The most important tips for online banking
The number of participants in online banking is growing, and is enjoying increasing enthusiasm.
In the year 2018, 50% of Germans now have online access to their checking account. Nevertheless, on closer examination, the proportion has grown by only about 5% in the past 5 years. The reasons for this are among others, often the recurrent reports about security vulnerabilities, or stolen records. Of course, this does not necessarily create trust among customers.
In part, however, it is also the case that the users even by ignorance, or negligence, your data in the hands of scammers, or at least make it easy. In our article, we would like to point out the most important points from our point of view, so that you can do your money conveniently and, above all, safely from home.
The most important tips for online banking
The number of participants in online banking is growing, and is enjoying increasing enthusiasm.
In the year 2018, 50% of Germans now have online access to their checking account. Nevertheless, on closer examination, the proportion has grown by only about 5% in the past 5 years. The reasons for this are among others, often the recurrent reports about security vulnerabilities, or stolen records. Of course, this does not necessarily create trust among customers.
In part, however, it is also the case that the users even by ignorance, or negligence, your data in the hands of scammers, or at least make it easy. In our article, we would like to point out the most important points from our point of view, so that you can do your money conveniently and, above all, safely from home.
1. Overview of the TAN procedure
1. Overview of the TAN procedure
After many attempts by the banks, the following procedures have now been established:
Although there are other methods, but basically it is as you have already noticed, always about as safe as possible to create a TAN or transfer.
After many attempts by the banks, the following procedures have now been established:
Although there are other methods, but basically it is as you have already noticed, always about as safe as possible to create a TAN or transfer.
2. Browser security in online banking
2. Browser security in online banking
Regardless of which of the above methods you use, they all presuppose that the entire chain of the components involved is protected.
And that includes the security of the PC and the browser used.
Note:
A good alternative to the standard browsers especially for online banking, but also for transactions via PayPal and other financial service providers offers the premium anti-virus software Bitdefender
This browser is specially secured by the attached anti-virus software to a high degree, and is absolutely recommendable from personal experience.
Regardless of which of the above methods you use, they all presuppose that the entire chain of the components involved is protected.
And that includes the security of the PC and the browser used.
Note:
A good alternative to the standard browsers especially for online banking, but also for transactions via PayPal and other financial service providers offers the premium anti-virus software Bitdefender
This browser is specially secured by the attached anti-virus software to a high degree, and is absolutely recommendable from personal experience.
3. Password security for online banking
3. Password security for online banking
Of course, all technical safety measures are useless if it fails the easiest. Namely the secure password.
Here we recommend that you think up a whole sentence that you may associate with personal events. And you should then change this as far as the e.g. every 2nd letter is capitalized, or the letter E is replaced by a 3.
You could then use special characters such as / or% between the words.
Basically, the more complex a password is, the better.
If you do not want to think of anything, you can also create an Online Password Generator. But it is better that you think your own.
Of course, all technical safety measures are useless if it fails the easiest. Namely the secure password.
Here we recommend that you think up a whole sentence that you may associate with personal events. And you should then change this as far as the e.g. every 2nd letter is capitalized, or the letter E is replaced by a 3.
You could then use special characters such as / or% between the words.
Basically, the more complex a password is, the better.
If you do not want to think of anything, you can also create an Online Password Generator. But it is better that you think your own.
4. Protection against phishing in online banking
4. Protection against phishing in online banking
The methods that scammers are trying to get at your bank details are almost limitless.
In any case, you should pay attention to the following points to make it as difficult as possible for such people:
The methods that scammers are trying to get at your bank details are almost limitless.
In any case, you should pay attention to the following points to make it as difficult as possible for such people:
5. Free checking accounts in comparison
5. Free checking accounts in comparison
6. Installment loans in comparison
6. Installment loans in comparison
Popular Posts:
Microsoft Loop in Teams: The revolution of your notes?
What exactly are these Loop components in Microsoft Teams? We'll show you how these "living mini-documents" can accelerate your teamwork. From dynamic agendas to shared, real-time checklists – discover practical use cases for your everyday work.
Career booster 2026: These Microsoft Office skills will take you further!
A new year, new career opportunities! But which Office skills will really be in demand in 2026? "Skilled use" is no longer enough. We'll show you today's must-haves – like advanced Excel, using AI in the office, and relevant certifications for your resume.
Why Zero Trust doesn’t work without identity protection!
Zero Trust means: Trust no one, verify everyone. Identity protection is at the heart of this modern security model. Learn how IAM, MFA, Conditional Access, and the principle of least privilege effectively protect your business when the old network perimeter is gone.
How AI fuels cyberattacks – and how it protects us from them
Cybercriminals are using AI for deepfakes and automated attacks. Defenses are also relying on AI: through behavioral analysis (UEBA) and automated responses (SOAR). Learn how this arms race works and how modern security strategies can protect your business.
Information overload: Protection & tips against digital stress
Constantly online, overwhelmed by news, emails & social media? Digital information overload leads to stress and concentration problems. Learn the best strategies and practical tips to effectively protect yourself, manage the chaos, and regain your focus.
Put an end to password chaos: Why a password manager is important
Passwords are constantly being stolen through data leaks. A password manager is your digital vault. It creates and stores strong, unique passwords for every service. This effectively protects you against identity theft through "credential stuffing".
Popular Posts:
Microsoft Loop in Teams: The revolution of your notes?
What exactly are these Loop components in Microsoft Teams? We'll show you how these "living mini-documents" can accelerate your teamwork. From dynamic agendas to shared, real-time checklists – discover practical use cases for your everyday work.
Career booster 2026: These Microsoft Office skills will take you further!
A new year, new career opportunities! But which Office skills will really be in demand in 2026? "Skilled use" is no longer enough. We'll show you today's must-haves – like advanced Excel, using AI in the office, and relevant certifications for your resume.
Why Zero Trust doesn’t work without identity protection!
Zero Trust means: Trust no one, verify everyone. Identity protection is at the heart of this modern security model. Learn how IAM, MFA, Conditional Access, and the principle of least privilege effectively protect your business when the old network perimeter is gone.
How AI fuels cyberattacks – and how it protects us from them
Cybercriminals are using AI for deepfakes and automated attacks. Defenses are also relying on AI: through behavioral analysis (UEBA) and automated responses (SOAR). Learn how this arms race works and how modern security strategies can protect your business.
Information overload: Protection & tips against digital stress
Constantly online, overwhelmed by news, emails & social media? Digital information overload leads to stress and concentration problems. Learn the best strategies and practical tips to effectively protect yourself, manage the chaos, and regain your focus.
Put an end to password chaos: Why a password manager is important
Passwords are constantly being stolen through data leaks. A password manager is your digital vault. It creates and stores strong, unique passwords for every service. This effectively protects you against identity theft through "credential stuffing".


























