Just as it is natural for us to lock our doors when we leave our homes, it should be natural for us to protect our phones and computers in the same way, where we have access to various applications, bank accounts, email, and so on, but also for private photos and communication with friends and loved ones.
Here are some easy ways to protect yourself from hackers and other risks.
General security principles
- Always keep your phone's screen locked. This way, you protect yourself not just if you lose or steal your phone, but also if another unwanted person has access to it.
It is best to use biometric locking, a strong password, or a touch gesture for security (however, do not use passwords like 1234 or a Z-shaped touch gesture). Similarly, safeguard your computer with a strong password or, if your device supports it, biometrics.
- Check what permissions the application requires before downloading it (for example, an application for editing photos does not need SMS message permission).
- Do not download suspicious files or visit suspicious websites.
- When communicating via email, do not open messages from unknown senders. In any case, avoid clicking on suspect links and downloading suspect attachments.
- Protect your access data (for applications, bank accounts, phones, etc.) and do not share it with anyone.
- Use antivirus software to keep your devices safe.
You can find information about ensuring security in our application here
How to follow the principles when connecting a bank:
- Follow our account connection procedures here
- If possible, consider a PSD2 connection; further information may be found here
- When connecting an account, follow general security principles (for example, make sure you are in a quiet environment where no one can see the data you enter in the application. Do not disclose your personal information to anyone else.)
- Once you are redirected to your bank, you must give your bank permission to share data with our application. Banks often use the MFA method for identity verification; further information is available here. Each bank is different, and each bank will require a different process to verify your identity and grant consent, so once redirected to your bank, follow the instructions displayed by your bank.
Cybersecurity: How To Protect Yourself From Phishing - Here