How does Spotii protect my account?
At Spotii we are committed to keeping our customers safe and secure by utilising some of the best processes and technology available. Here are some of the ways we help keep you safe and secure.
Our fraud system identifies unusual activity on your account. If a suspicious transaction is detected, our security experts are alerted so they can take action.
Spotii uses a range of security measures including:
- ID verification to prevent the risk of fraud. You may be asked to capture ID documents in order to verify your identity or purchases.
- Single factor authentication when an account login is made from an unrecognised device.
When personal information is captured on our website we use encryption to protect your information. You can check the security level of a web page by clicking on your internet browser's padlock or key icon.
Types of Cyber Crime
Identity theft occurs when someone uses your personal information without your permission to establish a new account, apply for a loan, or gain access to an existing account. Identity thieves may use a variety of methods to access your personal information, including:
- Steal wallets and purses containing your personal identification. For example an ID card or bank cards
- Steal your mail, which may include bank and credit card statements or other personal information.
- Use personal information you reveal on the Internet.
- Send false emails pretending to be from your bank to trick you into revealing your personal information and passwords. This is known as Phishing.
Most scams ask you for money or your bank account details in return for a reward which never arrives. A common type of Scam is the Remote Access Scam, which involves a request to download software or a mobile app which grants the scammer access to your device. It may include an attempt to deceive or coerce you into making purchases that will benefit the scammer, such as purchasing digital gift cards or crypto currency.
Scams are becoming more elaborate and come in other forms, such as online, SMS or unsolicited phone calls. The objective of the scammer is to obtain your personal details by impersonating reputable companies to gain access to your accounts.
Phishing is a way Cybercriminals trick you into revealing your personal information such as passwords, account, identification details or credit card numbers.
Cybercriminals often impersonate well known businesses that you are likely to deal with such as financial institutions, utility companies, telecommunications companies and government agencies.
Malware is the term used to refer to any type of code or program that is used for a malicious purpose. Cybercriminals use malware for many different reasons. Common types of malware are used for stealing your personal information, holding your computer to ransom or installing other programs without your knowledge.
How To Protect Your Security Online
As online presence is increasing, it’s important you know how to protect yourself against cyber threats and manage your account security.
Below are some useful techniques to protect yourself online
- Ensure you have the most up-to-date software installed on your mobile and electronic devices as well as your personal computers. For more information on how to update an iOS or Android Device, please refer to (tab below)
- Use Multi-factor Authentication or Two-factor Authentication (2FA) to provide an extra layer of security.
- Set strong passwords and change them regularly. Use a combination of numbers and characters, including uppercase and lowercase in your password to make it more secure.
- Keep yourself informed about the latest cyber security risks.
Avoid becoming a victim of scams and cyber crimes by:
- Avoid opening suspicious texts, pop-up windows or clicking on links to attachments in emails. You should report it as spam and then delete the contents. If unsure, verify the identity of the sender contact through an independent source such as an online search.
- Not downloading and installing apps or software to your mobile device or computer at the request of an unsolicited caller. Spotii will never contact you and request you to do this.
- Stop and think before you click on links or attachments in emails. Spam emails often look legitimate but they can be used to carry viruses and other malicious software.
- Never disclose any personal, account and password information via SMS, email or web links.
- Check your account transactions regularly and report any suspicious or unauthorised transactions to Spotii or your bank promptly.
- Handle unsolicited calls with care. If you’re unsure about the legitimacy of the call, hang up and call back on an official phone number.
If you think your Spotii password has been compromised, change it immediately and contact us.
How to Report
At Spotii, we understand how important it is to protect your security and personal information. As a valued customer, we want you to know how you can reach out to us if you are concerned about your online security.
If you believe you have received a Spotii scam/or phishing email, you can report it by forwarding the email to email@example.com
Do Not click on any links or open any attachments in the email.
If you responded to or actioned a suspicious email, SMS, or phone call, please contact Spotii’s Customer Experience team immediately.
The following government resources can help you to stay safe, identify and report scam activity.
- [Regional content – only applicable to KSA] Stay on top of the latest scams by visiting the Saudi Data & AI Authority
- [Regional content – only applicable to UAE] Refer to the consumer tip issued by the Central Bank of the UAE for more information
For Information on how to update the software on some common mobile devices, refer to the below links: