IDBank says special subdivisions are operating in the banks and payment systems to ensure information and financial security of customers and huge investments are being made. Why? Because it is no longer fashionable to steal money stored under the pillow or in a hidden corner in the closet; nowadays there are more fashionable and effective methods which, however, will never come true if our society is informed. What measures do counterfeiters now use to extort money from bank cards or payment systems? In order to receive answers to the questions, IDBank presented an interview with Armen Kirakosyan, Head of Information Security Unit of the bank. - Mr. Kirakosyan, we keep on talking about the fact that counterfeiters can extort money from people's accounts. Finally, what are the cases known, how are the thefts of the 21st century happening and what do your customers, users need to know in order to be protected? - Information Technologies are evolving, same do hackers who are seeking for new ways to hack systems or steal certain data, and the most important values of the 21th century are time and data. Since the RA banking system is one of the most protected ones and we apply measures that meet all the global IS standards, in other words we do our best to have a stable, reliable and protected system, I would like to focus on cases when people become victims of deception without even imagining that by providing their personal data they, so to say, give the key to their house to a stranger. Let me describe a couple of cases: 1. Counterfeiters open up false branches of the bank, which, by the way, can bear a name and a logo barely differing from the bank’s real name and logo, take out a loan through the real online banking on behalf of the client, but give the client, let’s say, 70-80% of the received amount. But the client bears the burden of the whole loan amount, doesn’t he? Now, it is very important to understand that no one can apply for an online loan on your behalf unless your personal data becomes known to him/her in this or that way. 2. Counterfeiters visit people's apartments, register their data under the name of a charitable initiative, register them in the bank’s mobile application with their phone number, even take photos on the spot, go through identification and again apply for a loan on behalf of those people; in this case the real borrower does not receive a cent, the counterfeiters just leave the apartment only after transferring the whole loan amount to their account. In other words, people provide their smartphones and personal data to strangers. 3. Counterfeiters contact users by phone or social networks and say, for example, that a draw is planned to be conducted and that a certain amount will be transferred to their account in case if they win. Under that pretext, they, again, register people in the mobile application of the bank, perform the abovementioned actions. Of course, no draw is being conducted, moreover, people earn a loan burden about which they have no idea until after a certain period when they receive a notification from the bank about making a payment and if no payment is made they appear on the blacklist. 4. There are cases in the social networks as well when users receive messages from their friends’ hacked accounts and are being asked to make an urgent money transfer. This is another form of deception. In fact, there are many options since, as I have already mentioned, counterfeiters seem to have plenty of imagination and risk, however the “Informed means protected” principle can definitely protect us. - How can citizens protect themselves in the cases that you mentioned? - In the 21st century a lot of life processes happen with the application of new technologies. Therefore, not only in the abovementioned but also in many other cases in life in various processes, in general, the adherence to the basic information security hygiene rules can help us, you only have to: • Not provide the bank code, password, PIN code, bank application password, code etc. to anyone, even to your close relatives. Remember, that all these are the keys to your apartment. • Not allow anyone to perform any actions with your phone, especially download an application, take a picture of yourself or your documents etc. A smartphone is an important carrier of information nowadays and it must be protected with a password. • Apply for a loan only in person and only to the bank by personally downloading the Idram&IDBank mobile application, going through remote identification in person and applying for a loan in person or do all the same by visiting the branches of the bank the addresses of which can be found on the bank’s official website. • Find out about the draws held by the bank or Idram company only through the official channels of communication of the companies such as the official website, social networks, e-mail etc. In case of receiving suspicious letters, check their authenticity by calling the bank or Idram. • In case of receiving a request from your close friends through the social network about transferring money, make sure you check the information by calling your friend to find out whether or not it was really your friend who sent the request or his/her page has been hacked. You can endlessly mention such useful tips; however, it is important to use the 21st century’s most effective way to verify the authenticity of information: doubt, compare, check. By the way, IDBank has launched an information campaign and you can find various videos on our social media pages which describe this or that case of falsification and advise how to deal with them. So, follow us on the social media pages and stay informed and protected. Companies are controlled by CBA. Tweet Views 9199