I. ONLINE SECURITY
Make sure you have the latest security updates & patches
Install anti-virus software
Keep your software and browser up to date
Understand how criminals use the internet
Use personal firewalls
Avoid online fraud and scams
Read our password advice
Don't share private information online
Secure your wireless network
Protect your mobile phone and tablet devices
Take care offline
II. YOUR RESPONSIBILITIES
III. HOW HSBC PROTECTS YOU ONLINE
IV. SECURITY ALERT
Fraudulent websites
Fraudulent email
Phishing mules
Spyware
Trojan Horse
Keystroke capturing/logging
I. ONLINE SECURITY
At HSBC, we strive to deliver the most secure and convenient online banking services for our customers. As part of our effort to maintain the highest level of security on our site and for our internet banking users, we ask that you read and be aware of the below information. Please do not hesitate to contact us if you are unsure of the validity of any request purporting to be from the bank: Personal Internet Banking : (84 8) 37 247 247(the South) or (84 8) 62 707 707 (the North).
For your security, please disable all plug-ins in your browser, as they may attempt to manipulate your information.
Plug-ins provide additional functions to your web browser, such as allowing different file formats to be displayed, or supplying live news feeds. Users should be very prudent when installing plug-ins, as some are malicious and can attempt to harm your PC and capture your private information. For this reason, we suggest that you do not install plug-ins into your web browser and if you do, to disable them before using secured sites, such as our Internet Banking.
|
PROTECT YOURSELF ONLINE |
|
|
In our view, there are a few key rules that offer the most protection online for the least amount of effort. By following these rules you will greatly increase your PC's protection, not just when you use our Internet Banking services but when you use the internet generally. What you should always do:
|
|
|
* Make sure you have the latest security updates & patches From time to time, vulnerabilities are discovered in programs running on your PC. The publisher will then release a “patch” to correct this weakness. These weaknesses are regularly exploited by virus writers and hackers to gain unauthorised access to those PC’s that have not been patched.
|
|
|
|
|
|
* Install anti-virus software Viruses are bad news. They steal personal information, take over your PC, pop up unwanted adverts and they can even use your computer to attack other people's computers. You may also hear them called malware, trojans, spyware or adware. Anti-virus software protects you against all of them. |
|
|
|
|
|
* Keep your software and browser up to date It is harder for viruses to infect updated software.
|
|
|
|
|
|
* Understand how criminals use the internet Criminals are in it for the money. |
|
|
|
|
|
* Use personal firewalls A firewall is a program that helps protect your computer from internet-borne threats, such as potential hackers and offensive websites.
|
|
|
|
|
|
* Avoid online fraud and scams If it's too good to be true, it probably is. |
|
|
|
|
|
* Read our password advice Passwords are the key to your online account information so it's important to keep them safe.
|
|
|
|
|
|
* Don't share private information online Double-check privacy settings on social networking sites.
|
|
|
* Secure your wireless network A wireless network allows you to connect your computer to the internet without having to use a cable. It typically contains a wireless router, which uses radio signals to transfer data to computers within the network. Some wireless routers come pre-set to very insecure settings to help users connect to them for the first time – but this also means that other people could access your internet account quite easily. For this reason, you should always consult your manual or online guide to find out how to connect more securely through your wireless network – usually by creating a password. |
|
|
* Protect your mobile phone and tablet devices Your mobile phone and tablet device may hold lots of personal information – take care of it. You may even use it for internet banking, downloading mobile applications and online shopping.
|
|
|
* Take care offline Review your bank and credit card statements for any unusual transactions or withdrawals and notify the bank immediately if you suspect any discrepancies.
|
|
|
II. YOUR RESPONSIBILITIES: |
|
• |
Keep your account details secure, i.e. do not openly disclose them |
• |
Never write down your security credentials or reveal them to anyone |
• |
Access your account from private places ex: home, office |
• |
Change your Password on a regular basis |
• |
Log off properly using the "Logoff" button, when you have finished an Internet banking session |
• |
Always disconnect from the Internet when finished; never leave a connection on when not using the service |
• |
Install a personal firewall and virus detection software on personal computers, and update them regularly to ensure protection. |
|
III. HOW HSBC PROTECTS YOU ONLINE: |
|
|
We are constantly reviewing the ways we can help and support you. Our proactive approach includes meeting some of the world�s leading security experts to discuss key issues and sponsoring joint initiatives to improve your online security. |
|
1. |
Ensuring your online transactions are safe and secure. We use industry-standard security technology and practices to safeguard your account from any unauthorised access. |
2. |
Creating secure online sessions. When you log in to internet banking you are said to be in a secure session. You know you are in a secure session if the URL address begins with https:// and a padlock symbol appears at the top of the page as part of the address bar. |
3. |
Using encryption. Encryption Secure Sockets Layer (SSL) encryption technology is used within your Internet Banking session to encrypt (code) your personal information before it leaves your computer in order to ensure no one else can read it. Depending on your browser setting, a pop-up window will appear to notify you that you will be entering a secured page. At HSBC, we use 128-bit SSL Encryption, which is accepted as the industry standard level. Any email service within Internet Banking is similarly protected with encryption technology (unlike your regular email which is usually not secured). |
4. |
Using session timeouts. If you forget to log-off after banking online, or your computer remains inactive for a period of time during a session, our system will automatically log you off. Pages viewed during a secure session are not recorded in your PC's temporary files. |
5. |
Using many layers of security. For obvious reasons we cannot disclose all of them, but the following are typically used: All our operating systems are updated with the latest security patches, Our anti-virus software is kept updated , We use firewalls to prevent unauthorized intrusion. |
6. |
Using Two Factor Authentication to provide an extra layer of protection. The Secure Key or Security Device is a two-factor authentication will help protect you from internet banking fraud. It is designed to make sure only you can access your personal information. Devices like these are commonly being used for secure transactions all round the world. With this technology you can enjoy far more secure online banking services and it's one of the smallest and simplest to use. Two-factor authentication means you not only need a password or PIN, but you also need a device unique to you. |
7. |
Using logons and passwords to make sure we're dealing with you. Online access to your account is only possible once you have authenticated yourself using the correct Internet Banking ID and security details. For this reason, it is vital that you do not share your password and do not use the same password for other services (e.g., Yahoo, Hotmail, etc.) |
8. |
Having automatic lockouts. After 3 incorrect attempts to logon, we disable online access to your account. To re-activate your account, you should contact our Contact centers described above. |
IV. SECURITY ALERT
We would like to bring your attention to sites and emails purporting to be from HSBC, whether in Vietnam or elsewhere. These sites and emails aim to solicit sensitive personal information such as: Username, password, PIN, account numbers, credit card numbers, etc. Once obtained, the fraudulent party can gain access to the user’s account, channel money to a third party, or impersonate the user, to name a few.
|
Fraudulent websites |
||||||||||||||||
|
This is a sample of what a fraudulent website may look like - notice how the site address does not match the displayed page:
| ||||||||||||||||
|
Fraudulent email |
||||||||||||||||||||||||||||
|
Phishing Phishing involves an email message being sent out to as many internet email addresses as possible, claiming to come from a legitimate organization such as a bank, online payment service, online retailer, etc. The objective is to induce unsuspecting recipients, who happen to be customers of the legitimate organization being imitated, to respond to the email and to provide the information being requested. This information may include: date of birth, logon information, account details, credit card numbers, PIN numbers, etc. The email will contain a link that takes you to a spoof web site that looks identical, or at least very similar, to the organization’s genuine site (as shown above). In some cases, when the link in the email is clicked, the genuine site is accessed, but is overlaid with a smaller window with the spoof site, making it more believable. Clicking on a link may also download malicious software, known as spyware onto your PC which will record your use of the internet and forward this information, and possibly a log of your keystrokes, to the fraudster. The fraudsters will use this financial information to compromise bank accounts, credit cards, etc. Advance fee or “419 fraud” This involves unsolicited letters and e-mail messages offering the recipient a generous reward for helping to move large sums of money, usually in US dollars. These funds are said to be anything from corporate profits, accumulated bribes or unspent government funds to unclaimed money belonging to a deceased person. The fraudsters are trying to obtain your banking details. The transactions typically require the recipient of the letter or e-mail message to pay something like a fee/tax/bribe to complete the deal – this is the advance fee. However, any fees paid will be lost. Lottery fraud This involves letters or e-mail messages which advise the recipient that they have won a prize in a lottery. To obtain the funds, they are asked to respond to the letter or e-mail message. A request will then be made for the recipient to provide his bank account details to allow for funds to be transferred. The recipient may also be asked to pay a handling/processing fee. If paid, this fee will be lost. Also, any details given will probably be used to commit further fraud.
|
||||||||||||||||||||||||||||
|
Phishing mules |
||||
|
Once the fraudsters have collected financial information of individuals via phishing, they are then in a position to abuse this information and steal money from the compromised accounts. In order to cover their tracks, however, they recruit unsuspecting individuals to act as go betweens by placing a variety of tempting job adverts on the Internet promising the chance to earn money quickly without expending much effort. These recruits are known as mules. The bank accounts of the mules will be used to accept transfers of money from the compromised accounts. The mules will be asked to withdraw the money from their accounts in the form of cash and forward it, minus their commission, to the fraudsters using an international money transfer agency. The fraudsters can therefore maintain their anonymity, but there is a trail to the phishing mules, which can be followed by the authorities.
|
||||
|
Spyware |
||||||||||||||
|
It is a computer software program that gathers information about a computer user, in most cases without the user's knowledge or informed consent. It then transmits the collected information to a third party who can potentially manipulate the information.
|
||||||||||||||
|
Trojan Horse |
||||||||||
|
A type of computer virus that is a computer program masquerading as another program.
| ||||||||||
|
Keystroke capturing/logging |
||
|
Anything you type on a computer can be captured and stored. This can be done using a hardware device attached to your computer or by software running almost invisibly on the machine. Keystroke logging is often used by fraudsters to capture personal details including passwords. Some recent viruses are even capable of installing such software without the user's knowledge. |
||