Listening...
We recognize that information assets must be protected from unauthorized use, disclosure, modification, damage and loss because it has a significant impact on the delivery of services.
Information is a critical asset for HBL. We recognize that information assets must be protected from unauthorized use, disclosure, modification, damage and loss because it has a significant impact on the delivery of services.
The security threat landscape changes constantly, with malicious hackers developing new ways to compromise your systems. It is important to keep your information safe from strangers/criminals who could potentially harm your financial well-being and reputation. Enhancing information security awareness will defend against some of the most common types of attacks.
Phishing is an illegal attempt to acquire sensitive information. It is done for malicious reasons by impersonating a trustworthy entity in an electronic communication, where you receive an email from a scam artist attempting to obtain your sensitive information such as your password, National ID Card number, date of birth, credit card information and/or bank account information. You can avoid this type of scam by taking following measures:
Mobile computing refers to a variety of devices that allow people to access data and information from wherever they are. Information security is especially important for people who work remotely. Following are the precautionary measures for secured mobile computing:
Card Skimming is an illegal way of capturing banking card details from the magnetic strip on the back of an ATM and Debit/Credit Card. Look at the ATM Machine carefully before you put your card inside the machine. A few of the warning signs are listed here:
There are various ways to reduce card skimming risks. Few of them are listed below:
Non-digital data means a physical representation of information including but not limited to photocopies, printed papers, hand written notes and verbal communication, which are not readable on a computer and/or similar devices. Attackers can also retrieve necessary data from the trash etc. where you dump your expired or blocked Credit/Debit card, statement of accounts, credit card statements, CNIC copy, blocked cheque books etc. Therefore, it is important to dispose off your confidential documents securely so that no one can misuse your confidential data. You can view Secure Practices - Pakistan Banks’ Association (PBA) video here