Security Guidelines

Report a card related problem to PBT

1. Suspicious email

A suspicious email could have any of the following characteristics:

  • You do not recognize the sender
  • It contains suspicious links and/or attachments
  • It prompts you to disclose personal or confidential information
  • There is an urgency tone to take an action

What can I do?

Stop! Don't click on any links and don't open any attachments. You can forward the email to us for investigation.

2. Suspicious Website

If you noticed a suspicious website that might not be legitimate, ensure that you have not entered any personal or bank details and contact us to further investigate.

3. Suspicious Phone Call

If you receive a suspicious phone call that requests your personal information, card details, one time passcode (OTP), bank details, etc., or impersonates a person you know, do not disclose anything until you verify the caller! Discontinue the call and independently verify the phone number either by contacting the person directly or contact the call center of the Organization to verify the authenticity of the phone call.

Remember that username, password, card details and OTP should not be revealed to anyone!

4. Lost or stolen credentials

In the event of loss or theft of your personalized security credentials (username, password) used for logging in or carrying out transactions please contact us immediately.

In case you have forgotten your password, please use the facility provided by the relevant website.

5. I don't recognize a payment

Don't wait! If you think someone holds your security details, call use immediately on +357 22026600 or 77776622 to investigate the payment and advise you accordingly.

6. Communicating with us safely

Whether you are communicating with us using telephone or email, our privacy and security policies ensure that your personal information and your confidentiality are protected at all times.

Customers shall contact PBT Payment Solutions Ltd; for any questions, problems, complaints, requests for support, if an abuse is detected or suspected, notifications of anomalies or incidents regarding card payments and related services, blocked transactions, lost or stolen credentials, reporting (suspected) fraudulent card payments and security incidents such as possible social engineering attempts (e.g. Phishing emails) using the below secure channels:

6. Have a safe internet journey!

  • Be careful not to give personal information-especially your account details, card number, PIN, username, password, one-time passcode (OTP) and verification questions and answers-to people who contact you claiming to represent your financial institution.
  • To find out more, read below how PBT helps to protect you against fraud, and see our tips on steps for safe computing and online privacy.
  • Verify a message before you take any other action. Do not click on a link, call a phone number, and take any requested action, unless you first verify that the request is legitimate. Verify it, by using information from a source other than from within the message itself. Never respond to unsolicited requests for private and other confidential information.
  • Be cautious in your online activity. Be aware that email scams and malicious websites quickly surface for publicized or recurring events or when any news story breaks. Use caution when accessing new sites.
  • Be wary of pop-up windows. Don't click on any action buttons within a suspect pop-up window, including those requesting financial or identification information, those offering to sell you something and those offering to download malicious software by clicking on a tempting link.
  • If it looks too good to be true, it probably is! Be cautious of schemes, emails and websites that promise incredible deals and monetary windfalls. You may end up giving your financial or identification information to fraudsters or downloading malicious software by clicking on a tempting link.
  • Be careful about including personal information online, on social networking sites, in chat rooms and in unencrypted email, and periodically clear your browser's cache and delete any temporary files, as fraudsters may try to get at your information for their own benefit. Always double-check privacy settings on social networking sites. Fraudsters use personal information from different sources to steal people's identities.
  • Take all reasonable precautions to keep your details safe and prevent any unauthorized use. If any information forms part of your security and privacy details, you should therefore make sure that you do not disclose it to anyone else.

7. Use securely your personalized security credentials

Passwords are used by computer systems and websites to verify who you are and authenticate you before we grant access to your accounts.

When you login to our secure websites, such as Plirose.com, you need a password to gain access to our services and resources. If someone else knows or guesses your password, they can access those same resources and also your account. That's why it's crucial for you to follow the below security guidelines:
  • Choose effective passwords that are difficult to guess but easy for you to remember. Use multiple passwords, change them frequently and use ones that include a mix of letters, numbers and special characters.
  • Never set predictable passwords, common words and phrases that may contain your identification number, your passport number, name, initials, or your date of birth etc.
  • Never disclose your username and password to anyone.
  • Do not store passwords or other sensitive information on your mobile phone.
  • Never write your username and password, however if you have no alternative, record them in such a way that cannot be understood by a third party.
  • Never let third parties observe you while entering your username and password.
  • Avoid using your browser's auto completion feature that saves your passwords on your PC.
  • Always logoff/log out from the relevant website. Ensure you properly log off/log out and close your browser to prevent others from being able to view your information later.

8. Secure your device

We know you are as concerned about protection of your personal and financial information as we are. In addition to the rigorous technological safeguards that we employ to ensure the security of your card transactions and the confidentiality of your information, there are several important steps you can take to help keep your own computer secure.

Find out more about the simple and effective safe computing practices you can use to reduce the risk of theft or misuse of your personal and financial information:

9. Install anti-virus and firewall software

Viruses and other malicious programs are transmitted over the Internet and can spread quickly to cause chaos on personal computers and corporate networks. To protect your own computer, you should always use up-to-date antivirus software capable of scanning files and email messages for viruses and firewall in order to prevent malicious attacks and block certain types of data from entering your computer or private network. Firewalls can also be set up to notify you if anyone tries to access your system.

10. Keep your browser, operating system and software up-to-date

The program you use to access websites is called a web browser. Modern browsers warn you if you visit fake websites and it is harder for viruses to infect them. It is advised that you install an up-to-date web browser.

Additionally your operating system and software needs updating. The criminals who create viruses take advantage of software bugs to infect computers. Software companies fix bugs providing free downloadable updates/patches. It is advised that you install security updates for your operating system and software as soon as they become available, as it is harder for viruses to infect updated software.

Take advantage of automated updates for your web browser, operating system and for all software that supports your online behaviour, e.g. browser plug-ins such as PDF viewers, or regularly check the applicable websites for required software patches and updates.

Be wary of phishing emails about fake updates. Use the update software that comes with your computer and avoid clicking on links in emails.

11. Download genuine software from known sources

Be aware of the threats and risks posed by downloading and installing software or files from unknown sources that you haven't first researched yourself and you are not familiar with. Ensure that the software is genuine and has not been tampered with before downloading.

These programs may contain viruses or other malicious code that could cause harm to your computer or be used to steal private or confidential information like card numbers and passwords. Always use an up-to-date antivirus software capable of scanning downloaded files.

12. Browse official legitimate websites of PBT

Only navigate to legitimate websites such as https://www.plirose.com/. Look for a small padlock/security icon somewhere in your browser window and check the address bar - the URL of the site you are on should begin with 'https' - stands for secure. Both act as confirmation that you are accessing your account over an encrypted connection. Moreover ensure that the browser URL is highlighted in green color adding extra trust to online transactions. Prefer not clicking on links included in an email, but manually enter the site through your browser.