you think. Likewise, sending sensitive information over the internet (through internet sites or email) may always pose a risk. We have taken serious steps to protect your sensitive information and identity, but there are several steps customers must take on their own. That’s why we have developed this section to aid you in making your online banking account safe. If careful steps are taken, you can drastically reduce your chances of identity theft. The two types of internet scams most used to intercept personal information are phishing scams and key loggers/Trojan horse viruses.
Phishing is a scam that encompasses fraudulently obtaining and using an individual’s personal or financial information.” The typical way that criminals “phish” is by sending an email to people that virtually copies a bank’s email asking for the customer to submit account information. When you visit the fraudulent website and type in your account information, it is sent to the criminals. This information is then used to make purchases on your bank account. At Zemen Bank, we will NEVER send you an email asking for your account number, password, balance, or social security number.
Another type of online threat is the use of keyloggers/Trojan horse viruses. A keylogger is a program, installed without your consent, which is placed on your computer and keeps a log of all keystrokes typed. This is done invisibly. The most common ways that keyloggers install on your computer are as follows: the user clicks on an unfamiliar email (spam) which leads to an unfamiliar site or the user visits a second-rate site (sites exhibiting illegal content, sites with questionable content, and pornographic sites). It is difficult for a keylogger to install on your computer without a virus. A Trojan Horse virus gives a criminal unauthorized access to your computer. This allows the criminal to install the keylogger on your computer and track down your important information.
Online Tips
Feb 14, 2025
Currency ConverterEUR
GBP
CAD
AED
SAR
CNY
CHF
SEK
JPY
KES
ZAR
USD