Citizen case Carlos Porto, who would be affected by robberies on two of his bank accounts, from different banks, Through the transmission, it warns about the risks of cybercrime and the need to apply cyber security standards, both by banks and by clients.

Currently, according to the testimony of the injured party, The case is being investigated, both by the financial entities where the problem occurred, and by the Prosecutor’s Office. However, there are many concerns that citizens can retain when performing their digital transactions.

Association of Private Banks of Ecuador (Assobanca) explains that – although banks are working hard and investing in security and technology to protect their customers – it is important for customers to be extremely careful with issues such as passwords, users, received messages and mobile phone theft.

Report a change of telephone line if the cell phone is stolen

When mobile phones are stolen, there are people who change their phone number with a new chip, but do not report the change of phone line. When that happens, there are criminals who hijack and use the number or old line of the affected and with the help of social intelligence tools, they manage to make fraudulent transactions. This method is known as sim replacement.

The mobile phone is an instrument for authentication of users of electronic banking, and if this device is stolen, It is important that the client informs the bank about the change in phone number so that the bank does not continue to send authentication messages to that phone line after the theft of the mobile phone.

Do not write down passwords or data on the mobile phone

Password and user data must not be written down or shared with third parties, It is also not recommended to send this information via Whatsapp direct messages or register in applications such as pad cell phone notes.

Another important tip is to implement a security key to keep the mobile phone locked. Today, smartphones have mechanisms for facial recognition, pattern drawing, among others.

Asobanca points to that with an authentication code (known as OTP) usually sent via SMS or by e-mail when a person tries to access an account through digital channels or perform electronic transactions, to access mobile banking the client is always required to enter an authentication mechanism that only that person (account owner) should know, such as a username and personal password or password.

Financial institutions apply other verification factors such as secret questions, biometric factors and even a two-factor authentication factor through applications for this purpose (Microsoft Authenticator, Google Authenticator, among others).

Another mechanism for committing cyber crime is ‘phishing’, which consists of tricking people into sharing personal information such as passwords and credit card numbers through fake emails, which impersonate the sender.

Do not click on suspicious links

Never since click about links (links) that seem unreliable with amazing news, entertainment, contests that seem easy to win, lotteries for visas to other countries, news about football or other sports or the like. giving click Spyware (malware or Trojans) could be installed into the operating systems of electronic devices, such as computers or mobile phones, which allow cybercriminals to obtain keys every time a customer types them into their computer or mobile phone.

These days, Asobanca is conducting a cyber security campaign in which the central message is that “your security is your responsibility”, because in addition to the efforts banks make to have highly secure digital platforms, it is important for clients to avoid falling victim to cybercriminal fraud by protecting themselves and their data.

Transfers have limitations

Meanwhile, when transfers of large values ​​are to be made, the bank itself sets limits. So, for example, from inquiries in some banks, transfers over it on the line Up to $15,000 can be earned. If this value is exceeded, it can be done in person, at the counter, but by filling out forms in which the recipient’s data and the subject of the transaction are attached. This can be done with the help of customer service.