Skip to navigation Skip to content

How we will get in touch with you

You may have previously received fake phone calls or emails from cyber criminals. For example pretending to be your internet company.  We don’t want you to be tricked by anyone contacting you and pretending to be from HTB when they are not.

 

HTB Contacting You

HTB may e-mail or phone you regarding your account or transactions with us.

If you receive any communications from HTB that you may be suspicious of, please check with us directly using only the contact details on the HTB website.

HTB will never phone or e-mail you asking you to:

  • Move your money or transfer funds to a new sort code and account number.
  • Move money to a so-called secure, safe or holding account.

 

We will never ask you to provide:

  • Your PIN details by phone.
  • Your full online password.

If in doubt, hang up and contact us using the details on our website.

 

 

Contacting HTB

If you are suspicious of contact details provided to you by e-mail or phone, visit our contact us page which contains our e-mail and phone contact details.

 

 

If you think you’ve been a victim of fraud

You should contact us right away either by phone or email using only the contact details published on our website if you think you've been a victim of fraud. We can then guide you with what to do next.

 

 

Spotting a fake e-mail

Criminals are able to send fake e-mails impersonating another organisation and they may copy an organisations logo from a web site to appear legitimate.

Signs that an e-mail is fake include:

  • Often, they will not include your name but say “Dear Customer” instead.
  • They may contain grammatical errors.
  • They typically have an urgent call to action – “Reply with your card details now or your account will be closed”.
  • They may ask you to e-mail personal information.

If you receive an e-mail from us which seems suspicious you should contact us directly using only the contact details from our web site. Please avoid replying to the e-mail or using any phone numbers or links within it.

The National Cyber Security Centre Website provides some more guidance on how to spot fake e-mails. Please refer to the following website for further guidance. Click here for more information.

 

Your cyber security

We want you to be as safe as possible when using our services. Here are some steps you could take to protect yourself and your devices.

The information listed below are purely recommendations and it is up to the individual to ensure they take the necessary steps to stay safe online. Other information sources and software to keep you safe online do exist, but below acts as a starting point.

 

Use up to date software

You should consider using modern products which are automatically updated. The older the software is, the less secure it is.

Good software suppliers will provide automatic updates to fix security problems as they are discovered.

 

Web browser

Operating system

Automatic updates

 

Anti-Malware

Malicious Software – “Malware”

“Computer virus”, “ransomware”, “keyloggers”, “trojans”, “wipers” - these are examples of malware which can do harm to your systems and information.

There is a wide variety of anti-malware products available from established suppliers, some free and some already built in.

You should consider installing a reputable anti-malware product and using it in line with the supplier’s guidelines.

 

 

Logins and passwords

Your login details inform a system of the user permissions. You should keep login details safely stored and not share them.

The number of logins and passwords each of us has to remember seems to be forever growing, password management software can help you keep track of your information.

 

Find out more

To find out more about how to keep you, your information and your devices secure, have a look at the links below for further advice.

 

 

Web browser

Modern browsers such as Google Chrome, Mozilla Firefox and Apple Safari browsers are continually being updated to fix security problems as they are found.

Chrome is the free Web Browser from Google. You can install it on PC/laptop, on tablets and smartphones. Once it is installed it can automatically download and install updates to itself to fix security problems that are discovered. Updates will often introduce new features and improve performance as well as improve security.

The Firefox web browser from Mozilla is free to download and use. Like Chrome there is a version for PC/Laptop, tablets and smartphones. Firefox can also download updates automatically for security and performance improvements.

The Safari browser from Apple only works on Apple equipment – iPhone, iPad, MAC.

Your iPhone or iPad can be set to update automatically with security and performance improvements.

Microsoft’s browser is Edge and is pre-installed on later versions of Windows (Windows 8.1, 10)

It replaces their older Internet Explorer (IE).  Microsoft have released many versions of IE and all versions other than the current one – IE 11 – are not considered secure.

 

 

Operating systems

Microsoft Windows is probably the most widely known desktop/ laptop operating system

Others are Android and IOS for smartphones and tablets, MacOS for older Apple Mac computers and Linux.

As software companies bring out new versions of their products they stop fixing problems with older versions

Taking Microsoft as an example;

  • Windows XP, Windows Vista are no longer provided with security updates.
  • Windows 7 will also stop receiving security fixes in January 2020.
  • Windows 8, 8.1 and Windows 10 can be set to automatically install security updates.

If you are using an old unsupported version then your security maybe at risk.

Other common operating systems e.g. Android and IOS for smartphones and tablets, MacOs and Linux – also have old versions which no longer receive security updates and are now insecure.

 

 

Automatic updates

All computer programs (browsers and operating systems included) contain some mistakes – these are also known as ‘bugs’. Some of these can be used to break or bypass the security of the computer, tablet or smartphone. As these problems come to light the program writers provide security updates to fix the problems.

Search at the software supplier’s guidance on how to ensure that automatic updates are turned on to keep it up to date with security fixes.

©2015 Hampshire Trust Bank Plc is authorised by the Prudential Regulation Authority and regulated by the Prudential Regulation Authority and the Financial Conduct Authority. Our FRN number is 204601. We are a company registered in England and Wales, registration number 01311315. Registered office: 55 Bishopsgate, London EC2N 3AS. Hampshire Trust Bank, HTB and Hampshire Trust Bank shutter icon are registered trademarks of Hampshire Trust Bank Plc.