Nobody knows your account better than you. That’s why you should never share your card details, internet banking log in and token with anyone over the phone, SMS or email.
GTBank is continuously developing and implementing security enhancements to ensure the integrity of our Online Banking platform. Our goal is to protect your online safety, the confidentiality of our customer account and personal data. Learn more about protecting yourself online, how to spot fraudulent e-mails and Web sites.
You are the first and best layer of defense in combating online fraud. Learning to properly detect and avoid online scams is the ultimate protection against fraud. Read the tips below to help you spot potential scams.
Online fraud typically takes the form of fraudulent e-mails and Web sites. These forged means of communication often use corporate logos, colors and legal disclaimers to make them appear authentic.
Fraudulent e-mails are the most common avenue of online scams. A "spoofed" e-mail is one that purports to be from a reputable source in an attempt to trick you into divulging personal or account information, sending payment, or otherwise taking an action that will result in fraud. These attacks are common because they are low-tech and can be easily deployed on a massive scale. Even though the warning signs are there, "phishing" and scam e-mails continue to fool people. Some of these mails also request that customers update their account records by clicking on links to fake Internet banking and Interswitch websites.
Spoofed Web sites, like phishing e-mails, are used by fraudsters who build fake websites that look very similar to GTBank’s website to lure unsuspecting customers into submitting their online banking log-in information and card details which are later used to access such accounts. Spoof Web sites allow fraudsters to collect such sensitive information as Internet Banking Account and ATM Card Details.
GTBank will never ask a customer to provide, verify or update their personal, account or financial information via email or pop-up windows. This includes: Passwords, Personal Identification Numbers (PIN), or ATM, Credit or Debit Card numbers. If you receive an email requesting such information, do not respond and never click on a link contained in a suspicious email.
Phishing involves the use of fraudulent email or browser pop-up messages that appear to be from a legitimate source, often using a company name, logo and/or graphic. A typical scam consists of:
The intent is to trick you into divulging personal information, such as your account number, User ID or Password so they can commit crimes of a monetary nature or identity theft. It may also be an attempt to deliver and install malicious code (malware) that can harm your computer.
Occurs when you enter a Web address but are redirected, without your consent or knowledge, to a fraudulent site that looks similar to a legitimate site. The intent of the fraudulent site is to capture confidential information.
“Skimming“ is a method by which thieves capture the magnetic stripe data from your card and use it to create a new, counterfeit card. These counterfeit cards are then used to process unauthorized transactions against your account. There are two main methods of skimming card information:
A small device that appears to be a part of the machine is placed over the card insertion slot of an ATM, gas pump, or other self-service kiosk. As you slide your card into the ATM, this device “reads” the data on the stripe and either stores it or transmits it to a nearby location. Often times, there is also a small, hidden camera that captures your keystrokes as you input your PIN into the machine.