Our Security Practices
At DBS, we know that the confidentiality of your personal information and security is very important to you and we are committed to provide you with a safe and secure online environment for your banking needs.
Your transactions and information are protected by industrial strength security technology that is used by leading banks. DBS also implements a series of other security solutions like routers, firewalls and intrusion detection systems to safeguard your interests.
In addition, we continually take proactive steps to ensure that our security solutions are in line with enhancements and advancements in the industry. For example, we collaborate with major security solution vendors to ensure we are always kept abreast of latest information security technology developments.
Use of Secure Sockets Layer (SSL) for protecting DBS iBanking communication with DBS Bank.
'128-bit SSL' is an internationally adopted standard to ensure that the flow of information between you and DBS Bank (Hong Kong) Limited is under secure protection. The information is encrypted (changed to a code which cannot be read) before transmission. Only an authorized receiver with appropriate software can unlock the code, changing it back to the original readable information.
How do I check if the DBS iBanking Website is genuine?
You can check which website you are accessing by simply clicking the key / lock icon at the right bottom corner of your browser or VeriSign logo on the bottom of the logon page. A security certificate will immediately pop up on the screen. You can check the certificate for DBS Bank's information like company name, URL, certificate issuer, validation date, and encryption types, etc.
If you find any information that is different, or a Security Alert window appears on the screen when accessing our bank’s website (some examples are shown as below), please stop accessing the website immediately, and call our 24-hour Customer Services Hotline on 2290 8888 (press 6 and then 1, after selecting language).
Two Factor Authentication Login Process
Two factor authentication login process is in place for DBS iBanking to further enhance its security level. If customer has set “Use Secure Device and/or SMS OTP for all transactions”, apart from the double authentication measure of requiring customer’s DBS iBanking username and password on the login page, customer needs to input a SMS-based One Time Password (OTP) received by a registered mobile phone number or Secure PIN generated by Secure Device in order to access his account information or transact online.
DBS iBanking access is based on a unique username that cannot be duplicated by any other user on the system, a password tied to that username and a SMS-based One Time Password that is sent instantly to your mobile phone. The username and password combination is unique to each user. Our system requires an alphanumeric username (8 to 12 characters) and a password consisting of 8 to 30 characters with the combination of uppercase letters, lowercase letters and numbers. This makes it exponentially more difficult for anyone to guess the combination. What is more, the SMS-based One Time Password (OTP) will be issued to your registered mobile phone number as an additional authentication measure when logging on to DBS iBanking.
One Time Password (OTP)
We have made DBS iBanking transaction even safer with One Time Password (OTP) Authorisation. Apart from iBanking logon, certain transactions will also require an additional one-time Password that is sent via SMS to your mobile phone. Find out more about One Time Password
Automatic Logout Feature
When our system detects that your login session has not recorded any activity for 15 minutes, your active session of DBS iBanking will be automatically terminated. You will need to login again using your Username and Password if you wish to access the service.
Maximum Login Attempt
Your iBanking account will be locked when an incorrect Password is entered three times consecutively.
Regular Review and Audit
Regular security reviews and audits are conducted by internal as well as external auditors.
Constant and Vigilant Monitoring
We have put in place security surveillance systems to constantly monitor and detect any potential form of illegitimate activities on our network and systems.
A firewall is set up to help prevent unauthorized access by hackers.
Thank you for your feedbackLet us know how this article helped:
We're sorry to hear that.How can we do better?