The technology used by cyber criminals more and more sophisticated as well. No doubt, the banks must have a strong security system to block it. However, to avoid this crime also required an active role customer. Check out 6 tips to banish the piercing action this account according to M. Salahuddien, Vice Chairman of the Indonesia Security Incident Responses Team on Internet Infrastructure (ID-SIRTII):
Games online download game gratis Cipto junaedy penipu Tips cepat hamil puisi cinta romantis Cipto junaedy penipu Blackberry Games memasak
1. Use only the chip card
If your bank has not given a chip card, you can ask for a change and do not use a transaction before it is replaced. Rules of Bank Indonesia (BI) is new, since January 2010 the official card and may be used only kind of chip cards.
2. Protect the 3 digit code (CVV2) on the back of your card.
Except for the authorization of online transactions, the code will never be used for conventional transactions at ATM machines, on counters or EDC merchant. Close the 3 numbers on the back of the card with stickers, tape anything that is not transparent
3. Change your PIN as often as possible. Momen
Simple parameters, when you shave hair, change socks (because start smell), or replace the toothbrush (because it was starting to wrinkle) or whenever a vehicle tire checks, it is time to replace your ATM card PIN. For example, at a gas station, usually there is now an ATM machine, you can change the PIN when it is the purchase of fuel.
4. Never give personal information and data pins used for banking authorization to anyone for any reason, including the bank's customer service.
5. Be careful when you receive an offer from telemarketing like that, because usually you give consent will be interpreted as a willingness to do auto debit to your account. pelukanku
6. Keep an eye on where your card at the counter when the merchant
Do not let the card be taken anywhere and is swiped into a different engine multiple times. You better cancel the transaction and not have to sign anything and report to the issuing bank when the suspect with the conditions in a counter merchant.
Keep an eye on the condition of the EDC also, if there appears enhancements or additional cable connections are suspicious. But this need technical understanding, a novice user would normally be difficult to distinguish.
We must remember, so we swipe the card, then all important information will be recorded by the EDC and partly even in print. Such as name, card number and expiration date (start date sometimes use). Game online Download game Cipto junaedy Cara cepat hamil Puisi cinta Cipto junaedy Harga Blackberry Permainan memasak
A person does not need to have a super memory to memorize a row of numeric code printed on the card. If you are careless enough time offender can be used to record the information (thrasing). In fact they can be both mutual cooperation for example, one person deliberately distract you and the only one who took note cards or even swiping your card into a skimming machine which is not visible. Home security systems Kata Mutiara Margahayuland
Game online Download game Cipto junaedy Cara cepat hamil Puisi cinta Cipto junaedy Harga Blackberry Permainan memasak