How can I protect myself if I choose not to use 2FA when trading on POEMS?

You should observe the following practices to secure the confidentiality and integrity of your password and PIN (for funds transfer), security tokens, personal details and other confidential data as far as possible. These will help to prevent unauthorised transactions and fraudulent use of your accounts and make sure that no one else would be able to observe or steal your access credentials or other security information to impersonate them or obtain unauthorised access to your online accounts:

You should:
(a) Take the following precautions to secure your PIN and password (“credentials”);

  • Credentials should be at least 8 characters of alphanumeric mix;
  • Credentials should not be based on guessable information such as user-id, personal telephone number, birthday or other personal information;
  • Credentials should be kept confidential and not be divulged to anyone;
  • Credentials should be memorised and not be recorded anywhere;
  • Credentials should be changed regularly or when there is any suspicion that it has been compromised or impaired; and
  • The same PIN should not be used for different websites, applications or services, particularly when they related to different entities,

(b) Not select the browser option for storing or retaining user name and password
(c) Check the authenticity of our website by comparing the URL and our name in its digital certificate or by observing the indicators provided by an extended validation certificate;
(d) Check that the website address changes from ‘http://’ to ‘https://’ and a security icon that looks like a lock or key appears when authentication and encryption is expected;
(e) Check your account information, balance and transactions frequently and report any discrepancy;
(f) Install anti-virus, anti-spyware and firewall software in your personal computers and mobile devices;
(g) Update operation system, virus and firewall products with security patches or newer versions on a regular basis;
(h) Remove file and printer sharing in computers, especially when they are connected to the internet;
(i) Make regular backup of critical data;
(j) Consider the use of encryption technology to protect highly sensitive or confidential information;
(k) Log off each and every online session;
(l) Clear browser cache after each and every online session;
(m) Not install software or run programs of unknown origin;
(n) Delete junk or chain emails;
(o) Not open email attachments from strangers;
(p) Not disclose personal, financial or credit card information to little-known or suspect websites;
(q) Not use a computer or a device which cannot be trusted; and
(r) Not use public or internet café computers to access online services or perform financial transactions.

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...