We secure your identity
We have multiple teams at Intergiro dedicated to keeping your account, identity and personal data safe. Below are some of the things we are doing —and which you can be a part of— to ensure a safe financial environment.
- Our modern on-boarding process is designed to meet all regulatory guidelines relating to the Know Your Customer (KYC) requirements. All documentation and data is protected and encrypted in our secure banking platform.
- Under the GDPR regulation, we store all personal data in secure and encrypted storage environments and we only share your data with our trusted partners to provide you with the best services possible.
- SCA - as part of the PSD2 (Second Payment Services Directive) requirements for Strong Customer Authentication, we apply secure authentication processes to secure your account and your transactions.
- Mobile device enrolment. Your mobile device is an effective way to verify your identity. You are required to verify your mobile number and enrol your device prior to using it for identity and transaction authorisation.
How you can protect yourself
- Make sure that you have the most recent version of the Intergiro app installed to take advantage of the latest payment and security features available.
- No security system is perfect all of the time, which is why it’s important for everyone —that means you, and all of us at Intergiro— to remain vigilant in order to keep each other protected.
- Be suspicious of unsolicited emails and websites
- Never click on links or opening attachments from unknown senders
- Hover over links to check their destination before clicking
- Only enter your personal information on secure websites
Beware of phishing scams in which someone poses as an Intergiro staff member and requests sensitive information such as your app PIN, card PIN, or passwords. Our staff will never ask for this type of information.
What is phishing?
Phishing is a criminal activity that employs fraudulent email messages and websites in an attempt to acquire sensitive information, such as login credentials and card details, from unsuspecting users. The emails and websites used in phishing attacks often look very similar to those of legitimate organisations, making them difficult to distinguish from the real thing.
The goal of phishing attacks is to trick users into divulging their personal information, which can then be used for identity theft, financial fraud, and other malicious activities.