Protect yourself online

Denne side findes ikke på dit sprog, og derfor vises den på engelsk.

When online fraud takes place it usually means extra effort from the bank and from the customer to stabilize and avert the critical situation. It may mean renewing bank access codes, re-ordering new cards as well as being faced with a financial loss. Avoid this by protecting yourself online.

Protect against malware Protect against phishing Protect against malware

Malicious software (malware) is any kind of unwanted software that is installed on your device (e.g. pc, tablet, mobile phone) without your permission or without you even knowing it. It can also be distributed through USB sticks so as a rule you should never use USB sticks that you find or borrow.

Malware is designed to damage or disrupt a system. It can also be used to give an online criminal control over a device or to steal personal information.

Recommended guidelines to avoid malware

Personal computer:

  • Protect your computer and applications with access codes
  • Keep your antivirus software and all other software updated at all times. What is antivirus software?
  • Always use a firewall on your device. What is a firewall?

Mobile phones and tablets:

  • Always keep your device in sight.
  • Lock the device with a code.
  • Before you travel abroad, make sure you have a telephone number for your phone operator that can be used from another country.
  • Backup your device regularly.
  • Write down your phones IMEI number. Read more about IMEI numbers

Specifically for smartphones and tablets:

  • Only install apps that you can trust.
  • Only connect to WIFI networks that you can trust.
  • Install a location detection app that can be used from another device in order to find your phone if it has been misplaced or stolen.
  • Update the operating system and apps on a regular basis.
  • Install antivirus software on your device if possible.
Protect against phishing

Protect yourself against online prying (phishing)

Phishing means the prying of personal, card or online banking data by e-mail, telephone, via pop-up windows or fake web sites. The aim with the phishing is to scam the user into sharing private information so that it can be used for fraud. Online criminals are also known to create fake pages where you are tricked into revealing your log in credentials.

Recommended guidelines to avoid phishing


  • Be critical of e-mails asking you to provide access codes and sensitive information. Financial transactions always take place in Nordea’s system after you have identified yourself.
  • Do not have your email address clickable if you have your own website - then the code can be easily collected, instead you could make an image that shows the email address.
  • Check if your email provider has spam filters to keep you from getting spammed.

Phone call or sms:

  • An unknown person may call and introduce as a large company employee requesting for your sensitive personal information or remote access to your device claiming to help you e.g. in some technical matter.
  • You should terminate the phone call instantly without revealing any personal information.
  • The request may also come in a format of SMS or chat message. Do not reply these either.
  • Despite the method, the person on the other end is a criminal who is attempting to steal money or personal information to be used in other criminal activities.
  • Reputable companies will never contact you by e-mail, chat or phone to ask this type of sensitive information.

Social media:

Phishing messages e.g. on Facebook may be delivered through the messaging system on the site or through an application designed to look like a harmless quiz, survey, or product giveaway. Phishing can also take place via email where you are requested to provide sensitive information that a bank or any other legitimate business would not ask over open email.

Hackers may also set up new profiles (identity theft) to gain access to people you know without your knowledge. Many users of Facebook and other social media believe that the site is ‘safe’ and that they only share information with their ‘friends’. But a lot of this shared information may in the hands of hackers be used to set up false identities.

Check the privacy settings on your accounts in the social media site so that information you post is only shared with the people you intend to share it with.
Treat communications received from colleagues or friends in the social media networks with the same healthy scepticism you apply to other email and phone messages.