Retour à l'accueil

Retour à l'accueil

 

Menu de navigation principal

Filbanque : your accounts

:

:

Security information

Find out more  Subscribe

Menu de navigation secondaire

Identification

> cic.fr: Banque Transatlantique > Identification

Personal Security information

Protect your personal data and your computer | Site security | Security on the Internet | Miscellaneous fraud | Glossary

Suite à la recrudescence des tentatives de piratage sur Internet, nous vous demandons de prendre connaissance des informations suivantes.

Le CIC ne vous demandera jamais :

Le mot de passe de votre compte de messagerie e-mail :

Non, Jamais Non, Jamais

Gardez-le secret ! Vous avez ainsi la garantie que personne d'autre que vous n'ouvrira vos e-mails.

En effet, pour valider certaines opérations sensibles, nous vous adressons des codes de confirmation sur l'e-mail que vous nous avez communiqué.

L'accès à votre messagerie doit rester sécurisé par un mot de passe uniquement connu de vous.

Les informations de votre carte bancaire :

Non, Jamais Non, Jamais

Le seul cas où vous êtes amené à fournir ces informations, c'est lorsque vous effectuez un paiement initié par vos soins sur un site marchand.

Donner ces informations dans un autre contexte permettrait à des personnes mal intentionnées de payer leurs achats en ligne avec votre carte bancaire !

L'ensemble des clés de votre Carte de Clés Personnelles :

Non, JamaisNon, Jamais

Pour protéger certaines opérations sur notre site bancaire et nous assurer de votre identité, nous vous demandons de renseigner UNE SEULE CASE de votre carte de clés personnelles.

En aucun cas nous vous demanderons de renseigner plusieurs ou toutes les cases à la fois !

Si vous êtes confronté à cette demande il s'agit forcément d'une tentative de vol de votre carte de clés personnelles ne saisissez alors pas les informations demandées.


A qui dois-je signaler les mails de phishing ?

Si vous pensez avoir reçu un mail de phishing se faisant passer pour un mail du CIC, et vous demandant de vérifier et/ou de fournir des informations relatives à votre compte, faites suivre ce mail à l'adresse suivante:


Nous analyserons ce mail, et nous nous engageons à prendre très rapidement les mesures appropriées.


Si vous recevez un mail suspect concernant un autre site que celui du CIC, nous sommes malheureusement dans l'incapacité d'intervenir. Nous vous invitons à contacter le support technique du site concerné.

We pay the closest attention to site security and continuously strive to achieve the highest level of security. To draw the fullest benefit, you too must ensure that your own computer is secure. Meticulously follow the following instructions:

Ensure your computer is secure.

Install recent software updates for your computer's operating system and your Internet browser, including the latest security updates.

Your computer should have:

  • anti-virus software updated regularly and automatically to protect it against infection by viruses, worms or Trojan horses widespread on the Internet..If you haven't got anti-virus software on your computer yet, we suggest you install one from the this list:
    • Antivirus software AVAST
      This antivirus is free of charge for personal and non-commercial use.
      The installation process is made up of two steps:
      • Register on line. You will receive confirming email.
      • Follow the installation instructions provided in the email.
    • Antivirus software BitDefender
    • Antivirus software Kaspersky
    • Antivirus software Sophos
    • Antivirus software Panda
    • Antivirus software Norton Symantec
    • Antivirus software McAfee

  • firewall software to prevent unauthorised access by others to your computer and the data stored on it.

You can see additional information on http://support.microsoft.com/kb/129972/en/

Never indicate several PERSONAL KEYS at the same time

During access to a protected operation, we always ask you to enter a single PERSONAL KEY.

Go to the site directly.

Open your browser and enter the address of the web site in the address bar: for example, to access your personal zone, enter https://www.cic.fr/.
Add this page to your favourites.
Always use this favourite when accessing the site.

Carefully check the address displayed by your web browser.

Only the beginning of the address https://www.cic.fr guarantees you that you really are on our secure site.
Before entering your login and password, you should make absolutely certain that the initial characters of the address are correct.
A fraudulent site address will be slightly different: for example, one less character such as in https://www.cc.fr/ (character 'i' missing) or as in https://www.cic.fr.autresite.com/ (last '/' character missing at the beginning of the address https://www.cic.f).

Download the CM-CIC trust bar.

As an indispensable supplement of enhanced identification, the CM-CIC trust bar is green when you are on a website of the Crédit Mutuel-CIC group.

Instructions for use and installation.
Download the instructions for use.
Install the CM-CIC trust bar.
 - for Internet Explorer (Windows 98/Me/NT/2000/XP/Vista/7: Internet Explorer 5.01 minimum),
 - for Google Chrome (Windows 98/Me/NT/2000/XP/Vista/7, Macintosh, Linux: Google Chrome 1.0 minimum).
 - for Firefox (Windows 98/Me/NT/2000/XP/Vista/7, Macintosh, Linux: Firefox 1.0 minimum).

Before identifying yourself, check that the trust bar has given you the green light.

Check the last connection.

Whenever you go to your personal zone, check the date and time of the last connection displayed. This enables you to be certain that nobody has connected to your accounts having possibly stolen your access codes.

Log out after every use.

Always end every connection to your personal zone on the site, by using the Log off button.

Never click a link in an unsolicited e-mail

Similarly, never enter your login and password after clicking a link in an e-mail received, even if the e-mail seems to have come from CIC.
This type of scam is often used by criminals to try to steal your confidential personal information (login, password, card number, etc.) with the aim of usurping your identity.

Delete suspect e-mails without opening them.

Do not open e-mails of unknown origin or attachments: they may be viruses, worms or Trojan horses that will then infect your computer.
In particular, never open files attached to an e-mail where the file name extension is .pif, .com or .vbs (or any other file name extension corresponding to a virus that we could have identified).
Install anti-spam software to avoid receiving unsolicited e-mails.
Destroy suspect e-mails without opening them.

Never give anybody your password or your PERSONAL KEYS.

We will never ask you by any means (email, telephone, post etc.) to give us your password, personal keys or other confidential information

Regularly change your password.

Create a secure password: avoid obvious names or numbers and PINs used by other departments.
When you first connect, change your password. We recommend you then change it regularly. If you are in any doubt and think someone might know your password, change it at once.
Disable semi-automatic entry and saving of passwords in your web browser.

Tell us your e-mail address.

If you have told us your e-mail address, you will be advised of transfer transactions taking place on your account.

 

Back to top of page

 
Implementation