www.investec.com Open in urlscan Pro
104.18.220.70  Public Scan

Submitted URL: https://www.investec.co.za/security-centre.html
Effective URL: https://www.investec.com/en_za/legal/know-fraud.html
Submission: On August 03 via manual from DE — Scanned from DE

Form analysis 1 forms found in the DOM

Name: searchForm

<form class="ng-pristine ng-valid" name="searchForm" autocomplete="off" novalidate="">
  <div class="row search-bar__wrapper search-bar__wrapper--rounded" ng-class="{'search-bar__wrapper--rounded': !isMobile}">
    <div class="col-1 d-block d-md-none search-bar__search-icon"></div>
    <div class="col-10 col-sm-8 pl-md-0 col-md-6 col-lg-8" ng-class="{'col-lg-11': simpleSearch, 'col-lg-8': !simpleSearch}">
      <input id="searchBarInput" class="js-search-input search-bar__input pl-md-3 pl-lg-4 ng-pristine ng-untouched ng-valid ng-empty" ng-model="query" ng-keyup="triggerSuggestions(query)" name="search-query" autofocus="autofocus"
        placeholder="Search Investec" type="search" tabindex="1">
    </div>
    <div class="col-1 d-none search-bar__close-icon"></div>
    <div class="col-lg-3 col-md-4 d-none d-md-flex search-bar__bu-tag-container" ng-hide="simpleSearch">
      <a id="searchBarTagDropdown" tabindex="2" class="search-bar__bu-tag-wrapper" ng-click="toggleBuDropdown()" ng-focus="runBuTagFocus($event)">
                                <div class="search-bar__bu-tag-copy ng-binding" ng-bind-html="selectedTag.label">All Results</div>
                                <span class="search-bar__bu-tag-chev" ng-class="{'search-bar__bu-tag-chev--open': buDropdownToggle}">
								</span>
                            </a>
      <div class="search-bar__bu-tag-dropdown-wrapper ng-hide" ng-show="buDropdownToggle">
        <div class="search-bar__bu-tag-dropdown-item-wrapper">
          <!-- ngRepeat: tag in businessUnitTags track by $index --><a class="search-bar__bu-tag-dropdown-item ng-binding ng-scope" ng-repeat="tag in businessUnitTags track by $index" ng-click="selectBuTag(tag)" ng-bind-html="tag.label" tabindex="2" ng-focus="bindFocusAction($event, tag)">All Results</a><!-- end ngRepeat: tag in businessUnitTags track by $index --><a class="search-bar__bu-tag-dropdown-item ng-binding ng-scope" ng-repeat="tag in businessUnitTags track by $index" ng-click="selectBuTag(tag)" ng-bind-html="tag.label" tabindex="3" ng-focus="bindFocusAction($event, tag)">Myself</a><!-- end ngRepeat: tag in businessUnitTags track by $index --><a class="search-bar__bu-tag-dropdown-item ng-binding ng-scope" ng-repeat="tag in businessUnitTags track by $index" ng-click="selectBuTag(tag)" ng-bind-html="tag.label" tabindex="4" ng-focus="bindFocusAction($event, tag)">Business</a><!-- end ngRepeat: tag in businessUnitTags track by $index --><a class="search-bar__bu-tag-dropdown-item ng-binding ng-scope" ng-repeat="tag in businessUnitTags track by $index" ng-click="selectBuTag(tag)" ng-bind-html="tag.label" tabindex="5" ng-focus="bindFocusAction($event, tag)">Corporates</a><!-- end ngRepeat: tag in businessUnitTags track by $index --><a class="search-bar__bu-tag-dropdown-item ng-binding ng-scope" ng-repeat="tag in businessUnitTags track by $index" ng-click="selectBuTag(tag)" ng-bind-html="tag.label" tabindex="6" ng-focus="bindFocusAction($event, tag)">Institutions</a><!-- end ngRepeat: tag in businessUnitTags track by $index --><a class="search-bar__bu-tag-dropdown-item ng-binding ng-scope" ng-repeat="tag in businessUnitTags track by $index" ng-click="selectBuTag(tag)" ng-bind-html="tag.label" tabindex="7" ng-focus="bindFocusAction($event, tag)">Intermediaries</a><!-- end ngRepeat: tag in businessUnitTags track by $index -->
        </div>
      </div>
    </div>
    <div class="col-12 col-sm-4 col-md-2 col-lg-1 d-none d-md-flex">
      <div id="searchBarButton" class="search-bar__btn-container" ng-click="gotoInput()">
        <a id="searchBarButtonAnchor" href="#" tabindex="3" class="search__button-wrapper" ng-focus="runSearchButtonFocus($event)">
                                    <button class="cta-primary search__button">
                                        <!-- Search -->
                                        <svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg">
                                            <ellipse cx="11.059" cy="11.059" rx="7.059" ry="7.059" stroke="white" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"></ellipse>
                                            <path d="M20 20L16.05 16.05" stroke="white" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"></path>
                                        </svg>
                                    </button>
                                </a>
      </div>
    </div>
  </div>
</form>

Text Content

___


Login
Contact
Search Created with Snap

Created with Snap

 * Home
 * Individuals
 * Business
 * Corporates
 * Institutions
 * Intermediaries
   
   
 * About Investec
 * Investor centre
 * Focus insights
   

All Results
All ResultsMyselfBusinessCorporatesInstitutionsIntermediaries


Suggested Searches (0)



RECENTLY SEARCHED



Popular searches

   
 * Private bank
   
 * Unit trusts
   
 * Careers
   





FRAUD PROTECTION


PROTECTING YOUR DATA, IDENTITY AND MONEY




MOST OF US THINK THE WORLD OF FRAUD WILL NEVER TOUCH US. UNTIL IT DOES.

In our increasingly digital age, cybercrime is on the rise. But not all fraud
relies on sophisticated technology. Sometimes a common, simple deception can
separate you from your money. 


When you know fraud, you are empowered to prevent it. Be vigilant, be proactive,
be secure.

 


HOW DO I REPORT FRAUD, CARD LOSS OR THEFT, OR SUSPICIOUS ACTIVITY ON MY ACCOUNT?


A Flourish data visualization




WHAT TO DO IF YOU THINK YOU ARE A VICTIM OF FRAUD



 1. Report your concerns to Investec
    
    Use the numbers above to report a lost or stolen card or if you have noticed
    suspicious activity on your account.

 2. Talk to the authorities
    
    We also urge you to report this to the authorities online at the following
    websites:
    
    If you are in the UK: www.actionfraud.police.uk
    
    In South Africa: www.safps.org.za (for application fraud or identity theft)
    

 1. 
 2. 




NAVIGATE TO:

How to protect myself from fraud
I’m suspicious of someone impersonating Investec
How does Investec protect me?
Read more on fraud prevention


 


 


WARNING: STAY ALERT TO CURRENT THREATS

BRAND IMPERSONATION OF INVESTEC AND OTHERS

Is someone claiming to be from Investec? Fraudsters may contact you by
telephone, email, SMS or text, letter or direct you to a website. These
communications may look legitimate, with similar-sounding names to a bank or
financial institution.

By adding official-looking logos, banking registration details and company
numbers, these well-crafted deceptions give the impression that everything is
right. If you’re not sure, call the head office switchboard, and never use
numbers supplied by the person you’re suspicious of.


If you’ve already transferred money or information to a fraudster, contact your
bank immediately. The bank may not recover all of it, but if you move quickly,
it will recover what it can.

We maintain a list of companies and people who claim to be from Investec. With
your feedback, we can keep everyone informed. You can review our full list of
fraud alerts here.

If you think you have been targeted, click here to find more information on
investment scams

CRYPTOCURRENCY INVESTMENT SCAMS

Fraudsters are taking advantage of the low-interest rates in traditional
financial services to market lucrative “investments” in Bitcoin or other
cryptocurrencies. You may be asked to make a card bank transfer to your
new “crypto wallet,” after which the fraudsters will disappear with your money
and the investment will never materialise.

Protect yourself by following these rules:

1. Always be aware of the risks associated with crypto investments

2. Do not transfer money to a cryptocurrency wallet that you didn’t set up
yourself

3. Check the FCA warning list to ensure you are not dealing with a fraudulent
investment provider

4. Always call the provider to verify the investment on an independently-sourced
number, not the one found in the body of an email or documents you have been
sent.

SUSPICIOUS TEXT MESSAGES (SMISHING)

Fraudsters are increasingly sending text messages that impersonate genuine
companies such as a tax authority, a postal service or even your bank. They may
appear to be genuine, but are designed to steal data or to get people to pay
them. This is called ‘smishing’ (SMS phishing).

In this case study we explain how some messages appear to be a small shipping
fee request from the Royal Mail, but are made to acquire private information and
target the recipient with further scams.

Always remember:


1. Never click on a link within a text message. Instead, call the organisation
on an independently sourced number to confirm if the message is genuine. Don’t
call the number in the text message.

2. If you want to access online banking, do so through the Investec app or
through Investec Online. Don’t use a website link someone has sent you.

3. Never respond to a suspicious message. Instead, block the sender’s number
using your device or contact your network provider and ask them to block the
number for you.




PLEASE NOTE, WE MAY SEND YOU EMAILS FROM TIME TO TIME. HOWEVER, WE WILL NEVER
SEND YOU AN EMAIL ASKING FOR YOUR SECURITY INFORMATION OR LOGON DETAILS, OR
DIRECT YOU TO A WEB PAGE THAT ASKS FOR THIS INFORMATION. WE WILL ALSO NEVER SEND
YOU AN EMAIL WITH A LINK TO INVESTEC ONLINE BANKING.




SEE THE MANY TYPES OF FRAUD AND SCAMS YOU COULD BE A VICTIM TO

A to Z of fraud


FIND OUT THE LATEST REPORTED SCAMS

Fraud alerts




HOW TO PROTECT YOURSELF AGAINST FRAUD

STAY ALERT

From email hacking and ‘phishing’ to fake unsubscribe buttons, find out the ways
fraudsters are trying to trick you.


 * Stay a step ahead of the fraudsters

PROTECT YOUR IDENTITY

Your personal details are valuable. Don’t respond to unexpected requests for
validation of your security or personal details.

 

 * Keep your personal and business data safe

PROTECT YOUR DEVICES

There’s no such thing as free wifi. Make sure no-one can access or install
malware in your computer and mobile devices.

 * Installing firewalls and antivirus

RECOGNISE MALICIOUS APPS

Malware is a term for various forms of malicious software. It’s transmitted via
email attachments and infected websites.

 * Beware of malware

USE INVESTEC ONLINE

Our online banking service is hosted on a secure 128-bit encrypted server. This
means that any information you send us is encoded for your protection.


 * Stay safe with Investec Online




 


 


WHAT WE DO TO PROTECT YOU


PREDICT, DETECT, PREVENT AND RESPOND

Looking after your security is a fundamental part of our business. We know that
you want to receive an exceptional client experience, and staying safe is
primordial.

As an Investec client, you benefit from the combination of our expertise in the
security, risk, and fraud prevention disciplines.

The threat landscape evolves every day, and we work hard to adapt our security
architecture, so as to manage associated risks.





OUR SECURITY PROGRAMME IS BROKEN UP INTO THREE MAIN COMPONENTS

Fraud prevention
Cybersecurity
Information security



FRAUD PREVENTION


FRAUD PREVENTION

The Investec Fraud team works to protect our business and clients from becoming
victims of fraud.

Investec has various layers of control, including prevention and deterrence,
detection and mitigation, repair and recovery, investigation, and learning.


To do this, the team uses industry-leading real-time fraud detection systems to
pick up potentially fraudulent payments.


The team is made of experienced professionals, who are part of various
fraud-prevention forums and groups, and regularly attend events and conferences
to stay a step ahead.


They also make sure that you, our client, is made aware of fraud threats with
education campaigns and alerts, and help train Investec colleagues to also
protect you, themselves, and our business from fraudsters.



CYBERSECURITY


CYBERSECURITY

Our Cybersecurity team actively seeks potential vulnerabilities within the
Investec application and infrastructure architecture.

These experts use constant research to stay at the leading edge of changes in
potential threats to the landscape of our technology and processes.

Using this knowledge, the team plays an important role in product development,
making sure that all applications are secure by design. 

They also raise new threats they identify with the Information Security teams,
to put preventative measures in place, and minimise potential cyber incidents.


INFORMATION SECURITY


INFORMATION SECURITY

Investec’s Information Security team is responsible for the systematic
implementation and monitoring of technology. 

The team maintains a close relationship with the Fraud and Cybersecurity
teams. They also meet security researchers and providers to ensure a
best-practice approach to mitigating risk. 


By closely monitoring the security landscape, the team makes sure that we know
about any threats, that we’re ready in case of incidents, and that we can
quickly address any vulnerabilities.




DATA TRANSPARENCY INFORMATION

Learn about Investec's fraud prevention philosophy, how we collaborate with the
wider industry, and our education and awareness initiatives. This is in line
with the FCA/UK Finance requirements.


How we prevent fraud




INSIGHTS FROM INVESTEC FOCUS

My money

20 Jun 2023

STOP. THINK. DON'T GET SCAMMED! INTRODUCING YIMA

In this video, Kevin Hogan (Investec Fraud Risk) discusses a new partnership
between Investec, Yima and the South African Fraud Prevention Services (S



My money

25 May 2023

DON’T FALL FOR INVESTMENT SCAMS

We have noticed an increase in online investment scams that target Investec
clients with joint UK and South African accounts.



Markets and economy

1 Mar 2023

SOUTH AFRICA GREYLISTED: WHAT DOES IT MEAN FOR YOU?

Find out what South Africa’s greylisting means for you, and what actions are
being taken by government to address the issues.

15 min read | 25 min podcast

Innovation

2 Oct 2022

HACKING TAKES A QUANTUM LEAP

With the advent of quantum computing, cybersecurity experts are having to
contend with new threats.

10 min read | 36 min podcast | 34 min video

My money

11 Jul 2022

A BEGINNER’S GUIDE – A WEBINAR SERIES FOR TODAY’S YOUTH

Our latest webinar series will help the young adults in your family (16 to 22
year olds) become financially savvy.



Beyond wealth

12 Apr 2022

COLLABORATION TO CLAMP DOWN ON ILLEGAL WILDLIFE TRADE SEES RESULTS

A first of its kind report in SA exposes the profiles and financial behaviours
of criminals illegally trading in wildlife.

8 min read

Markets and economy

28 Jul 2021

TRANSNET CYBERATTACK COULD HAVE CATASTROPHIC CONSEQUENCES

The shutdown of Transnet IT systems is wreaking havoc at SA ports that will
impact the sales and cash flow of importers and exporters.

8 min read | 9 min video

Business growth

28 Apr 2021

CYBERSECURITY SCORE CARDS WILL DIFFERENTIATE BUSINESSES AS ONLINE RISKS RISE

The world's transition to remote working and increased reliance on digital
platforms means heightened security risks for businesses.

5 min read

Innovation

1 Mar 2021

CYBERSECURITY – THE BUSINESS DIFFERENTIATOR OF THE FUTURE

Our panel tackles the challenges being faced in the world of artificial
intelligence, quantum computing, and the internet of things.

4 min read





 

 

 


PROTECT YOURSELF FROM FRAUD

Helpful tips about online banking, your computer, mobile phone and
other devices.

 * Investec Online
   
   
   
   Our online banking service is hosted on a secure 128-bit encrypted server.
   This means that any information you send us is encoded for your protection.
   
    * Your password protects your account from unauthorised access and no bank
      will ever ask you for it. Never email, write down or tell someone your
      security information or login details. 
    * The only time you will ever need to enter your Investec ID and password is
      when you log into Investec Online for your online banking at our website
      (Investec.com)
   
    
   
   TIMED LOG OUT
   
   Investec Online logs you out if you don't use the service for 10 minutes.
   This gives you added protection if you forget to log yourself out. However,
   we recommend you always log out and end your session by using the ‘Log out’
   button before closing the browser.
   
    
   
   DEACTIVATION OF YOUR LOGIN DETAILS
   
   We'll automatically disable your access to Investec Online if three incorrect
   attempts are made to log in using your details. This is to stop fraudsters
   making repeated attempts to get into your accounts.
   
    * Register devices that you wish to access Investec Online from. This will
      help us detect when someone is trying to impersonate you on another
      device.
    * Only access Investec Online from your own devices, not from public
      computers, as your details could be recorded.
    * Please don’t leave a computer unattended while logged into Investec
      Online.
    * Never log into Investec Online via any emails with hyperlinks or
      shortcuts.
    * Never save any login IDs or passwords in your browser or on any of your
      devices. Disable, refuse, or decline any onscreen prompt on your computer
      that asks if you wish the computer to remember your passwords.
    * We encourage you to create complex passwords that are difficult to guess
      and time-consuming for hackers to crack. It should only be known by you
      and kept in a safe and secure place. Please avoid family or familiar
      names, numbers, and places, such as birthdays, phone numbers – any
      information that can be found on social media or the internet.
    * Please check your monthly statements and balances carefully. Many
      fraudulent transactions are for regular small amounts that occur over
      several months, disguised as a subscription you forgot you had or did not
      cancel. Fraudsters would prefer to empty your bank account if you have a
      large amount of cash spare. If not, they will gratefully accept monthly
      donations.

 * Protect your identity
   
   
    * Your personal details are valuable. Don’t respond to unexpected requests
      for validation of your security or personal details, by phone, text, or
      emails.
    * Limit the number of personal details you share online (ie date/place of
      birth on social media sites etc)
    * Review what social media sites or Google and other search engines know
      about you – erase what you don’t wish to be known.
    * Create and use different passwords for each service provided by Investec
      and other financial service providers.
    * Protect your printed or physical information and destroy or shred unwanted
      personal documents, old paper statements, and credit and debit cards.
    * Never use complimentary computers in airport lounges and hotels to do your
      banking.
    * If you need to use Investec Online while travelling, use international
      roaming or buy a SIM card in the country you’re visiting. Remember, if you
      don’t have roaming on your phone, you won’t get SMS payment notifications
      and may not be aware of fraudulent transactions until you’re back home.
   
   
   
   ARE YOU TRAVELLING?
   
   Before travelling, contact our 24/7/365 global Client Support Centre or let
   your banker know that you’re away. We will be able to monitor your profile
   for any suspicious or fraudulent activity.
   
    
   
   You can also enter your travel dates on Investec Online and the App before
   your travel.

 * Protect your devices
   
   
   
   YOUR COMPUTER
   
    * Ensure no one has unauthorised access to your computer.
    * Use a password to access your own computer, restrict access to prevent
      programme installations.
    * Destroy or delete anything containing login details or security
      information, even if Investec has sent it to you.
   
    
   
   FREE WI-FI
   
   
   Please do not use free public Wi-Fi when trying to access your banking and
   online transactions.
   
   In fact, do not try to access any account that requires a user name and
   password – even social media, when using free Wi-Fi, because of ‘sniffing’.
   ‘Sniffing’ is the phrase used by fraudsters to capture data from your laptop
   or mobile phone. When you launch an app (especially those that have stored
   your user ID and password), your security details are re-sent every time you
   launch the app, sometimes in an unencrypted form. Then, when you view your
   email accounts or social media posts, your security details are captured and
   used by fraudsters, who begin creating a profile of you.
   
    
   
   REGISTRATION OF YOUR DEVICES
   
    * Always register your devices that require access to Investec Online. We
      will send you an alert if someone tries to register another device.
    * Please do not ignore that alert or simply accept the notice, as this is
      the beginning of someone attempting to take over your account.
    * We will also be alerted if you access the Investec Online from another
      machine, so please be aware and take time to register new devices and
      delete old ones.

 * Firewalls and antivirus
   
   
   
   Always Install a personal firewall product and antivirus protection product
   for your devices. The firewall sits between your computer and the internet
   and acts as a security guard, restricting what can enter and leave your
   computer. Hackers try to access or infect home computers by connecting to
   your computer while you’re surfing the internet. The best way to protect your
   computer from unauthorised connections from the internet is to install a
   personal firewall. There are several options on the market, some of which are
   free. 
   
   At first, the firewall may ask you what you want to allow in or out of your
   computer. However, it soon learns to make these decisions independently,
   based on the decisions you make early on. The most important point is never
   to allow anyone else to connect to your computer.
   

 * Malware
   
   
   
   Malware is a term for various forms of malicious software. It is transmitted
   via email attachments and infected websites. Here are the most common -
   
    * Key loggers – Programs that record all keystrokes performed on an infected
      computer. This gives the attackers access to anything that may have been
      typed in such as account numbers, passwords, and PINs. This is transmitted
      when you are online and the fraudsters can begin to take over people's
      accounts.
    * Spyware – Software that tracks and stores a person’s movements on the
      internet, then provides pop-ups based on a person’s spending habits, to
      lure them to a fake website in an attempt to trick them into entering
      their account details.
    * Ransomware – A nasty form of malware that encrypts all information on the
      infected computer and demands a ransom fee to be paid in order to unlock
      the data. This type of infection can result in significant data loss. 
    * Trojans – Running in the background and hiding from view, these programmes
      frequently open a ‘back door’ into a computer, allowing a fraudster to
      access information or take full control over the machine. This allows them
      to intercept banking details and passwords as they are keyed in.
    * Counterfeit or ‘cracked’ software – Acquiring ‘cheap’ computer operating
      or business software may not prove to be cheap in the long run, as
      fraudsters like to offer this online, but secretly add their own ‘added
      value’ – such as trojans/malware which can read your security details and
      passwords. Purchase genuine software. Keep your internet browser and other
      software on your computer up to date with the latest security patches, to
      protect yourself and your money. 
   
    
   
   MOBILE PHONE
   
    * Apps – Use only those ‘apps’ that are downloaded from official sites. Free
      apps from unofficial sources may have malware, the same as counterfeit or
      ‘cracked’ computer software.
    * Antivirus – Ensure you have an antivirus installed if your operating
      software allows it. Just like your laptop or main computer, keep the
      antivirus and software up to date. 
    * Jailbroken devices – Jailbreaking a mobile device is the process of
      removing the software restrictions embedded by the device manufacturer,
      which may include the security protection mechanisms. In order to keep
      your account information secure, you are not able to use the Investec
      mobile apps on a jailbroken device.
    * Passwords protection – Make sure you secure your mobile device by setting
      a passcode greater than a four-digit PIN or fingerprint scanning if your
      device supports this functionality. 
   
   
   
   LOST YOUR MOBILE PHONE?
   
   If you lose your device, call our 24/7global Client Support Centre to disable
   it, or disable the device yourself via Investec Online. Once disabled, it can
   no longer be used to access our online services.

 * Emails
   
   
   
   FAKE EMAIL MESSAGES OR PHISHING
   
   ‘Phishing’ is when fraudsters send thousands of emails in the hope that they
   will catch a victim. It just takes one to make it worthwhile. The email may
   look real, but there are always small clues to warn you.
   
    * What is the full email address used – does it look odd?
    * How are you greeted? Dear Customer / Your name / Nothing?
    * Does it ask you to log in from a link on the email?
    * Does it say there are security issues?
    * Does it advise you that it is urgent and immediate?
      
   
   Always take time to read an unexpected email. Fraudsters are counting on you
   being far too busy or worried so you don’t think clearly and will do what
   they request.
   
   SPOOFING AND HACKING EMAILS
   
   A ‘spoof’ email is where a fraudster will send you a Phishing email, but it
   is from a name you may know.  Well-known global corporates email formats are
   copied and fraudsters trick you into believing your package or order needs
   your attention by clicking on a link, to obtain your security details.
   
   Recently this has developed into sending specific emails (also called ‘spear
   phishing’). This might relate to a real estate sale or purchase or hospital
   expense, claiming to be from a lawyer and requiring your payment, to the
   attached bank details.
   
   Fraudsters obtain details through various means and can create a spoof mail
   that looks legitimate and you are expecting it, making it even easier for
   them to persuade you to make the payment.
   
   HACKING
   
   
   Fraudsters have obtained access to your email account and are able to read
   and create emails in your name. This means they can mail your friends and
   contacts, as well as knowing what financial deals you may have underway, and
   create that ‘spoof’ email to encourage you to make a payment. Please change
   your password if you see or receive any unusual activity.
   
   DON'T UNSUBSCRIBE ON EMAILS FROM RANDOM ADVERTISERS
   
   
   To check if your email is valid, fraudsters send a spoof/spam email with
   shopping, sports, or holiday offers. If you click to unsubscribe, they will
   then have a valid email address and can target you as they try to obtain more
   information about you.
   
   REVIEW YOUR SENT AND DELETED ITEMS FOLDER
   
   
   Take time to check your sent and deleted items folder on your computer. Are
   there messages you have not sent?  Your computer may have a virus or your
   email account may have been hacked or compromised.
   
   Don’t store confidential information in your email folders. Store personal
   documents and emails on your computer in a secure folder on your computer. 
   You can also securely store documents in My Briefcase on Investec Online. 
   
   ATTACHMENTS OR LINKS
   
   
   Avoid clicking on any links or opening attachments included in unexpected
   emails, texts, or social media messages. These may be disguised as a tax
   refund, parcel delivery, invoices to get you to click on them.

 * Text messages
   
   
   
   In the same way that email addresses can be spoofed, so can phone numbers.
   That way, it can look as though you’re receiving a call from a trusted
   number – even your bank’s genuine one. Text messages from spoofed numbers can
   appear in an existing thread of messages. 
   
    
   
   Recently, many consumers have been receiving fraudulent texts asking them to
   confirm a transaction they did not authorise, or verify a new beneficiary
   that has been added. However, the message will contain a link to click
   through to, if you don’t recognise the transaction. This leads to a phishing
   page, where victims are asked to input their details. Alternatively, the
   compromised site can download malware to your device.
   
    
   
    * If you get a message about account activity you were not expecting, call
      your bank immediately on a trusted number. 
    * Don’t click on links contained in this type of SMS.
    * If you want to access online banking, do so through the app or known
      website, which you can find on Google. 
    * You can also report suspicious texts by forwarding the original message to
      7726, which spells SPAM on your keypad.
   
   



South Africa
Channel Islands
India
Ireland
Mauritius
Switzerland
United Kingdom
United States

 * 
 * 
 * 
 * 
 * 

LEGAL INFORMATION

 * Accessibility
 * Legal
 * Know fraud

GET IN TOUCH

 * Contact us
 * Careers

OTHER INFORMATION

 * Investor relations
 * Investec Property Fund
 * Investec Property
 * Developer



© Investec 2023



We use cookies on our website to improve our services, keep our website secure,
and serve you more relevant content. Choose which cookies you consent to via the
buttons below. To find out more see ourCookies Policy

Accept all cookies
View cookies settings



MANAGE THE COOKIES WE USE AND SHAPE YOUR EXPERIENCE

Please indicate the categories you wish to consent to using the sliders below
and then choose "Confirm My Choices" to retain your preferences for future
visits. Please note that blocking some types of cookies may impact your
experience of the site and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

ESSENTIAL WEBSITE COOKIES

Always Active


These cookies are strictly necessary to provide you with services available
through our website and to enable the use of some of its features, such as
access to secure areas.

Cookie details‎

PERSONALISATION COOKIES

Personalisation cookies


These cookies enable the website to remember choices you make on it. This allows
a more personalised experience for features of the website that can be
customised and avoids you having to re-enter data in places.

Cookie details‎

EXPERIENCE AND INSIGHTS COOKIES

Experience and insights cookies


These cookies help us to deliver a better website experience for you by enabling
us to understand how our website is currently being used and where users are
struggling to get what they need.

Cookie details‎
Back Button


COOKIE LIST



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Confirm My Choices