Page 41 - Banking Finance March 2021
P. 41

ARTICLE

                                                              all files may contain malware. This includes .pdf, .jpg, .png,
                                                              .rar, .exe, etc. Therefore, be extremely cautious with
                                                              opening any  attachment that is suspicious. Hence, it is very
                                                              necessary that e-mails from unknown sources must not be
                                                              opened or forwarded and should be deleted and we should
                                                              be very skeptical of offers or messages where we need to
                                                              install or open something.

                                                              Besides, e-mails in the mail box should be kept to a bare
                                                              minimum, because storage, whether it is Google Drive or
                                                              official one has a limited storage space and the mails will
                                                              not be received after its capacity is full and the coming mails
                                                              will bounce bank and hence we may miss some of our
                                                              important e-mails due to this reason.
         connection is extremely unsafe until the standard safety
         precautions are not followed.                        Debit/ Credit Card Security:
                                                              In this tech savvy era, details of debit or credit card are  used
         E-mail Security:
                                                              in most  of the e-commerce transactions. So , it is very
         E-mail is the most effective means of communication in our  necessary to be very careful while using the details of debit/
         constantly evolving world of technology. It has become more  credit card in any of e-commerce sites / POS or while using
         versatile than any other form of communication and is  our debit card in any of the ATM. While using  debit card in
         popular for  personal information as well as for corporate  ATM, it is to be ensured by the users to check that any
         communication. We rely heavily on e-mail as a trusted  skimmers are not used in the ATM, through which details of
         channel for communication, but there is an increasing threat  the card can be copied and misused. Similarly for the bankers,
         of sensitive data loss  in today's world due to vulnerability  care should be taken that the ATMs are checked for skimmers
         to malicious e-mail attacks. It is very much important to take
                                                              now and then and CCTVs should always be in working mode
         proper security measures in e-mail for protecting our
                                                              so that if CCTV footage is required at any point of time for
         personal information as for hackers/crackers, e-mail is the
                                                              some disputed transaction, it is readily available.
         easiest way to gain access to sensitive personal information.
         They use the method of phishing, spear phishing, malware  Besides, the user should not give OTP / CVV / PIN to any
         delivery etc. for the same. A way to detect malicious e-mails  unknown person. A majority of the transactions are now-a-
         is through filters. Filters are designed to examine specific  days done through UPI and the fraudulent persons are often
         patterns and content items in an e-mail to recognize a  asking OTP and the users often give the OTP when asked
         message as spam or malware,including URLs, attachments,  for the same for receiving money by the fraudsters due to
         headers or message text. So, it is to be ensured that spam  being unaware of the fact that OTP is not required in case
         filters should be kept updated for effective e-mail security.  of receiving money but only at the time when account is to
                                                              be debited for any payment.
         Now-a-days, e-mails are exchanged for the purpose of
         transactions on e-commerce sites, education, trading etc.  Also, the CVV written on the back side of the card should
         Now phishing, spear phishing or spoofing e-mails are the  be memorised after receiving the card and then a small
         biggest threat for an individual or an organization because  opaque sticker should be pasted on it or it should be simply
         these mails may contain some malware or  link which may  erased  from the card.
         be clicked by a person and personal informationmay be given
         which may be misused for gaining unauthorized access to  The last, but not the least, if we feel that there is some
         the bank account.                                    phishing activity or some malware or virus has attacked our
                                                              system, it should be informed to the IT team of the
         Although .zip files may be the most common ones to carry  organization we are working in through phone or e-mail and
         malware and .pdf files are safest to open, but,  in principle,  there assistance should be taken. T

            BANKING FINANCE |                                                               MARCH | 2021 | 41
   36   37   38   39   40   41   42   43   44   45   46