Skip to main content

Mail from HDFC Bank to protect their customers from Phishing


This is a message from HDFC Bank to protect their customers from phishing. This is applicable to you even if you are a customer from other bank, credit card or insurance company.

"Falling prey to fraudsters online is common these days. This message from HDFC Bank is to inform and educate you on precautions you must take to ensure that you are not a victim of these fraudsters. .

Please carefully read through and adopt these safe banking practices.

Be careful when responding to emails:

You may get messages that seem like they are coming from HDFC Bank seeking confidential information. This activity is commonly known as ‘phishing’. Through such messages, you may be directed to websites appearing to be genuine, and asked to key-in your confidential information. Beware of such messages.

Please always bear in mind that:

  • HDFC Bank will never ask for any confidential information such as password, customer ID and so on over an email.
  • A phishing email will normally have a tone of urgency – like “Your account will be temporarily suspended” and therefore please “Login to keep your account active.”

Please remember the bank will NEVER send such emails to its customers.

  • If you are doubtful about the credibility of the email, please DO NOT click on any link provided in the email. This may trigger malicious codes being installed on your PC.
  • Before you share any information on a website in response to an email, always assure that the URL shown in the email matches the URL of the bank website. If it does not, you have valid reason to suspect there’s something fishy.
  • Check for the security pad lock icon at the bottom right side of the webpage, when you are connected to the NetBanking site.

Ensure your Personal Computer is protected:

Fraudsters send genuine-looking emails that contain viruses and Trojans (A Trojan refers to a program that appears to be safe, but hidden inside, is usually something harmful, probably a virus). These viruses / Trojans, install a malicious code on your PC without your knowledge. They extract your confidential information that fraudsters use to access your bank account.

Here are a few important action points that you should bear in mind:

  • Keep your PC updated with the latest anti-virus / anti-spyware software
  • Install a personal firewall on your PC to protect your account
  • Keep your PC updated with the latest security patches and, most importantly,
  • Do not click on links or open attachments in unknown or unsolicited (spam) emails
DO NOT transfer funds to OR share your account details with, unknown / non-validated sources:

Many phishing fraudsters are located overseas. They need a Money Mule to route the money into their country of origin. A Money Mule is someone who receives the illegal funds into his account, withdraws it and sends it to the fraudster after keeping his commission. This may be easy money, but is illegal. Such requests could come to you through emails, advertisements on genuine recruitment web sites, instant messaging / SMS, and advertisements in newspapers and even on social networking websites.

Follow these Dos and Dont's:

  • Do not be conned by emails offering you a chance to make ‘easy money’’, especially if it is coming from overseas
  • Check out the company making you a job offer if any fund transfer to them is involved. Check their contact details to find out if they are genuine
  • NEVER share your bank details
  • Beware of ads / notices seeking ‘UK Representatives’ or ‘Agents’ to act on their behalf for a period of time
  • Should you get any suspicious email, IMMEDIATELY forward it to fake.email@hdfcbank.com

CAUTION: Remember, if you agree to participate in any such money transfer schemes for a commission, you are performing an ACT that is ILLEGAL.

Be aware, practice safe computing rules and protect your money.

Yours sincerely,

Vishal Salvi
Chief Information Security Officer
HDFC Bank"

Did you like the post ?
Subscribe to Management Accountant by Email

Regards,

Santosh Puthran


You may also like to read
  1. Identity Theft




Post a Comment

Popular posts from this blog

Throughput Accounting

Throughput accounting (TA) is an alternative to cost accounting proposed by Eliyahu M. Goldratt. It is not based on Standard Costing or Activity Based Costing (ABC). Throughput Accounting is not costing and it does not allocate costs to products and services. It can be viewed as business intelligence for profit maximization. Conceptually throughput accounting seeks to increase the velocity at which products move through an organization by eliminiating bottlenecks within the organization.


Cost (or Management) accounting is an organization's internal method used to measure efficiency. Since no one outside the organization uses such internal accounts for investment or other decisions, any methods that an organization finds helpful can be used.


Throughput accounting improves profit performance with better management decisions by using measurements that more closely reflect the effect of decisions on three critical monetary variables (throughput, inventory, and operating expense — defin…

Learning Curve Theory

Learning Curve Theory is concerned with the idea that when a new job, process or activity commences for the first time it is likely that the workforce involved will not achieve maximum efficiency immediately. Repetition of the task is likely to make the people more confident and knowledgeable and will eventually result in a more efficient and rapid operation. Eventually the learning process will stop after continually repeating the job. As a consequence the time to complete a task will initially decline and then stabilise once efficient working is achieved. The cumulative average time per unit is assumed to decrease by a constant percentage every time that output doubles. Cumulative average time refers to the average time per unit for all units produced so far, from and including the first one made.

Major areas within management accounting where learning curve theory is likely to have consequences and suggest potential limitations of this theory.


Areas of consequence:
A Standard Costing

Resistence to Change - Approaches of Kotter and Schlesinger

The Six (6) Change Approaches of Kotter and Schlesinger is a model to prevent, decrease or minimize resistance to change in organizations.
According to Kotter and Schlesinger (1979), there are four reasons that certain people are resisting change: Parochial self-interest (some people are concerned with the implication of the change for themselves ad how it may effect their own interests, rather than considering the effects for the success of the business)Misunderstanding(communication problems; inadequate information)Low tolerance to change (certain people are very keen on security and stability in their work)Different assessments of the situation (some employees may disagree on the reasons for the change and on the advantages and disadvantages of the change process) Kotter and Schlesinger set out the following six (6) change approaches to deal with this resistance to change: Education and Communication - Where there is a lack…