Managing Your Money Wisely

Monday 1 August 2016

FCMB New Enhanced Security For Web-based Transactions

One of Nigerian leading bank, FCMB, has recently introduced an enhanced security protocol for web-based transactions, aimed at ensuring an improved service and security of customers' funds from Credit Cards Hackers.

This protocol is a convenient and reliable means to authenticate all payment being transact or
carryout on the Web. This can only Pop up on Websites that are MasterCard Secure code enabled.

Henceforth, around May, 2016, all web based transactions performed using FCMB MasterCard on a MasterCard Secure code enabled website will be authenticated with an OTP (One-Time Password), that you create on the first MasterCard Secure code enabled website. If the password that you typed in is correct, your transaction will be successful. If not correct, you won't be able to bye-pass the authentication stage and your card will be block immediately after third (3)  attempts.
.
The customer will be required to input this OTP as a sign that the transaction is of authentic and approved of by the original account holder to complete the transaction.
And without the correct OTP provided, the transaction will not be completed rather The MasterCard will be block immediately after several attempts

Benefits of the MasterCard Secure code:


  • It helps protect customer's funds from unauthorized access and use.
  • It ensures additional level of online shopping security.
  • It is fast, simple and convenient. 

  • To ensure that customers bye-passed the OTP authentication stage, FCMB bank customers are expected to create "memorisable" OTP (One Time Password) on the first MasterCard Secure code enabled website


    If you have forgotten your OTP, you have to visit any of the FCMB bank branches to create a New OTP again and make sure you do not forget it again.

    Note: You should know to be careful in how you handle and manage your MasterCard in order to prevent undue and unauthorized access to your personal banking information by a third party.
    Share:

    2 comments:

    1. the objective is very well defined irrespective to the role of the secure code analysis. good one.

      ReplyDelete
    2. Thank you for sharing this informative and interesting article. Keep up the good work!


      Melbourne Web Designer

      ReplyDelete

    Recent Posts

    Unordered List

    Definition List