Internet Banking Security Tips

  

Safety Tips for Transaction

  • Make sure you are login in the correct page (https://ib.bri.co.id). Check the security (pic of locked padlock) to ensure your transactions on the website are correct. These markers will provide actual information of the website owner.
  • Never open Internet Banking BRI page using the link sent by mail, email, sms or other media on behalf of BRI.
  • Always keep the confidentiality of the user id, password, and your mTOKEN. Never give or entering data into an application program that is not reliable, and immediately remove remaining mTOKEN that is not used anymore
  • Never use the option "save password" in the browser which security is not reliable.
  • never give your user id, password and mTOKEN to the party on behalf of BRI, through any medium, such as a letter, email, sms or phone.
  • Periodically change the password and do not use a combination that is predictable, such as name and date of birth.
  • Make sure you transact using a secure computer media, not from a public or other media that transaction security is not guaranteed.
  • After the transaction, immediately remove your transaction history using clear cache option that is available after you logout.
  • Make sure you have antivirus software up-to-date and firewalls always active on your computer or mobile phone to avoid interference of irresponsible parties.
  • Immediately call Call BRI at 14 017 or (021) 5000-17 if you notice any discrepancy or difference in your transaction process flow.

Type of Cybercrime

  • Phishing, is one attempt to obtain confidential information of others, where further information will be used for other purposes in the name of the original owner.
  • Examples of phishing is the Customer login in the page that resembles official site of bank, where the Customer is instructed to enter a userid and password. After that, the flow of the transaction will change unlike the usual flow, where Customers are asked to enter the authentication code for verification. At that time, the Customer data is already recorded and the other party has been able to conduct financial transactions on behalf of Customer.
  • Malware (malicious software) is an application (software) that was created to look for weaknesses of the computer which then can control the computer's operating system.
  • The most frequent example of malware we see everyday are viruses and worms that would destroy or hide the data on the computer. In addition there is also a key logger which is a way that can record the user typing activity, the model can be either software or hardware, in order to capture a variety of information, including a user ID or password