creditcard-security

In these days of high technology and computerization, especially as it relates to Bank accounts, hacking of systems and other security breaches have become a common phenomenon.

The following 5 tips will assist to safeguard your hard earned funds.

1. Do not keep your card details in the database of income opportunities you are involved with. Instead, though more cumbersome, slot in your card details as and when needed to make purchases.

This helps in case the database of the business opportunity is hacked into as it happened some time ago to SFI and many other high brow websites.

2. Do not keep much funds in any account where you have a credit card linked to. Ensure you have a bank account that you do not have a credit card attached to, where you maintain the bulk of your funds and transfer to credit card backed accounts only as and when needed.

This ensures that you do not loose much funds in case your card details become compromised.

3. Use PayPal instead of credit card to make payment for all your transactions so that your credit card details are not revealed just in case the site is a phishing or other fraudulent website. As you may be aware, all that is required to be revealed when you opt to use Paypal to make payment, is your email address.

4. Following from the above, once transferred to PayPal website, always double-check properly that you are indeed on the secure PayPal website before proceeding any further to effect your transaction, just in case a phishing site transfers you to a fake PayPal website.

Signs to look out for include the green address bar of PayPal and secure padlock, the https prefix and the correct spelling of PayPal.com.

5. Check to see “https” in at least the ECommerce and/or Affiliate Program section/urls of business opportunities you get involved with.

This safeguards various information e.g. credit card details, log in details etc you enter on the website, as such details are encrypted and so, securely communicated to the business opportunity’s server as against communicated as plain text otherwise, which makes it susceptible to fraudulent interception.