SlideShare a Scribd company logo
© 2015 Quick Heal Technologies Ltd.
WEBINAR
Top 7 Mobile
Banking Security
Tips
© 2015 Quick Heal Technologies Ltd.
India comes second on the list of
cyber attacks directed towards mobile
users. Most of these are phishing
attacks aimed at users’ banking
information (source: indiaexpress.com).
#FACT!
© 2015 Quick Heal Technologies Ltd.
In this webinar, we will
discuss:
© 2015 Quick Heal Technologies Ltd.
#1. The most common types of mobile
banking threats.
#2. Top 7 mobile banking security tips to
follow.
#3. How Quick Heal provides a safe and
secure mobile banking experience.
© 2015 Quick Heal Technologies Ltd.
#1.
The most common types of
mobile banking threats.
© 2015 Quick Heal Technologies Ltd.
#1.
FAKE
BANKING APPS
© 2015 Quick Heal Technologies Ltd.
Fake mobile banking apps can easily fool
the unsuspecting eye. They look genuine
and innocuous; but once inside the user
device, they can steal all types of banking
information.
#1.
© 2015 Quick Heal Technologies Ltd.
UNSECURED
WiFi
#2.
© 2015 Quick Heal Technologies Ltd.
Mobile banking on unsecured
WiFi networks can let hackers
intercept all your information like
user name, passwords,
credit/debit card number, etc.
#2.
© 2015 Quick Heal Technologies Ltd.
PHISHING
ATTACKS
#3.
© 2015 Quick Heal Technologies Ltd.
Mobile users can receive fake
emails, WhatsApp messages and
even SMSs containing links
redirecting them to fake
shopping or banking websites.
#3.
© 2015 Quick Heal Technologies Ltd.
MOBILE
MALWARE
#4.
© 2015 Quick Heal Technologies Ltd.
Malware specifically designed to target
mobile banking are increasing. They
mostly come in the form of third-party
apps or hidden in malicious spam emails.
#4.
© 2015 Quick Heal Technologies Ltd.
INFERIOR
SECURITY
#5.
© 2015 Quick Heal Technologies Ltd.
Even genuine banking apps have a
disadvantage – inferior security. Most
banking apps do not have multiple security
layers, which makes users vulnerable to
hackers.
#5.
© 2015 Quick Heal Technologies Ltd.
#2.
Top 7 mobile banking security tips
to follow.
© 2015 Quick Heal Technologies Ltd.
Always install banking apps (any
app, for that matter) only from
official stores such as Google
Play/App Store.
Tip #1
© 2015 Quick Heal Technologies Ltd.
Avoid using banking apps on
free, unsecured Wi-Fi networks
available in cafés, airports,
hotels, etc.
Tip #2
© 2015 Quick Heal Technologies Ltd.
Avoid clicking on links or
downloading attachments that
come with unexpected/unknown
emails or SMSs.
Tip #3
© 2015 Quick Heal Technologies Ltd.
Once done, always Log Out.
Avoid clicking on options like
‘Remember Me’ or ‘Keep me
logged in’.
Tip #4
© 2015 Quick Heal Technologies Ltd.
Never store banking
information like login
ID/Passwords, credit/debit
card number, its CVV number,
etc., on your phone.
Tip #5
© 2015 Quick Heal Technologies Ltd.
Secure your
phone with a
Password or PIN.
Tip #6
© 2015 Quick Heal Technologies Ltd.
Use a reliable
mobile security
app.
Tip #7
© 2015 Quick Heal Technologies Ltd.
Having a reliable mobile
security app will ensure that you
do not land on fake or malicious
websites designed to steal your
personal or banking information.
© 2015 Quick Heal Technologies Ltd.
#3.
How Quick Heal provides a
safe and secure mobile
banking experience
© 2015 Quick Heal Technologies Ltd.
Quick Heal Total Security for
Android protects you from
all types of mobile banking
threats, with these features:
© 2015 Quick Heal Technologies Ltd.
Blocks fake and phishing websites,
keeping your personal and
banking information safe.
Anti
Phishing
© 2015 Quick Heal Technologies Ltd.
Inspects every downloaded app
to ensure that is not harmful.
Background
Scan
© 2015 Quick Heal Technologies Ltd.
This helps you erase sensitive data
(like user ID and passwords, etc.)
securely so that it does not get
misused by malicious apps or
hackers.
Delete
Personal Data
© 2015 Quick Heal Technologies Ltd.
Blocks unwanted numbers,
reducing risks of phishing attacks
perpetrated via calls and SMSs.
Call &
Message Filter
© 2015 Quick Heal Technologies Ltd.
Helps identify apps (such as
banking apps) whose permissions
may affect your privacy.
Privacy
Adviser
© 2015 Quick Heal Technologies Ltd.
Write to us at:
CorporateCommunications@quickheal.co.in
Follow us on:
Facebook: www.facebook.com/quickhealav
Twitter: www.twitter.com/quickheal
Google Plus: bit.ly/QuickHealGooglePlus
YouTube: www.youtube.com/quickheal
SlideShare: http://www.slideshare.net/QuickHealPPTs
Visit us:
Website: www.quickheal.com
Official Blog: blogs.quickheal.com
Got any queries
regarding this webinar?
© 2015 Quick Heal Technologies Ltd.
Thank You!

More Related Content

What's hot

case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crime
Paras Kansagara
 
Mobile banking
Mobile bankingMobile banking
Mobile bankingDharmik
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
JASHU JASWANTH
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
MarketingArrowECS_CZ
 
Password Management
Password ManagementPassword Management
Password Management
Davon Smart
 
Mobile Banking
Mobile BankingMobile Banking
Mobile Banking
RAHUL KANEKAR
 
Mobile banking
Mobile bankingMobile banking
Mobile banking
Sagar Anand
 
Financial Services Digital Trends 2019
Financial Services Digital Trends 2019Financial Services Digital Trends 2019
Financial Services Digital Trends 2019
Carmelon Digital Marketing
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
Khawar Nehal khawar.nehal@atrc.net.pk
 
Internet banking - College Project
Internet banking - College ProjectInternet banking - College Project
Internet banking - College Project
Sheril Daniel
 
Threats of Public Wi-Fi
Threats of Public Wi-Fi Threats of Public Wi-Fi
Threats of Public Wi-Fi
The TNS Group
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
SysCloud
 
e-banking
e-bankinge-banking
e-banking
Anmol Marya
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
Geo Marian
 
Mobile banking
Mobile bankingMobile banking
Mobile banking
AMAR ID
 
Mobile banking
Mobile bankingMobile banking
Mobile banking
Manoj Karangoda
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
shindept123
 
A study of mobile banking in india
A study of mobile banking in indiaA study of mobile banking in india
A study of mobile banking in india
silky712
 
Cashless Transaction in India
Cashless Transaction in IndiaCashless Transaction in India
Cashless Transaction in India
SayanSil2
 
Online Banking PowerPoint Presentation Slides
Online Banking PowerPoint Presentation SlidesOnline Banking PowerPoint Presentation Slides
Online Banking PowerPoint Presentation Slides
SlideTeam
 

What's hot (20)

case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crime
 
Mobile banking
Mobile bankingMobile banking
Mobile banking
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Password Management
Password ManagementPassword Management
Password Management
 
Mobile Banking
Mobile BankingMobile Banking
Mobile Banking
 
Mobile banking
Mobile bankingMobile banking
Mobile banking
 
Financial Services Digital Trends 2019
Financial Services Digital Trends 2019Financial Services Digital Trends 2019
Financial Services Digital Trends 2019
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
Internet banking - College Project
Internet banking - College ProjectInternet banking - College Project
Internet banking - College Project
 
Threats of Public Wi-Fi
Threats of Public Wi-Fi Threats of Public Wi-Fi
Threats of Public Wi-Fi
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
e-banking
e-bankinge-banking
e-banking
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Mobile banking
Mobile bankingMobile banking
Mobile banking
 
Mobile banking
Mobile bankingMobile banking
Mobile banking
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
A study of mobile banking in india
A study of mobile banking in indiaA study of mobile banking in india
A study of mobile banking in india
 
Cashless Transaction in India
Cashless Transaction in IndiaCashless Transaction in India
Cashless Transaction in India
 
Online Banking PowerPoint Presentation Slides
Online Banking PowerPoint Presentation SlidesOnline Banking PowerPoint Presentation Slides
Online Banking PowerPoint Presentation Slides
 

Similar to Top 7 Mobile Banking Security Tips

10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow
Quick Heal Technologies Ltd.
 
6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi
Quick Heal Technologies Ltd.
 
5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.com5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.com
jackpot201
 
5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus
Quick Heal Technologies Ltd.
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
IBM Security
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
VISTA InfoSec
 
The Importance of Mobile App Security
The Importance of Mobile App SecurityThe Importance of Mobile App Security
The Importance of Mobile App Security
Oprim Solutions
 
How to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfHow to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdf
OZONESOFT Solutions
 
30 Killer Internet Security Tips
30 Killer Internet Security Tips30 Killer Internet Security Tips
30 Killer Internet Security Tips
Quick Heal Technologies Ltd.
 
How much should you reveal on social media
How much should you reveal on social mediaHow much should you reveal on social media
How much should you reveal on social media
Quick Heal Technologies Ltd.
 
3 ways to lose your identity in the mobile world
3 ways to lose your identity in the mobile world3 ways to lose your identity in the mobile world
3 ways to lose your identity in the mobile world
PaladionNetworks01
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
mateenzero
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
IBM Security
 
Mobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdfMobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdf
GMATechnologies1
 
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
Data Con LA
 
Why are Software Updates so Important for your Security
Why are Software Updates so Important for your SecurityWhy are Software Updates so Important for your Security
Why are Software Updates so Important for your Security
Quick Heal Technologies Ltd.
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM Security
 
Mobile banking issues in banking and insurance
Mobile banking issues in banking and insuranceMobile banking issues in banking and insurance
Mobile banking issues in banking and insurance
Kumarrebal
 

Similar to Top 7 Mobile Banking Security Tips (20)

10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow
 
6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi
 
5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.com5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.com
 
5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
The Importance of Mobile App Security
The Importance of Mobile App SecurityThe Importance of Mobile App Security
The Importance of Mobile App Security
 
How to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfHow to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdf
 
30 Killer Internet Security Tips
30 Killer Internet Security Tips30 Killer Internet Security Tips
30 Killer Internet Security Tips
 
How much should you reveal on social media
How much should you reveal on social mediaHow much should you reveal on social media
How much should you reveal on social media
 
3 ways to lose your identity in the mobile world
3 ways to lose your identity in the mobile world3 ways to lose your identity in the mobile world
3 ways to lose your identity in the mobile world
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 
Mobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdfMobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdf
 
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
 
Why are Software Updates so Important for your Security
Why are Software Updates so Important for your SecurityWhy are Software Updates so Important for your Security
Why are Software Updates so Important for your Security
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
 
Mobile banking issues in banking and insurance
Mobile banking issues in banking and insuranceMobile banking issues in banking and insurance
Mobile banking issues in banking and insurance
 
Avoiding Bad URL's In the Mobile Web
Avoiding Bad URL's In the Mobile WebAvoiding Bad URL's In the Mobile Web
Avoiding Bad URL's In the Mobile Web
 

More from Quick Heal Technologies Ltd.

Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
Quick Heal Technologies Ltd.
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
Quick Heal Technologies Ltd.
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
Quick Heal Technologies Ltd.
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]
Quick Heal Technologies Ltd.
 
Next-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway Protection
Quick Heal Technologies Ltd.
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Quick Heal Technologies Ltd.
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
Quick Heal Technologies Ltd.
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Quick Heal Technologies Ltd.
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
Quick Heal Technologies Ltd.
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
Quick Heal Technologies Ltd.
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
Quick Heal Technologies Ltd.
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
Quick Heal Technologies Ltd.
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Quick Heal Technologies Ltd.
 
Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016
Quick Heal Technologies Ltd.
 
Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016 Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016
Quick Heal Technologies Ltd.
 
Seqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, IndiaSeqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, India
Quick Heal Technologies Ltd.
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.
Quick Heal Technologies Ltd.
 
BFSI Leadership Summit, Mumbai
BFSI Leadership Summit, MumbaiBFSI Leadership Summit, Mumbai
BFSI Leadership Summit, Mumbai
Quick Heal Technologies Ltd.
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
Quick Heal Technologies Ltd.
 

More from Quick Heal Technologies Ltd. (20)

Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]
 
Next-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway Protection
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
 
Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016
 
Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016 Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016
 
Seqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, IndiaSeqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, India
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.
 
BFSI Leadership Summit, Mumbai
BFSI Leadership Summit, MumbaiBFSI Leadership Summit, Mumbai
BFSI Leadership Summit, Mumbai
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
 

Recently uploaded

Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
Roshan Dwivedi
 

Recently uploaded (20)

Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
 

Top 7 Mobile Banking Security Tips

  • 1. © 2015 Quick Heal Technologies Ltd. WEBINAR Top 7 Mobile Banking Security Tips
  • 2. © 2015 Quick Heal Technologies Ltd. India comes second on the list of cyber attacks directed towards mobile users. Most of these are phishing attacks aimed at users’ banking information (source: indiaexpress.com). #FACT!
  • 3. © 2015 Quick Heal Technologies Ltd. In this webinar, we will discuss:
  • 4. © 2015 Quick Heal Technologies Ltd. #1. The most common types of mobile banking threats. #2. Top 7 mobile banking security tips to follow. #3. How Quick Heal provides a safe and secure mobile banking experience.
  • 5. © 2015 Quick Heal Technologies Ltd. #1. The most common types of mobile banking threats.
  • 6. © 2015 Quick Heal Technologies Ltd. #1. FAKE BANKING APPS
  • 7. © 2015 Quick Heal Technologies Ltd. Fake mobile banking apps can easily fool the unsuspecting eye. They look genuine and innocuous; but once inside the user device, they can steal all types of banking information. #1.
  • 8. © 2015 Quick Heal Technologies Ltd. UNSECURED WiFi #2.
  • 9. © 2015 Quick Heal Technologies Ltd. Mobile banking on unsecured WiFi networks can let hackers intercept all your information like user name, passwords, credit/debit card number, etc. #2.
  • 10. © 2015 Quick Heal Technologies Ltd. PHISHING ATTACKS #3.
  • 11. © 2015 Quick Heal Technologies Ltd. Mobile users can receive fake emails, WhatsApp messages and even SMSs containing links redirecting them to fake shopping or banking websites. #3.
  • 12. © 2015 Quick Heal Technologies Ltd. MOBILE MALWARE #4.
  • 13. © 2015 Quick Heal Technologies Ltd. Malware specifically designed to target mobile banking are increasing. They mostly come in the form of third-party apps or hidden in malicious spam emails. #4.
  • 14. © 2015 Quick Heal Technologies Ltd. INFERIOR SECURITY #5.
  • 15. © 2015 Quick Heal Technologies Ltd. Even genuine banking apps have a disadvantage – inferior security. Most banking apps do not have multiple security layers, which makes users vulnerable to hackers. #5.
  • 16. © 2015 Quick Heal Technologies Ltd. #2. Top 7 mobile banking security tips to follow.
  • 17. © 2015 Quick Heal Technologies Ltd. Always install banking apps (any app, for that matter) only from official stores such as Google Play/App Store. Tip #1
  • 18. © 2015 Quick Heal Technologies Ltd. Avoid using banking apps on free, unsecured Wi-Fi networks available in cafés, airports, hotels, etc. Tip #2
  • 19. © 2015 Quick Heal Technologies Ltd. Avoid clicking on links or downloading attachments that come with unexpected/unknown emails or SMSs. Tip #3
  • 20. © 2015 Quick Heal Technologies Ltd. Once done, always Log Out. Avoid clicking on options like ‘Remember Me’ or ‘Keep me logged in’. Tip #4
  • 21. © 2015 Quick Heal Technologies Ltd. Never store banking information like login ID/Passwords, credit/debit card number, its CVV number, etc., on your phone. Tip #5
  • 22. © 2015 Quick Heal Technologies Ltd. Secure your phone with a Password or PIN. Tip #6
  • 23. © 2015 Quick Heal Technologies Ltd. Use a reliable mobile security app. Tip #7
  • 24. © 2015 Quick Heal Technologies Ltd. Having a reliable mobile security app will ensure that you do not land on fake or malicious websites designed to steal your personal or banking information.
  • 25. © 2015 Quick Heal Technologies Ltd. #3. How Quick Heal provides a safe and secure mobile banking experience
  • 26. © 2015 Quick Heal Technologies Ltd. Quick Heal Total Security for Android protects you from all types of mobile banking threats, with these features:
  • 27. © 2015 Quick Heal Technologies Ltd. Blocks fake and phishing websites, keeping your personal and banking information safe. Anti Phishing
  • 28. © 2015 Quick Heal Technologies Ltd. Inspects every downloaded app to ensure that is not harmful. Background Scan
  • 29. © 2015 Quick Heal Technologies Ltd. This helps you erase sensitive data (like user ID and passwords, etc.) securely so that it does not get misused by malicious apps or hackers. Delete Personal Data
  • 30. © 2015 Quick Heal Technologies Ltd. Blocks unwanted numbers, reducing risks of phishing attacks perpetrated via calls and SMSs. Call & Message Filter
  • 31. © 2015 Quick Heal Technologies Ltd. Helps identify apps (such as banking apps) whose permissions may affect your privacy. Privacy Adviser
  • 32. © 2015 Quick Heal Technologies Ltd. Write to us at: CorporateCommunications@quickheal.co.in Follow us on: Facebook: www.facebook.com/quickhealav Twitter: www.twitter.com/quickheal Google Plus: bit.ly/QuickHealGooglePlus YouTube: www.youtube.com/quickheal SlideShare: http://www.slideshare.net/QuickHealPPTs Visit us: Website: www.quickheal.com Official Blog: blogs.quickheal.com Got any queries regarding this webinar?
  • 33. © 2015 Quick Heal Technologies Ltd. Thank You!