Safety instructions for users of ONE FOR ALL smart card/USB key

Reference num. 2936 Views: 1025
1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

In digital business, the level of security on applying due care and diligence and on the storage media on which the digital certificate holder stores their private key. Currently, highest-security media include smart cards and USB keys, since the user’s private signature key never leaves that smart card or USB key and all encryption and digital signing actually take place on the smart card or USB key.

NEVERTHLESS, THE ONLY WAY A SMART CARD OR USB KEY CAN ACTUALLY GUARANTEE TOP-LEVEL SECURITY ACCESS TO YOUR E-BANKING OR OTHER APPLICATIONS IS ON CONDITION THAT AS A USER YOU BEHAVE PRUDENTLY AND WISELY. TO ENSURE THIS, PLEASE OBSERVE THE FOLLOWING SAFETY GUIDELINES:

  • Keep the smart card or USB key bearing the digital certificate in the reader or the computer only when you are actually using a program that requires a digital certificate.
  • Before use, always check that the program or e-banking website is authentic. Never use your smart card or USB key or enter any passwords or PINs on websites that you do not trust.
  • After use, close the program or browser immediately, remove the smart card or USB key from your computer and store them in a safe place.
  • When you are not working on the computer on which you are using the smart card/USB key with the digital certificate (outside working hours, holidays, etc.), shut down the device..
  • Store the PIN of your qualified digital certificate smart card or USB key with the same level of care you apply to your bank card’s PIN. Never lend it to anyone.
  • Do not store your smart card or USB key together with your PIN.
  • Regularly change the PIN of your smart card or USB key.

 

IN ADDITION TO THESE ESSENTIAL SAFETY MEASURES, WE ADVISE THAT YOU CONSIDER THE FOLLOWING SAFETY RECOMMENDATIONS FOR USERS OF THE CA QUALIFIED DIGITAL CERTIFICATE:

  • Use only sufficiently long and complex passwords that are difficult to figure out (at least 8 characters long, 15 characters is recommended; include uppercase and lowercase letters, numbers, punctuation marks, and spaces). Never use the same password for e-banking and e-mail. Never use your e-banking or e-mail password for less secure sites (online networks, other websites).
  • Reliable electronic service providers (banks, large retailers, government authorities) usually do not use e-mail to distribute software or send password change requests. Messages with such content are always sent within the e-banking platform or other applications. If you receive such an e-mail, treat it as a threat and take all the necessary precautionary measures.
  • Follow the manufacturer’s instructions (Apple, Google, Microsoft) and make sure that you have installed on your computer (i) the latest security updates, (ii) appropriate antivirus software and turned on (iii) the firewall
  • Do not open e-mails or attachments from unknown senders. Do not open e-mails or attachments with unusual content, even if sent from a seemingly known source.
  • Do not install software from unverified sources. Avoid clicking or confirming in advertising banners and windows (“OK”, “Permit”, “Approve”, “I agree”, “I allow”).
  • Be careful with any free offers. Be very careful when using portable storage media (USB flash drives).

 

Below is a list of several providers of antivirus software, in alphabetical order.

F-Secure,

McAfee,

Norton,

NOD32,

Panda,

Sophos,

TrendMicro.

Most of these products are available at most computer and IT stores.

Additional information about the manufacturers and their products and the underlying principles of computer security and protection measures and anti-virus protection can be obtained from the manufacturers’ websites, which contain the latest news about the area. Most manufacturers also provide free demo versions, for a limited period of time or with limited access to the functionalities suite. All functionalities are only available in purchased products.

Other information can also be obtained from Microsoft’s website and certain professional journals, e.g. http://www.virusbtn.com/, http://www.infoworld.com/, http://techrepublic.com, which provide surveys of computer anti-virus protection, as well as security and protective measures

Any suspected loss, fault, abuse or theft of your computer or qualified digital certificate must be reported to Halcom CA without delay. In the event of suspected abuse or theft, the incident should also be reported to the police.