Safety

BCA always has in mind the principles of security that guarantees the safe use of Internet banking by its clients. Therefore, it is important to note that, in addition to the Internet security solutions that BCA has implemented, customers are also responsible for their Internet security. This is called sharing responsibility.

Get to know BCA security tips for safe use of internet Banking - BCADirecto:

1. YOUR RESPONSIBILITY:

The security of your access codes and the transactions you perform at BCADirecto are your responsibility and to avoid any inconvenience, we advise you to take the following measures:

Precaution one should have with their BCADirecto codes:

• The User Name in conjunction with the Access Code, in addition to being identified as a BCA customer, allows you to access the private part of BCADirecto, where you can view and operate on your accounts and associated products.
• The Confirmation Key is used to carry out transactions that involve the movement of capital in your accounts. This is an additional level of security. The Confirmation Key must be entered directly in the field provided for this purpose, requiring the use of the Virtual Keyboard.
• The Access Codes (User Name + Access Code) and the Confirmation Key of BCADirecto service are personal and non-transferable, and should never be transmitted even if requested by persons who identify themselves as BCA collaborators.
• BCA never requests this information from its customers through email or telephone contact.
• Change the Access Codes regularly (at least every 3 months).
• These Codes should not reproduce easily identifiable data such as birth dates or repeated digit sequences (eg 111111, 456456, ABCDEF, among others).
• Never write down your access code on checks, cards, calendars, etc., or even store them in files on your computer. Keep your code with the same care you have with your valuables.

Always protect and update your computer:

• Always use properly licensed software, frequently updating the operating system and your Internet browser. In most cases these updates can be made from the Internet itself.
• Always use a computer with an antivirus program installed and up-to-date with "Internet mail" and "Downloads" protection.
• Before entering private or confidential information, always check that the address of the page you are accessing starts with https: // ("s" stands for "secure").
• Install an antispyware program that protects you from programs that collect personal information without your consent. If you do not have an antispyware program, you can install it free of charge on the Microsoft website.

Cautions in the use of emails:

• Using e-mail requires that you take some precautions, otherwise you may "open" your computer to malicious people.
• Never open a message - even if you have an antivirus program? If you are in doubt as to its origin or content, even if the apparent subject is appealing. Do not act on this message by forwarding or replying. Erase it right away!

Stay tuned for Phishing and Spyware:

Phishing consists of sending e-mails, apparently from well-known institutions, where, under the pretext of updating data, offering commercial benefits or premiums, security reasons, etc., and usually as a matter of urgency, the recipient is requested The sending of personal or business data.

These messages, sent for illegitimate purposes, usually provide links to sites that do not correspond to the institution they designate as origin, even though they appear the same image.

When the link is invoked, a page similar to the one we are used to, containing a form for completing data is presented, which, if it is completed, will deliver your data to a fraudulent recipient.

Therefore, if you are sent an e-mail with the characteristics mentioned above, it is recommended that you erase it immediately.

Spyware is software that collects your personal information without first informing you that it is doing so, and without you being able to decide whether to accept it or refuse it. The information that the spyware collects can range from information about all the sites you've visited, to more sensitive information such as usernames and passwords.

Spyware and unauthorized adware are two examples of "misleading" software. Misleading software includes programs that take over your homepage or search, without first asking for your authorization. There are several ways in which deceptive software can enter the system. A common trick is to stealthily mislead software while installing other software that the user intends to use, such as a music or video sharing program, or e-mail.

How to avoid infecting your computer with deceptive software and find out what to do if it is already infected.

• Step 1: Adjust Internet browser security settings

You can adjust Internet browser security settings to determine how much information you are willing to accept from an Internet site. The higher the safety level, the lower the risk. The disadvantage is that using higher security levels could make it difficult to access certain sites. By default, the Internet browser chooses a break even. When you first install Internet Explorer (Internet browser), Internet Explorer scans all sites in a single zone (the Internet Zone) and assigns them the average level of security. When you are using this security level, Internet Explorer should ask you to confirm that you want to download a file, unless you have previously indicated that the site or company is trusted. If you change the security level to "low", sites may transfer the software to your computer without notifying you; so be careful when using this setting. If for some reason you have to reduce the level of safety, return it to the medium or high level as soon as possible.





• Step 2: Do not accept transfers from strangers


The best defense against deceptive software is not to download it. Here are some helpful hints that can help you protect yourself from deceptive software.

Install software only from sites you trust. Before transferring anything from a website, think about whether you'd feel comfortable negotiating with that site. If the answer is 'no', then do not download the software. If you're not sure, do some research, such as asking friends and checking out other features you trust.

Read the small print. When installing any program, be sure to read the messages in all windows before confirming by clicking buttons like "Agree", "Agree", "Accepted", or simply "OK." You should also read carefully any license agreements or privacy statements associated with the software. You may discover behaviors you deem inappropriate. If the window does not let you click "No" or "I do not accept", close the window by clicking the "X" in the corner. Never click "Yes" or "I Accept" just to get rid of the window.


Beware of the popular "free" programs for sharing music and videos. Statistics show that many people receive deceptive software on their system from these programs. To use the analogy of your home, when you install file sharing programs you are leaving the front door open. Aside from the obvious risks of someone stealing you, you may as well leave things behind you that you may not want.


• Step 3: Look for signs of misleading software on the computer



Misleading software is intended to run without your knowledge, but there are some ways to tell if your system is infected.

When you start your Internet browser, does it open a page you have never seen? When you select any search function, is it taken to a page that you do not recognize? Some misleading software changes these settings without your knowledge.

Do you see a sudden increase in the number of ads on the pages you visit? Misleading software can sometimes bombard you with ads, regardless of the page you visit. These ads often advertise sites with adult content that you may find offensive.

Does the computer seem slow? Misleading software is not necessarily designed to be efficient. The features you use to track your moves and send advertisements can slow your computer down and bugs in the software can cause your computer to crash. Can an Internet or antivirus firewall program help? While it is important to activate the firewall, run an anti-virus program, and keep the software up-to-date, none of these measures will securely prevent misleading software downloads. There is special detection and removal software to help you find and remove software from your computer.


• Step 4: Use a tool that helps detect and remove unwanted software.



Several companies offer free software that will check if there is such unwanted software on your computer. These tools can help you determine if you have installed unwanted software and can help you remove it. If your Internet provider does not provide a spyware removal tool (or similar), ask people you trust to recommend a tool. Do not forget that removing unwanted software may prevent you from continuing to use the free program that came with it.


• Step 5: Keep Windows Up to Date



The last step to help protect yourself from misleading software is to make sure that Windows is always up to date. You can do this by visiting Windows Update and enabling automatic updates. For more detailed instructions, see the Microsoft page.

Caring for computers in public places:

Internet access via computers placed in public places (eg cyber cafés) or other sites prepared for this purpose, shares with other users the information on the computer and enhances the exposure to third parties of private information as well as identification elements Such as codes and / or password. In these conditions, access requires strict compliance with safety rules.

Never use one of these computers to access private information, whether banking or not, over the Internet.

If you need to do this, you should observe the following precautions:

Make sure that the process of entering your identifying elements, codes and password is not being observed or registered by third parties, either directly or through filming equipment;

After executing the desired operations: delete the Temporary Files, preventing some information from remaining in cache; Finish your access by clicking on the "Homepage" button in the upper left corner





Always log off BCADirecto session and clear the "cache" (temporary files) of your computer

Always log out using the "Log Off" option. Do not do it abruptly so you do not run the risk of the session becoming active.

Never leave your computer while keeping a BCADirecto session active. Although the system is prepared to automatically suspend the connection after some inactivity, it is possible that someone will try to use your session if it does not close it properly.

Reconnect immediately if, during the use of BCADirecto, you unexpectedly lose access to your ISP (Internet Service Provider). Then enter the service and close the session correctly to ensure that the connection is properly terminated.

Always clear the cache after you close your session. This prevents third parties from accessing the last page you visited. To clear the computer's cache (temporary files) you must:


• In the Tools menu, click on Internet Options;
• On the General tab, in the Temporary internet files area, select the Delete files option;
• Confirm with OK button.
• Close the browser after clearing temporary files and browser history.


2. BCA SECURITY MECHANISMS



BCA's Internet Banking service uses the most advanced security mechanisms and technologies available in the market, namely:

• BCADirecto access codes as a way of guaranteeing their identification and authentication as a BCA customer;
• Additional authentication system, which requires confirmation of extra assets operations by inserting a confirmation key;
• Mandatory use of browsers that support 128-bit data encryption, namely Internet Explorer 6 or higher or compatible;
• Access suspension system after a number of consecutive failures of the customer identification code;
• Maximum session time and session cancellation after a certain period of inactivity in BCADirecto service;
• In addition, BCA also uses a set of equipment, infrastructures and technologies to guarantee the security of the computer system used internally, as well as Internet Banking.

It should be remembered that the protection of your data, your computer and internet banking transactions are also up to you, and we therefore recommend that you always adopt the above good practices.

Quick Access

BECOME A BCA CUSTOMER

Learn the advantages of being a BCA customer, start here your relationship with our Bank.

FORMS

Here are the application forms to join the various products and services that BCA has at its disposal.

MARKETS

See the space dedicated to the Capital Markets in Cabo Verde.

BCA REAL ESTATE

Purchase an apartment, a house, a building, or a space for your business / office, through BCA.

2016 Banco Comercial do Atlântico, All Rights Reserved