- Home
- Transaction Security Tips
Transaction Security Tips at PermataNet
PermataNet Info
-
Make sure you access PermataNet through the official PermataNet website address at https://www.permatabank.com and click the LOGIN link.
-
Or you can access directly through the Login Page of PermataNet at https://new.permatanet.com
- To avoid mispelling of PermataNet site, add site to favorites or bookmarks for further quick access
-
Make sure there is a lock/key icon beside PermataNet url on top right to indicate full encryption. If the lock/key icon does not appear, log out immediately and report to PermataTel at 1500111
- Always double check PermataNet display before entering any token code for transacting
- Report to PermataTel if you find anything suspicious and unusual on PermataNet display
- Make sure to always log out your account everytime you need to leave it unattended
- Avoid accessing PermataNet using untrusted computer with low security, eg: in cafe or other public places
- Beware of attempts of fraud who claim to the bank officers /PermataBank officers through the telephone, fax, or email who ask for you personal data, including Internet Banking Password or Token PIN. PermataBank officers will never request or ask your Internet Banking Password or Token PIN.
- Change your password periodically. Avoid creating password with numbers that easily associated with you, such your birthday or phone number.
- Do not write your password and Mobile token PIN in a public place or sharing it to other people
- Do not input your password in untrusted computers
- Do not lend your Mobile Token or SMS Token to anyone
- Make sure to always delete Token code SMS after finishing you transaction at PermataNet"
Beware of Phising Threat!
Phishing is the fraud act of attempting to acquire information such as Login ID, Password, PIN/TIN, Token Code/Response Code and/or Email Address e.g. by:
- Building fake website whose look and feel is almost identical to the legitimate one
- Sending URL link to website that resembles the bank's official website containing promos, which is allegedly fake
- Masquerading as a trustworthy entity in an official electronic communication such as email and/or instant messages asking for login
- Disguising as a bank staff asking for the customer's data for a particular purpose.
Security Tips
- Make sure you access PermataNet through the official PermataNet website address at https://www.permatabank.com/ and click the LOGIN link. Or you can access directly through the Login Page of PermataNet at https://new.permatanet.com/
- To avoid mispelling of PermataNet site, add site to favorites or bookmarks for further quick access.
-
PermataBank will never request or ask you to access PermataNet other than through https://new.permatanet.com/ or ask for your User ID, Password, ATM PIN, Mobile Token PIN, Response Code SMS Token or other confidential information. Should you receive any of the suspicious email, please:
- Forward to care@permatabank.co.id or call PermataTel at 1500111.
- Do not reply email and delete immediately.
- Should you have already filled in the information requested or feel that your User ID and PIN have no longer been confidential, immediately contact PermataTel at 1500111 via mobile phone.
Beware of Virus, Spyware, Bot and Keylogger
Virus, Worm Trojan
Virus
Virus is a computer program that is generated with various intention. Generally, virus damages the operation system, application, and data in the infected computer. Virus occupies computer memory space (e.g. attached to files or boot sector hard disk) and generally spreads through USD flash disk, email attachments, downloaded files from the internet, or from visits to website pages which intendedly built to spread virus.
'Various instances of impacts from virus infection include:
- The computer becomes unstable and frequently "hang" (blocked).
- The computer becomes slow.
- The data in hard disk is damaged or sent to other parties through the network.
- The application program is not usable.
As for worm, it spreads through networks. Though generally worm does not bring damages like virus does, worm is mostly used to bring damages through attachment.
Trojan
Trojan in computer security system refers to suspicious softwares (malicious software/malware) that brings damages to system and network. Once infected the computer, Trojan can do damages like sending important information from target (password, user behavior recorded in log system, data, etc.) and control target (granted access from target)
-
SPYWARE
Spyware is a type of computer program created to "steal" important/personal information from an infected computer and send them to a particular location on the internet, to be afterwards taken by its creator. The information which considered the main target includes: credit card number, User ID and PIN/password, account number, e-mail address and so forth.
Spyware may be installed through e-mail attachment, the programs being installed from unclear sources or by "mean" website.
Virus can be programed to spread spyware. However, unlike virus which tend to bring damages, spyware works undiscovered to share more information to its creator/spyware spreader.
-
BOT (ROBOT)
Bot is a type of computer program which may cause your PC be remotely controlled by others through network. The Bot maker/spreader may do unlimited actions with your PC.
In general, the controlled PC is used to send Spam, Virus, Worm or attack other computers in the same network.
-
KEYLOGGER
Bot is a type of computer program which may cause your PC be remotely controlled by others through network. The Bot maker/spreader may do unlimited actions with your PC
This record will be directly stored in the computer and send through the internet to the data stealer. It can be through e-mail, irc, or even realtime observation through web.
Security Tips
- Use updated anti-virus in your computer and make sure that your computer is scanned at real-time.
- Delete suspicious email or email coming from an unknown sender. Always scan email attachment prior to opening.
- Use firewall on your computer and make sure that the configuration of the installed firewall is able to secure your computer.
- Make sure that you only download files from secure websites and scan downloaded files from the internet prior to using.
- Always scan your USB flash disk before using.
- Make sure that you are using both the most recent operation system and application in your computer.
Transaction Security Tips at PermataNet
PermataNet Info
-
Make sure you access PermataNet through the official PermataNet website address at https://www.permatabank.com and click the LOGIN link Personal Internet Banking-PermataNet
-
Or you can access directly through the Login Page of PermataNet at https://new.permatanet.com
- To avoid mispelling of PermataNet site, add site to favorites or bookmarks for further quick access.
-
Make sure there is a lock/key icon beside PermataNet url on top right to indicate full encryption. If the lock/key icon does not appear, log out immediately and report to PermataTel at 1500111
- Always double check PermataNet display before entering any token code for transacting.
- Report to PermataTel if you find anything suspicious and unusual on PermataNet display.
- Make sure to always log out your account everytime you need to leave it unattended.
- Avoid accessing PermataNet using untrusted computer with low security, eg: in cafe or other public places.
- Beware of attempts of fraud who claim to the bank officers /PermataBank officers through the telephone, fax, or email who ask for you personal data, including Internet Banking Password or Token PIN. PermataBank officers will never request or ask your Internet Banking Password or Token PIN.
- Change your password periodically. Avoid creating password with numbers that easily associated with you, such your birthday or phone number.
- Do not write your password and Mobile token PIN in a public place or sharing it to other people.
- Do not let others see you when typing passwords when logging in PermataNet and do not enter a password on the computer that is not reliable.
- Do not write your password and Mobile token PIN in a public place or sharing it to other people.
- Make sure that you have exit from Mobile Application Token after finished using Mobile Token and when leaving your cell.
- Make sure to always delete Token code SMS after finishing you transaction at PermataNet.
Beware of Phising Threat!
Phishing is the fraud act of attempting to acquire information such as Login ID, Password, PIN/TIN, Token Code/Response Code and/or Email Address e.g. by :
- Building fake website whose look and feel is almost identical to the legitimate one
- Sending URL link to website that resembles the bank's official website containing promos, which is allegedly fake.
- Masquerading as a trustworthy entity in an official electronic communication such as email and/or instant messages asking for login.
- Disguising as a bank staff asking for the customer's data for a particular purpose.
Security Tips
- Make sure you access PermataNet through the official PermataNet website address at https://www.permatabank.com/ nd click the LOGIN link. Or you can access directly through the Login Page of PermataNet https://new.permatanet.com/
- To avoid mispelling of PermataNet site, add site to favorites or bookmarks for further quick access.
-
PermataBank will never request or ask you to access PermataNet other than through https://new.permatanet.com/ or ask for your User ID, Password, ATM PIN, Mobile Token PIN, Response Code SMS Token or other confidential information. Should you receive any of the suspicious email:
- Mplease forward to permatacare@permatabank.co.id or call PermataTel at 1500111.
- Do not reply email and delete immediately.
- Should you have already filled in the information requested or feel that your User ID and PIN have no longer been confidential, immediately contact PermataTel at 1500111 via mobile phone.
Beware of Virus, Spyware, Bot and Keylogger
Virus, Worm Trojan
Virus
Virus is a computer program that is generated with various intention. Generally, virus damages the operation system, application, and data in the infected computer. Virus occupies computer memory space (e.g. attached to files or boot sector hard disk) and generally spreads through USD flash disk, email attachments, downloaded files from the internet, or from visits to website pages which intendedly built to spread virus.
Various instances of impacts from virus infection include:
- The computer becomes unstable and frequently "hang" (blocked).
- The computer becomes slow.
- The data in hard disk is damaged or sent to other parties through the network.
- The application program is not usable.
As for worm, it spreads through networks. Though generally worm does not bring damages like virus does, worm is mostly used to bring damages through attachment .
Trojan
Trojan in computer security system refers to suspicious softwares (malicious software/malware) that brings damages to system and network. Once infected the computer, Trojan can do damages like sending important information from target (password, user behavior recorded in log system, data, etc.) and control target (granted access from target).
-
SPYWARE
Spyware is a type of computer program created to "steal" important/personal information from an infected computer and send them to a particular location on the internet, to be afterwards taken by its creator. The information which considered the main target includes: credit card number, User ID and PIN/password, account number, e-mail address and so forth.
Spyware may be installed through e-mail attachment, the programs being installed from unclear sources or by "mean" website.
Virus can be programed to spread spyware. However, unlike virus which tend to bring damages, spyware works undiscovered to share more information to its creator/spyware spreader.
-
BOT (ROBOT)
Bot is a type of computer program which may cause your PC be remotely controlled by others through network. The Bot maker/spreader may do unlimited actions with your PC.
In general, the controlled PC is used to send Spam, Virus, Worm or attack other computers in the same network.
-
KEYLOGGER
Bot is a type of computer program which may cause your PC be remotely controlled by others through network. The Bot maker/spreader may do unlimited actions with your PC
This record will be directly stored in the computer and send through the internet to the data stealer. It can be through e-mail, irc, or even realtime observation through web
Security Tips
- Use updated anti-virus in your computer and make sure that your computer is scanned at real-time.
- Delete suspicious email or email coming from an unknown sender. Always scan email attachment prior to opening.
- Use firewall on your computer and make sure that the configuration of the installed firewall is able to secure your computer.
- Make sure that you only download files from secure websites and scan downloaded files from the internet prior to using.
- Always scan your USB flash disk before using.
- Make sure that you are using both the most recent operation system and application in your computer..
Sesi Berakhir
Untuk keamanan, tutup browser Anda dan Login Kembali