Considering COVID-19 we have taken precautionary steps demanded by the situation. Our branches will be open, with required hygiene measures and reduced staff.
Revision in Savings Account Interest rates effective April 01, 2022
Customer Compensation and Protection Policy limiting the liability of customers in unauthorized electronic transactions is available under Bank Policies section for perusal of customers.
Our Avinashi branch located at The Utkarsh BANK Ltd. Shop No 5/215 Rajan Nagar Opp to weekly Market, K K Pudur post Avinashi Taluk, Tirupur - 641654, will be closed w.e.f April 30, 2022. It is being merged with our Tirupur branch.
Considering COVID-19 we have taken precautionary steps demanded by the situation. Our branches will be open, with required hygiene measures and reduced staff.
Revision in Savings Account Interest rates effective April 01, 2022
Customer Compensation and Protection Policy limiting the liability of customers in unauthorized electronic transactions is available under Bank Policies section for perusal of customers.
Our Avinashi branch located at The Utkarsh BANK Ltd. Shop No 5/215 Rajan Nagar Opp to weekly Market, K K Pudur post Avinashi Taluk, Tirupur - 641654, will be closed w.e.f April 30, 2022. It is being merged with our Tirupur branch.
As we transition to a digital economy, cybersecurity in banking is becoming a serious concern. Utilizing methods and procedures created to data is essential for a successful digital revolution. The effectiveness of cybersecurity in Banks influences the safety of our Personally Identifiable Information (PII).
Cybersecurity is the key for Banks to keep customer’s money safe and secure. Cybersecurity also helps to maintain customer’s trust and confidence in the banking system. The Bank uses the latest security measures to protect customers’ personal information and financial transactions.
Protecting the user's confidential information is the primary goal of cybersecurity in banking. As more people become cashless, more transactions go online. People conduct transactions using digital payment methods like debit and credit cards, which must be protected by cybersecurity.
Get
1 reward point on every ₹ 100 spends on debit card
Get
1 reward point on every ₹ 100 spends on debit card
Get
Cash withdrawal on Utkarsh Bank ATMs
Phishing is a fraudulent activity performed by fraudsters to obtain personal information (such as User ID, Password, Account Number, Card Number, CVV Number, Card Expiry Date, OTP (One-Time Password, etc.) of a Bank customer.
Ways to identify a phishing e-mail:
How to protect yourself from Phishing?
VISHING: A type of social engineering attack in which a cybercriminal contacts the customer by phone, impersonating someone in a position of authority. Vishing is similar to phishing, but the attack is delivered by phone instead of email.
SMISHING: Fraudulent phone calls and SMSs containing fraudulent URLs on the subject of KYC updates, linking of Bank Accounts, and seeking confidential information of customers, are currently in circulation.
NOTE: Utkarsh Small Finance Bank Limited never asks for any of your confidential personal information such as User ID, Password, Account No, Card No, CVV No, One Time Password (OTP) etc. Never disclose them to anyone, even if the seeker claims to be from the Bank
With the increase in digital reach of the Bank towards its customers, Mobile Banking Application play an important role for the convenience and ease of the customer. With the increase in cybercrime and other fraudulent activities, it is necessary to enhance the security and precautions to be taken while using Mobile Banking Application.
The following security measures are to be followed while using Mobile Banking Application
While using the ATM, you should watch for:
Cyber criminals commit identity theft by using sophisticated cyber-attack tactics, including social engineering, phishing, and malware. Identity theft can also result from rudimentary tactics such as criminals stealing mail, digging through dumpsters, and listening to phone conversations in public places.
Unfortunately, most people only discover they're victims of identity theft when they apply for a loan, attempt to open a Bank account, apply for a job, receive a call from a collection agency, or request a new credit card.
Despite the many ways an individual's identity can be stolen, there are also ways to prevent this from happening. Always keep the following in mind:
Before making any digital payments on any website, look for two things: the trusted security lock symbols and the extra "s" at the end of http (i.e. https) in the URL or web address bar.
AI voice-cloning scams, driven by the power of Artificial Intelligence (AI), have emerged as a disturbing trend in the world of online fraud. Scammers are exploiting this technology to mimic the voices of friends, family, and acquaintances, luring unsuspecting victims into financial fraud
To shield yourself from the growing threat of AI voice-cloning scams, consider implementing these vigilant strategies:
What is Meant by Online Shopping Scams?
When a culprit fraudulently acquires the online payment details or card details to shop online or make online purchases without the consent of the Account holder, it can be considered online shopping fraud.It is rather apparent that the surge in online payment methods directly led to purchase fraud.Hackers are becoming more resourceful and creative these days. This is because people are willingly putting their personal information online.
Safety Measures to Protect Yourself When Shopping Online
Following are some preventive measures that will give you protection against online shopping fraud:
Modus Operandi
Fraudsters often contact customers under various pretexts and trick them into scanning Quick Response (QR) codes using the QR code scanning applications on the customers’ mobile.
By scanning such QR codes, customers may unknowingly authorise the fraudsters to steal sensitive information, money, or both.
Fraudsters can also embed links in QR codes, redirecting them to webpages containing viruses or malware which can compromise customers sensitive data.
QR Code Phishing modes:
Through fake Emails, SMS messages, advertisements, etc
Preventive measures
Fake loan apps are applications that pose as legitimate financial services but are designed to deceive users. These apps typically claim to offer quick and easy loans with minimal documentation, often targeting individuals who may be in urgent need of funds.
How to spot fake loan apps?
How to avoid falling for a fake loan app?
Spotting a WhatsApp scam
WhatsApp scams take numerous different forms; they often share similar characteristics. The most common signs of a WhatsApp scam are:
How to stay safe from WhatsApp scams?
Amount (₹)
₹ 1 Lac
₹10 Cr
Tenure ( )
1 Month
120
Interest Rate (%)
1%
31%
Interest Rate 8.00% |
Interest Earned ₹ 3,50,452 |
Maturity Value ₹ 13,50,452 |
Maturity Date 20 Apr 2023 |
(Indicative interest rates for calculation only. click here for latest rates.) |
'Phishing' refers to the practice of fraudsters 'fishing' for your details in order to find out and misuse your sensitive personal and financial information. Criminals may, for instance, make identical copies of existing corporate websites, or send scam e-mails to elicit a response from you and trick you into divulging your personal information.
Without using additional measures such as a digital signature, it is easy for fraudsters to imitate e-mails. But that doesn't mean you can't recognise scam e-mails. Cyber-criminals often place alarming, enticing or exciting subjects in their e-mails with the hope of tempting you to respond impulsively and divulge the requested information. So, always take your time to read the e-mail carefully. In case of doubt, it is better not to respond. If you do choose to respond, always first check that the mail is genuine by contacting the company that is the found to be the apparent sender by telephone, for instance.
Just like you’d protect your home with house security (locks, gates, doors), cyber security protects your business from malicious (and accidental) attacks through your internet-connected networks, computers, mobile devices, software, and applications. These cyber security measures are designed to defend against attackers seeking to gain access to your data, destroy, or extort sensitive customer information, or get you to pay funds into a false account. Good examples of cyber security measures include strong passwords, two factor authentication, staff education and pre-prepared disaster recovery plans.
Two-factor authentication (or 2FA) is when you are asked for one more security step before getting access to what you have logged into. Often, it’s an email or a text asking you to enter a code or confirm you logged in, to prove that it’s you at the other end. These codes are randomly generated at the moment they’re required, often only valid for one use and usually time-out if not used within a certain, or short, period of time.
Fraud and identity theft come in many forms, so you need to be constantly vigilant about your financial account and personal information. In particular, we suggest that you:
If you believe you've fallen victim to fraud or identity theft, please contact us as soon as possible.
Watch out for scams: Phishing, Vishing, Cyberstalking, Skimming, etc. are some of the many scam perpetrators use to trick you into sharing your personal details. Watch out for these scams and don’t click on links, emails and attachments that look suspicious.
Passwords protect your personal information, so it is important to create strong passwords and change them regularly.
Here are some tips on creating and using passwords:
Be skeptical of any unsolicited outreaches. The saying that “if it is too good to be true, it probably is” applies with scams and phishing. Avoiding fake websites and avoiding phishing scams and emails are similar in that for both, you want to(1) look for clues that they are fake and,(2) if you're suspicious or just want to be cautious,type in the website name or phone number you know to be correct rather than clicking or calling back.
Malware is named from ‘malicious software’, where software has been installed on your computer or network without you knowing and tries to disrupt your business. It could be executable code, computer viruses, worms, Trojans, bots, spyware, ransomware, or other malicious programs. Often picked up when installing or clicking on links you or an employee shouldn’t.
Ransomware is when you’ve mistakenly installed a rogue piece of software (from clicking on a link or opening an attachment), giving access and control of your systems to an attacker, who then demands money. If you don’t pay (usually by an untraceable currency such as Bitcoin), the attacker will delete your data, or lock your screens and deny you access.
Keep your software updated. Use complex passwords and encryption. Do not use public/open Wi-Fi. Lock your phone. Be a smart surfer and log into secure websites, which start with “https” which means it is using a SSL (secure) certificate.
Yes. If you use the same password for every account and if someone gets access to it, they can figure out that the password works for other accounts as well. They may be able to access your information, PIN, etc.
Protecting yourself from identity theft is largely a matter of following best practices (and requirements) for information security. If you learn to identify and avoid phishing scams and install and run anti-virus software, you'll protect yourself from the most common means by which hackers and scammers steal your personal information.
Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.
Social engineering attack techniques
Social engineering attacks come in many different forms and can be performed anywhere where human interaction is involved. The following are the most common forms of digital social engineering assaults.
PHISHING: Phishing is a fraudulent activity performed by fraudsters to obtain personal information (such as User ID, Password, Account Number, Card number, CVV number, Card expiry date, OTP- (One Time Password, etc.) of a Bank customer
VISHING: A type of social engineering attack in which a cybercriminal contacts the customer by phone, impersonating someone in a position of authority. Vishing is similar to phishing, but the attack is delivered by phone instead of email.
SMISHING: Fraudulent phone calls and SMS containing fraudulent URLs on the subject of KYC update, linking of Bank Accounts, and seeking confidential information of customers, are currently in circulation.
Baiting: The most popular form of baiting uses physical media to disperse malware. For example,attackers leave the bait—typically malware-infected USB or removable devices.
Pretexting The attacker usually starts by establishesing trust with their his or her victim by impersonating them as co-workers, government officials , Bank officials, or other persons who have right-to-know authority. The pretexter asks questions to confirm the victim’s identity, through which they gather important personal data.All sorts of pertinent information and records is gathered using this scam, such as social security numbers, personal addresses and phone numbers, phone records, staff vacation dates, Bank records, and even security information related to a physical plant.
Social Engineering Prevention