Your mobile

Smart phones are a great temptation for swindlers. A telephone is no longer only a calling device. We send authorisation SMSs to your mobile and many people control their bank accounts from their mobile. Attackers are well aware of that and they are able to prompt you, even using the bank's name, to download an application. Do not give attackers any chance and behave towards your mobile in a manner which ensures that it remains only under your control!

  • 1.

    Install only verified applications from official sources (Google Play, Apple Store, Windows Phone Store). These applications are checked and safe.

  • 2.

    Never install any applications from unknown sources on telephones with an Android operation system. If anybody asks you to do so, it is probably an attempt to smuggle malware into your mobile.

  • 3.

    Do not interfere with your mobile's software. If you make a so-called root or jailbreak on your mobile, you will significantly weaken its security protection.

  • 4.

    Update your mobile. If your telephone informs you that updates are available, do not hesitate and download the updates as soon as possible. This is because the updates may also include security patches. Non-updated telephone may be a source of viruses.

  • 5.

    Lock your mobile. Lock your display. If you leave your mobile unattended, you will reduce the risk that an intruder can make use of your inattention and misuse your mobile.

  • 6.

    Pay attention to SMSs from unknown numbers. SMSs can also contain links to websites which could lure you into divulging personal data. It is only another form of phishing.

  • 7.

    Antivirus for mobile phones. There are many reliable antivirus software applications for mobile phones. Download from an official source an application which will protect your mobile from all kinds of threats.

  • 8.

    Remote deletion of a smartphone. If you lose your mobile or somebody steals it from you, you have an option to set your mobile back to factory settings and an unauthorised person cannot access your personal data. If your attempt to delete your mobile remotely, make sure you change your passwords for all services you used.

  • 9.

    Set PIN also to SIM card. In the case of loss or theft of your mobile, you will prevent the "finder" from using services on your account. Immediate blocking of your SIM card with your operator is a matter of course.

  • 10.

    Do not record your password or PIN anywhere. If you write your password or PIN into your mobile, and it is stolen, you risk that a thief will find the data and misuse it.

Overview of threats

Beware also of phone calls. Swindlers sometimes act as an operator calling from a card centre who urgently wants to verify a transaction made via your payment card. For this they, naturally, need to "verify" your payment card data, such as your PIN.

What to do:

Bank employees never ask for sensitive data via e‑mail or telephone. If you are contacted by a person asking for sensitive data, it is probably a swindler. Do not waste your time and hang up.

What to do if...

...I want my mobile phone secured?

Lock your display, set the PIN for access to the mobile phone. If possible, turn off bluetooth. Prohibit options regarding the installation of applications from unknown sources and use solely official application markets (App Store, Google Play, Windows Phone Store). Antivirus software or applications which may block the device in the case of loss are available also for mobile devices. Get them.

...I've lost the mobile phone to which I receive authorisation SMSs?

Contact the Client Helpline for direct banking +420 0800 118 100, ask them to block access to internet banking. Afterwards you should visit the branch office of Komerční banka and ask for a new certificate for which we will set a new telephone number for you.

...I do not understand the term of malware?

Malware is a general name for malicious software. It includes viruses, Trojan horses and other software which run functions unwanted by the user. These may include, for example, software applications which record clicks, applications that display unwanted advertisements etc. However, the applications which redirect you to fake websites with a goal to lure personal and sensitive data out of you are among the most dangerous malware.