Security

  • Türk Ticaret Bankası operates an Information Security Management System to safeguard information, one of the Bank's most valuable assets, while delivering banking services to its customers. In this context, the following activities are carried out:
    • Implements measures to ensure information security by considering core elements such as privacy, confidentiality, integrity, and accessibility of information.
    • Monitors developments in Information Technology and international standards closely.
    • Conducts necessary activities to ensure compliance with legal regulations and directives.
    • Performs risk analyses of information assets and manages these risks to maintain the uninterrupted continuity of information technology services used in banking operations.
    • Identifies and meets the human resources, process, and technology needs required to operate and keep the Information Security Management System up to date.
    • Plans information security awareness activities for the Bank's employees and conducts these activities regularly each year.
    • Conducts regular audits of the Information Security Management System and implements activities to ensure its continuous improvement.
  • In addition to the security measures implemented in our digital channels, such as internet banking, mobile banking, and the Customer Contact Center, we have outlined below the security measures and announcements shared with our customers regarding information security.Transaction Security on All Digital Channels
    • Ensure that your password has a high level of security. Strong passwords are difficult to guess and do not contain personal information.
    • Keep your personal information private. Do not share it with anyone, including Bank personnel, and ensure it remains confidential. Avoid sharing personal details written on your ID card via phone or email.
    • Do not write down your customer number and password in easily accessible places or share them with anyone.
    • Do not trust individuals who call you asking for your card information or any passwords. Bank personnel will never request your password at any stage of your transactions.
    • Your customer number and any passwords used in banking transactions are personal to you. Do not share this information with anyone, including Bank personnel.
    • Regularly update your passwords for all personal financial applications, including internet and mobile banking.
    • Keep your information used in banking transactions up to date.
    Internet Security
    • To access internet banking, type "https://www.turkticaretbankasi.com.tr" directly into your browser's address bar.
    • If you use a search engine to find Türk Ticaret Bankası A.Ş. for banking transactions, ensure that the address you are directed to is https://www.turkticaretbankasi.com.tr.
    • Verify that the webpage is encrypted with the SSL protocol, indicated by a lock icon. SSL encryption prevents third parties on the network from viewing or interfering with your transactions.
    • Use an up-to-date browser, such as Google Chrome, Mozilla Firefox, Apple Safari, or Opera.
    • Ensure that both your computer's operating system and browser have the latest security updates installed.
    Smartphone and Social Media Security
    • Regularly update your mobile phone's operating system and protect it with security software such as antivirus programs.
    • Only download our Bank's applications from secure application platforms.
    • For Apple devices, use theApple Store(This page will open in a new window), and for Android devices, use theGoogle Play Store(This page will open in a new window).
    • Avoid installing applications on your smartphone from unverified sources, and do not click on links in SMS messages from unknown senders.
    • Be cautious of links and referrals in misleading messages, campaigns, and advertisements on social media. Do not open links sent from fake accounts.
    Computer and Network Security                            
    • Your computer is a private digital resource that processes and stores all your personal information.
    • Always secure your computer with a strong password and do not share it with others.
    • Keep your computer updated and protect it with antivirus, spyware scanner programs, and firewall software.
    • Use only licensed operating systems.
    • Ensure that your operating system, antivirus software, and spyware scanner programs are always up to date.
    • Perform regular scans of your computer.
    • Avoid using unsecured wireless networks.
    • Do not conduct banking transactions over public networks, particularly in locations such as cafes and hotels.
    Security at the Customer Contact Center
    • When calling our Customer Contact Center at 444 6 882 or 0850 400 6 882, enter your Turkish ID number, tax ID number, customer number, and password as requested. Our Customer Contact Center representatives will never ask for your password at any stage of the process. Do not disclose this information during the call.
    • When using public or shared phones to dial the Customer Contact Center, ensure you manually dial the number and verify that no information you enter is saved in the phone's memory.
    • During calls, make sure you are not being observed or overheard by suspicious individuals nearby.
    • All calls made through the Customer Contact Center are recorded and securely stored by our Bank.
    • If you do not wish to receive services from the Customer Contact Center, you may inform your customer representative of this preference.
    • For all calls initiated by our Bank, you will be contacted via the phone number registered with the Bank. Therefore, please ensure your registered mobile phone number is up to date.
    • If you notice unauthorized transactions in your accounts or suspect that your passwords have been compromised, immediately inform your customer representative by pressing 0 at the Customer Contact Center.
  • Fraudsters use various methods to unlawfully obtain your assets through deception. Below are the most common fraud techniques and the precautions you can take against them:E-mail/SMS
    • Email and SMS scams are among the most frequently used methods.
    • You might receive an email that is specific or general but designed to pique your interest, or an SMS on your mobile phone that appears to be related to you. For instance:
    • “Your password has expired. Please click here to update it.”
    • “A suspicious transaction has been made on your card. If you are unaware of this, please click the link below.”
    • “To take advantage of our special loan offer, you can log in to your bank using the link below.”
    What should you do?
    • Our Bank never requests personal information via email or SMS. Avoid accessing banking transactions through links sent via these channels.
    • Do not open emails or attachments from unknown senders or those that appear suspicious.
    • Always verify the links you receive against our Bank’s official website address. If you notice any discrepancies, do not enter your information through these links.
    2. Telephone
    • Telephone fraud involves scammers posing as individuals from professional groups such as police officers, prosecutors, or bank personnel to gain your trust and obtain your financial information.
    • Fraudsters may attempt to deceive you by using background noises or keywords like “reward,” “penalty,” “loan,” or “criminal organization membership.” They may persuade you to send money or share sensitive information, such as your bank login details, SMS verification codes, or card passwords.
    What should you do?                           
    • Our Bank does not request personal information, passwords, or SMS codes via telephone. If such information is requested, do not share it.
    • If you have doubts, contact the nearest branch of our Bank or our call center.
    3. Social Media
    • The growing use of smartphones has led to increased social media activity, which in turn has brought new information security risks.
    • In this context, you may encounter campaigns on social media that appear tailored to you.
    • Fraudsters may attempt to obtain your financial information through advertisements with headlines like gift draws, give aways, promotions, or discounts.
    What should you do?
    • Our Bank does not conduct gift draws or offer exclusive promotions or discounts through social media.
    • Pay attention to the URLs used in social media accounts, compare them with official URLs, and ensure you access only legitimate links.
    4. Malicious Software
    • Malware that can infect devices such as computers, phones, or tablets can compromise your personal and financial data.
    • This malware can infiltrate your smart devices through emails, SMS messages, social media platforms, or when you click on unsafe links or download files from untrusted sources..
    • When fraudsters remotely install this malware on your smart devices, they can access your personal information and carry out financial transactions on your behalf.
    • If your smart devices exhibit increased battery drain, screen freezes, or unusual behavior, it is highly likely that your device is infected with malware.
    What should you do?
    • Promptly perform security updates on your computer and smart devices, and enable automatic updates.
    • Use licensed operating systems, software, and security programs. Avoid using rooted, jailbroken, or cracked devices with unsupported operating systems instead of the original ones.
    • Always download apps from official app stores on your mobile devices. Before downloading, check the number of downloads and user reviews. Malicious apps often have fewer downloads and negative or minimal reviews.
    • When installing an application on your computer or mobile device, carefully review the permissions you grant before quickly accepting them. Do not authorize apps that require full administrative access.
    • Avoid connecting to networks you consider insecure. Do not use free or publicly available wireless connections.
    • In your internet and mobile banking applications, activate restriction settings such as limiting usage by country, IP address, or time.
    • Security software may not always be able to remove malware. If necessary, reset your device.
    • If you suspect your computer or smart device is infected despite taking all precautions, contact a reputable and authorized technical support company for assistance.
    5.Use of Your Bank Account for Money Transfers
    • One method fraudsters use to launder and embezzle illicitly obtained funds is to rent individuals' bank accounts for a fee or send money directly to strangers' accounts, later requesting them to transfer the funds to another account under the pretense of a mistake.
    • Allowing your bank account to be used in the flow of illicit funds can make you an accomplice to this crime. Under the Turkish Penal Code, this constitutes a criminal offense, as the account holder consents to their account being used in such activities.
    What should you do?
    • Never allow anyone else to use your bank account under any circumstances.
    • If you notice any unauthorized activity in your account, immediately inform our bank, instruct it to return the funds to the originating account, and notify the judicial authorities without delay.
    • If you receive money in your account from an unknown person, inform the nearest branch of our bank or our call center and request the immediate return of the funds to the sender's account.