Der Blog für digitale Kompetenz

Der Blog für digitale Kompetenz

The most important tips for online banking

The number of participants in online banking is growing, and is enjoying increasing enthusiasm.

In the year 2018, 50% of Germans now have online access to their checking account. Nevertheless, on closer examination, the proportion has grown by only about 5% in the past 5 years. The reasons for this are among others, often the recurrent reports about security vulnerabilities, or stolen records. Of course, this does not necessarily create trust among customers.

In part, however, it is also the case that the users even by ignorance, or negligence, your data in the hands of scammers, or at least make it easy. In our article, we would like to point out the most important points from our point of view, so that you can do your money conveniently and, above all, safely from home.

The most important tips for secure online banking

Topic Overview

Anzeige

The most important tips for online banking

The number of participants in online banking is growing, and is enjoying increasing enthusiasm.

In the year 2018, 50% of Germans now have online access to their checking account. Nevertheless, on closer examination, the proportion has grown by only about 5% in the past 5 years. The reasons for this are among others, often the recurrent reports about security vulnerabilities, or stolen records. Of course, this does not necessarily create trust among customers.

In part, however, it is also the case that the users even by ignorance, or negligence, your data in the hands of scammers, or at least make it easy. In our article, we would like to point out the most important points from our point of view, so that you can do your money conveniently and, above all, safely from home.

The most important tips for secure online banking

Topic Overview

Anzeige

1. Overview of the TAN procedure

1. Overview of the TAN procedure

After many attempts by the banks, the following procedures have now been established:

  • The iTan procedure

Here you will receive from your bank a list in paper form by mail, on which the TANs (transaction numbers) are numbered consecutively. For each transaction (such as a transfer), you will be prompted to enter a specific TAN from the list for the transaction in question.

When the process is finished, the TAN is also used up and can not be used a second time.

Although this process is still used by some banks, it is actually considered obsolete and not very secure because iTan is not bound to the details of the transfer such as: IBAN, amount or date.

If you are still using this procedure, we recommend that you ask your bank what procedures are still available.

  • Mobile TAN (SMS TAN)

This process is a bit more complex, and therefore also provides increased security.

Here you enter your transfer data on the PC, and a few seconds later you will receive an SMS from your bank with the TAN on your mobile phone. For reconciliation you will find in this SMS also the amount of the transaction, as well as. the last 4 digits of the IBAN of the recipient.

Basically, one can say that this method is quite safe. Of course, it also requires a complete security chain for your browser on the PC and, best of all, anti-virus protection on your mobile phone.

  • Chip TAN

The Chip TAN is almost like a terminal in the bank branch itself, and offers very high security.

Here you will receive from your bank for a small fee of usually 10 – 15 Euro a TAN Generator which in combination with your debit card (which must be previously activated by your bank for this) generates a TAN for each transaction.

However, once again, you have to take care of the security of your PC. Because this is the actual vulnerability in this process.

  • Photo Tan

With the Photo TAN you also need an external device which you have to register with your bank.

This method works so after entering the transfer data that you have entered on your PC, a graphic is generated on your computer, which you then scan again with said reader. The reader can then decrypt the displayed image data on your monitor and generate a TAN from it.

Basically, this process is very similar to the Chip TAN process, as both processes use the combination of PC Monitor and TAN Generator to generate the actual TAN, and is therefore also very safe.

Advertisement

Although there are other methods, but basically it is as you have already noticed, always about as safe as possible to create a TAN or transfer.

Incidentally, a relatively new procedure specifically for mobile banking is the ING-DIBA on.
In this case, the smartphone is registered as a primary device for online banking, and also can not easily be replaced (e.g., by a new or foreign device).

What does this mean the online banking app is firmly tied to exactly this device in combination with your phone number. Here, there is only one single 4-digit access number for each process, which can be used as a universal TAN for each process.

At first glance, this seems relatively uncertain, because if your smartphone is stolen, it will open the door to the perpetrators of your account. However, this relativized quickly, because you have after 3 failed attempts when entering this access number no more possibility to log in with the smartphone, but must then unlock the device on the PC over the much longer login process the device again.

In terms of comfort, this is one of the most convenient ways to do your banking on the go, compared to the above.

After many attempts by the banks, the following procedures have now been established:

  • The iTan procedure

Here you will receive from your bank a list in paper form by mail, on which the TANs (transaction numbers) are numbered consecutively. For each transaction (such as a transfer), you will be prompted to enter a specific TAN from the list for the transaction in question.

When the process is finished, the TAN is also used up and can not be used a second time.

Although this process is still used by some banks, it is actually considered obsolete and not very secure because iTan is not bound to the details of the transfer such as: IBAN, amount or date.

If you are still using this procedure, we recommend that you ask your bank what procedures are still available.

  • Mobile TAN (SMS TAN)

This process is a bit more complex, and therefore also provides increased security.

Here you enter your transfer data on the PC, and a few seconds later you will receive an SMS from your bank with the TAN on your mobile phone. For reconciliation you will find in this SMS also the amount of the transaction, as well as. the last 4 digits of the IBAN of the recipient.

Basically, one can say that this method is quite safe. Of course, it also requires a complete security chain for your browser on the PC and, best of all, anti-virus protection on your mobile phone.

  • Chip TAN

The Chip TAN is almost like a terminal in the bank branch itself, and offers very high security.

Here you will receive from your bank for a small fee of usually 10 – 15 Euro a TAN Generator which in combination with your debit card (which must be previously activated by your bank for this) generates a TAN for each transaction.

However, once again, you have to take care of the security of your PC. Because this is the actual vulnerability in this process.

  • Photo Tan

With the Photo TAN you also need an external device which you have to register with your bank.

This method works so after entering the transfer data that you have entered on your PC, a graphic is generated on your computer, which you then scan again with said reader. The reader can then decrypt the displayed image data on your monitor and generate a TAN from it.

Basically, this process is very similar to the Chip TAN process, as both processes use the combination of PC Monitor and TAN Generator to generate the actual TAN, and is therefore also very safe.

Advertisement

Although there are other methods, but basically it is as you have already noticed, always about as safe as possible to create a TAN or transfer.

Incidentally, a relatively new procedure specifically for mobile banking is the ING-DIBA on.
In this case, the smartphone is registered as a primary device for online banking, and also can not easily be replaced (e.g., by a new or foreign device).

What does this mean the online banking app is firmly tied to exactly this device in combination with your phone number. Here, there is only one single 4-digit access number for each process, which can be used as a universal TAN for each process.

At first glance, this seems relatively uncertain, because if your smartphone is stolen, it will open the door to the perpetrators of your account. However, this relativized quickly, because you have after 3 failed attempts when entering this access number no more possibility to log in with the smartphone, but must then unlock the device on the PC over the much longer login process the device again.

In terms of comfort, this is one of the most convenient ways to do your banking on the go, compared to the above.

2. Browser security in online banking

2. Browser security in online banking

Regardless of which of the above methods you use, they all presuppose that the entire chain of the components involved is protected.

And that includes the security of the PC and the browser used.

  • Make sure to keep the operating system of your computer up to date
  • Use premium anti-virus software instead of free alternatives
  • Use a different browser than your default browser (for example, Standard Browser = Google Chrome / Online Banking Browser = Firefox)
  • Do not use unnecessary add-ons in your banking browser
  • Disable saving passwords in the browser
  • Deactivate the storage of cookies and the browser cache, or set it to be emptied automatically after each closing
  • Always make sure that the website called by you for the Online Banking SSL is encrypted
  • Always enter the URL of your bank into the address bar by hand, or use a bookmark that has been specially set for it
Kauf auch du bei der Nummer 1!
Anzeige

Note:

A good alternative to the standard browsers especially for online banking, but also for transactions via PayPal and other financial service providers offers the premium anti-virus software Bitdefender

This browser is specially secured by the attached anti-virus software to a high degree, and is absolutely recommendable from personal experience.

Regardless of which of the above methods you use, they all presuppose that the entire chain of the components involved is protected.

And that includes the security of the PC and the browser used.

  • Make sure to keep the operating system of your computer up to date
  • Use premium anti-virus software instead of free alternatives
  • Use a different browser than your default browser (for example, Standard Browser = Google Chrome / Online Banking Browser = Firefox)
  • Do not use unnecessary add-ons in your banking browser
  • Disable saving passwords in the browser
  • Deactivate the storage of cookies and the browser cache, or set it to be emptied automatically after each closing
  • Always make sure that the website called by you for the Online Banking SSL is encrypted
  • Always enter the URL of your bank into the address bar by hand, or use a bookmark that has been specially set for it
Kauf auch du bei der Nummer 1!
Anzeige

Note:

A good alternative to the standard browsers especially for online banking, but also for transactions via PayPal and other financial service providers offers the premium anti-virus software Bitdefender

This browser is specially secured by the attached anti-virus software to a high degree, and is absolutely recommendable from personal experience.

3. Password security for online banking

3. Password security for online banking

Of course, all technical safety measures are useless if it fails the easiest. Namely the secure password.

Here we recommend that you think up a whole sentence that you may associate with personal events. And you should then change this as far as the e.g. every 2nd letter is capitalized, or the letter E is replaced by a 3.

You could then use special characters such as / or% between the words.

Basically, the more complex a password is, the better.

If you do not want to think of anything, you can also create an Online Password Generator. But it is better that you think your own.

cshow
Ads

Of course, all technical safety measures are useless if it fails the easiest. Namely the secure password.

Here we recommend that you think up a whole sentence that you may associate with personal events. And you should then change this as far as the e.g. every 2nd letter is capitalized, or the letter E is replaced by a 3.

You could then use special characters such as / or% between the words.

Basically, the more complex a password is, the better.

If you do not want to think of anything, you can also create an Online Password Generator. But it is better that you think your own.

cshow
Ads

4. Protection against phishing in online banking

4. Protection against phishing in online banking

The methods that scammers are trying to get at your bank details are almost limitless.

In any case, you should pay attention to the following points to make it as difficult as possible for such people:

  • Avoid public or foreign Wi-Fi networks (hotspots) for your banking business. (Since you have no influence on network security here, this represents a high risk.)
  • Avoid banking in Internet cafes. (These are even more insecure than the hotspots mentioned above, since you have no influence on the hardware used or the software protection)
  • Do not panic about any threatening account or restrictions. Never click on links in these emails, but always go to the usual secure direct way to verify your account.
  • Never download images that could be contained in e-mails in HTML format. (These can already be infected with Trojans)
  • Do not download file attachments in emails that (allegedly) come from your bank. (Also here malware or spyware can be included)
  • If you have the slightest doubt about the authenticity of an e-mail, then delete it better unread. (If your bank has really important things to tell you, it will do so in case of doubt by mail.)

The methods that scammers are trying to get at your bank details are almost limitless.

In any case, you should pay attention to the following points to make it as difficult as possible for such people:

  • Avoid public or foreign Wi-Fi networks (hotspots) for your banking business. (Since you have no influence on network security here, this represents a high risk.)
  • Avoid banking in Internet cafes. (These are even more insecure than the hotspots mentioned above, since you have no influence on the hardware used or the software protection)
  • Do not panic about any threatening account or restrictions. Never click on links in these emails, but always go to the usual secure direct way to verify your account.
  • Never download images that could be contained in e-mails in HTML format. (These can already be infected with Trojans)
  • Do not download file attachments in emails that (allegedly) come from your bank. (Also here malware or spyware can be included)
  • If you have the slightest doubt about the authenticity of an e-mail, then delete it better unread. (If your bank has really important things to tell you, it will do so in case of doubt by mail.)

5. Free checking accounts in comparison

5. Free checking accounts in comparison

6. Installment loans in comparison

6. Installment loans in comparison

Blogverzeichnis Bloggerei.de
Blogverzeichnis Bloggerei.de

Search for other topics:

About the Author:

Michael W. Suhr
Michael W. SuhrDipl. Betriebswirt | Webdesign- und Beratung | Office Training
After 20 years in logistics, I turned my hobby, which has accompanied me since the mid-1980s, into a profession, and have been working as a freelancer in web design, web consulting and Microsoft Office since the beginning of 2015. On the side, I write articles for more digital competence in my blog as far as time allows.

Search by category:

Search for other topics:

About the Author:

Michael W. Suhr
Michael W. SuhrDipl. Betriebswirt | Webdesign- und Beratung | Office Training
After 20 years in logistics, I turned my hobby, which has accompanied me since the mid-1980s, into a profession, and have been working as a freelancer in web design, web consulting and Microsoft Office since the beginning of 2015. On the side, I write articles for more digital competence in my blog as far as time allows.

Search by category:

Popular Posts:

102, 2024

Integrate and use ChatGPT in Excel – is that possible?

February 1st, 2024|Categories: Artificial intelligence, ChatGPT, Microsoft Excel, Microsoft Office, Shorts & Tutorials|Tags: , , , |

ChatGPT is more than just a simple chatbot. Learn how it can revolutionize how you work with Excel by translating formulas, creating VBA macros, and even promising future integration with Office.

2008, 2023

Internet Addiction – A serious look at a growing problem

August 20th, 2023|Categories: Google, Homeoffice, Shorts & Tutorials|Tags: , , |

Internet addiction is just as serious an illness as alcohol or drug addiction. Just that this is a mental illness. In this article we want to go into the phenomenon in more detail and provide assistance.

607, 2023

Main keyboard shortcuts in Windows 10/11

July 6th, 2023|Categories: Homeoffice, Microsoft Office, Shorts & Tutorials, Windows 10/11/12|Tags: |

Entdecken Sie die wichtigsten Shortcuts in Windows 11, um Ihre Produktivität zu steigern. Von allgemeinen Befehlen bis hin zu spezifischen Fenster-Management- und System-Shortcuts, lernen Sie, wie Sie mit diesen Tastenkombinationen effizienter arbeiten können.

107, 2023

Encrypt USB stick – These options are available

July 1st, 2023|Categories: Shorts & Tutorials, Data Protection, Hardware, Homeoffice, Mac OS, Windows 10/11/12|Tags: , , |

Protecting sensitive data is essential. Encrypting USB sticks provides an extra layer of security. Whether it's built-in software, operating system features, third-party software, or hardware encryption, there are numerous options.

Spring Specials 2024: Word & Excel Templates

Special Offers 2023: Word Design CV-Templates

Monthly Technique Bestsellers:

Bestseller 2022-2023 WLAN-Heizkoerperthermostate

SmartHome | Energy & Security

SmartHome | Energy & Security

Bestseller 2022-2023 WLAN-Heizkoerperthermostate
Bestseller 2022-2023 Notebooks

PC & Accessoires

PC & Accessoires

Bestseller 2022-2023 Notebooks
Bestseller 2022-2023 Smartphones

Smartphone & Accessoires

Smartphone & Accessoires

Bestseller 2022-2023 Smartphones

Popular Posts:

102, 2024

Integrate and use ChatGPT in Excel – is that possible?

February 1st, 2024|Categories: Artificial intelligence, ChatGPT, Microsoft Excel, Microsoft Office, Shorts & Tutorials|Tags: , , , |

ChatGPT is more than just a simple chatbot. Learn how it can revolutionize how you work with Excel by translating formulas, creating VBA macros, and even promising future integration with Office.

2008, 2023

Internet Addiction – A serious look at a growing problem

August 20th, 2023|Categories: Google, Homeoffice, Shorts & Tutorials|Tags: , , |

Internet addiction is just as serious an illness as alcohol or drug addiction. Just that this is a mental illness. In this article we want to go into the phenomenon in more detail and provide assistance.

607, 2023

Main keyboard shortcuts in Windows 10/11

July 6th, 2023|Categories: Homeoffice, Microsoft Office, Shorts & Tutorials, Windows 10/11/12|Tags: |

Entdecken Sie die wichtigsten Shortcuts in Windows 11, um Ihre Produktivität zu steigern. Von allgemeinen Befehlen bis hin zu spezifischen Fenster-Management- und System-Shortcuts, lernen Sie, wie Sie mit diesen Tastenkombinationen effizienter arbeiten können.

107, 2023

Encrypt USB stick – These options are available

July 1st, 2023|Categories: Shorts & Tutorials, Data Protection, Hardware, Homeoffice, Mac OS, Windows 10/11/12|Tags: , , |

Protecting sensitive data is essential. Encrypting USB sticks provides an extra layer of security. Whether it's built-in software, operating system features, third-party software, or hardware encryption, there are numerous options.

Spring Specials 2024: Word & Excel Templates

Special Offers 2023: Word Design CV-Templates

Monthly Technique Bestsellers:

Bestseller 2022-2023 WLAN-Heizkoerperthermostate

SmartHome | Energy & Security

SmartHome | Energy & Security

Bestseller 2022-2023 WLAN-Heizkoerperthermostate
Bestseller 2022-2023 Notebooks

PC & Accessoires

PC & Accessoires

Bestseller 2022-2023 Notebooks
Bestseller 2022-2023 Smartphones

Smartphone & Accessoires

Smartphone & Accessoires

Bestseller 2022-2023 Smartphones

Title

Ads

Popular Posts:

Search by category:

Autumn Specials:

Anzeige
Go to Top