There is also a lot of "learning" in setting passwords for credit cards. Many cardholders like to use their birthdays, ID numbers, mobile phone numbers, etc. As a password. Insiders said that this password is "not rich enough" and it is easy to be "guessed".
In fact, some banking systems no longer allow cardholders to set "6 passwords of 1" and "6 passwords of 8" for bank cards, and some banking systems will automatically prompt cardholders to modify the set simple passwords. For example, in the telephone banking system of a joint-stock bank, if the inquiry password entered by the cardholder is his/her birthday, the system will voice prompt "The password you set is too simple, please modify it as soon as possible".
It is best for cardholders to set a "personalized" password, such as using the number of strokes of the address of the work unit and the number of strokes of their favorite songs as passwords.
Credit cards have not disappeared.
It is understood that some criminals will install card reading equipment near ATM machines and POS machines. When a credit card swipes a card on the card reading device, magnetic stripe information may be recorded.
UnionPay people said that when using ATM to withdraw money, cardholders should first pay attention to whether there are foreign objects near the ATM. According to its introduction, the current ATM card slot is not flat, and it is not easy to install the card reader. The wave-like card entrance also makes the card information difficult to be stolen.
Pay attention to the cashier's every move when using the POS machine to make sure that the card is not out of sight.
Personal information should be kept confidential.
It is understood that the confidentiality of personal information is very important when conducting offline transactions such as telephone banking and online banking.
UnionPay people said that the first thing cardholders need to keep confidential is personal account information, including registered name, registered password, user name, ID number, telephone number and communication method. This information can be combined to complete some transactions, so it is necessary to prevent phishing websites from stealing this information. At the same time, some related information also needs to be kept confidential. Nowadays, many websites require users to register with their own mailboxes. For the convenience of memory, many citizens use the same registration name and password when registering on different websites, which is not conducive to information confidentiality.
However, cardholders need not worry too much. Most offline transactions using verification codes are small. In case of large transaction, you generally need to enter the mobile phone verification code.
Report the loss in time if there is any abnormality.
By using the SMS reminder of the bank, the cardholder can know the change of the amount of his credit card account in time, and once the card is stolen, he can detect it at the first time. Look carefully at the detailed consumption records sent by the bank, and you can be vigilant when you encounter consumption records that do not belong to you. Different banks have different regulations on the time limit of card loss protection, but most of them can provide fraudulent compensation 24 to 72 hours before reporting the loss.