We take our data storage and processing obligations very seriously. For your peace of mind and to keep you safe, all data is securely processed in systems similar to those used by top banking institutions. We use a secure SSL connection. In relation to payment card data, you can be assured that we are fully PCI compliant.
We require your bank details in order to be able to transmit the loan funds to you should your application be successful. We do not, without your express permission, attempt to access your online banking service (read only access) to view your account details and transactions. All data security policies and processes are reviewed regularly to ensure your data is treated in the correct manner.
Online fraud is on the rise as we have written about on numerous occasions. It is important that you learn to spot fake or phishing type emails. If you have reason to doubt an email, look closely at the sending domain to check it matches the firm alleging to have the sent the correspondence. Look for typos or an odd turn of phrase. It's unlikely that large reputable firms would allow such errors in their emails to go out. Check if the firm has used any of your data to corroborate, for example, addressed you by name or used your account number or is it a generic "Dear customer" type email. Do not reply to the email and do not click or tap any of the links. Delete the email from your inbox.
We send communications to customers who have consented to receive our marketing or in connection with any of the services we provide. You can opt-out of any marketing communications at any time by getting in contact with us or if appropriate logging in to your account and updating your preferences in the appropriate area.
You can usually tell a secure site by a small gold padlock within the address bar at the top of the browser. The address of secure web pages also begin with "https". If you are unsure about a site, if you think something looks suspicious, if you can't see the padlock symbol, or if the web address begins with anything other than "https", don't enter any payment details. You can get in touch with us and we can investigate.
Malware is short for "malicious software". This is software which has been specifically designed to damage or cause other problems on a device. Certain types of malware can also be used to gain access to or control of a device, or to steal passwords and documents, usually without the knowledge of the owner. You can protect yourself from malware by ensuring your anti-virus programmes and software are up to date on your devices, ensure you are browsing on a secure connection and be mindful of downloading information and documents from sources you do not know.
A virus is a malicious code which looks to attach itself to an existing file or programme. A virus will infect a file on your device and replicate, attaching these replicas to other files and programmes within the same device. Viruses are usually designed to cause damage to devices, such as corrupting files or deleting them entirely. Viruses are spread to different devices usually by human error, an infected file can be emailed, uploaded to shared drives or downloaded to a USB drive.
A worm is a type of virus, although the key difference is that a worm is usually a standalone programme, as opposed to a piece of code. Worms are self-replicating and once installed, will look for a way to spread within computer networks or to other devices without being actively "sent" like a virus.
A Trojan is a type of malware which masquerades as a legitimate piece of software. When launched, it can attack the host device itself, spread other malware such as viruses, or simply sit within the infected device gathering information without the user's knowledge. Trojans can also create a "back door" entry into the user's system, giving malicious users full access to the device. Trojans don't infect other files like viruses, or replicate to spread through a system like worms.
Phishing is a type of cybercrime which is specifically designed to trick you into disclosing information. This is usually financial information, such as details about your bank or credit card information. Typically, victims receive emails or phone calls asking them to log into a website to confirm a security threat or check their information. This is a fake site which may look legitimate. By logging into the website, victims have provided the cybercriminal with their user names, passwords, answers to security questions and potentially PINs.
Spyware is software that is designed to record and send your data to a third party without your knowledge. Spyware will rarely cause malicious damage in the same way as a virus, however the software can record and share your activity on your device, such as login details and passwords.
A drive-by download (sometimes called a "drive-by installation", although this usually applies to Trojans) is a download of malware onto a device which either happens without a user's knowledge, or is authorised without understanding the consequences. It can happen when visiting an infected site, or by downloading a counterfeit or unknown programme.
A rootkit is a programme which enables access to a device and can hide or cover up its presence and often the presence of other forms of malware. When installed on a device, rootkits are usually undetectable to the user and can also sometimes mask itself from security software.