What is the risk involved in this?

  1. Phishing: Most phishing tactics include technological deceit aimed to make a link in an e-mail clickable

    • An e-mail message from a prominent online store or Internet bank website informs you that your account has been hacked and must be updated, and provides a link to do so
    • So you click on a link in the message, and it takes you to a website that looks just like the real website; it is a fake login page. If you provide the account information, it will be forwarded to the attacker and may be abused
  2. Smishing: Receiving fraudulent messages from an untrustworthy source
  3. Vishing: Asking PII over the telephone
  4. Spoofed website: Misspell the domain like this- , like these
  5. Malicious link: Malicious links will conceal themselves behind the original link, with the help of shortened URLs. Like this
  6. Filter Avoidance: To make it more difficult for anti-phishing filters to detect text usually used in phishing e-mails, phishers have employed graphics instead of text
  7. Malware attacks: Attackers attempt to deliver malware via attachments and to trap you by sending fraudulent emails with attachments claiming to update your account information

How to safeguard:

  1. Do not respond to any Phishing (Email fraud), Smishing (Message fraud) or Vishing (Telephonic call fraud) communications
  2. Be cautious before visiting any financial institution’s website
  3. Before clicking any shortened URL, make sure that the communication is from a trusted source
  4. Put your pin yourself rather than handing over your card to the merchant location or service provider, such as a restaurant, to make your payment and check the bill twice
  5. When you are finished with the transaction receipt, do not discard it. Shred or tear it
  6. In case of fraudulent transition always call the respective bank or toll-free number which mentions on the official webpage of the bank otherwise back side of your bank credit card or debit card rather than the usual google search
  7. Make sure no one is seeing your finger movement while you input your PIN when using an ATM
  8. On-site cameras that could readily record your PIN should be kept an eye out for. While entering the PIN, try to keep your hand hidden
  9. Always keep your card’s PIN and data in mind, and report any loss or theft to the bank right away so they can temporarily freeze your account and stop any additional fraudulent transactions until you get a new card
  10. Never keep your credit card password in an ordinary folder on your computer or email account. If the account is hacked, there is a chance that an unauthorized transaction will occur
  11. When completing online payment, look for the security logo on the website to ensure that it is a secure site
  12. Directly download banking applications from the official bank’s website redirected URLs
  13. Do not download your banking app using links supplied to you via email or SMS
  14. Do not give out your card information over the phone or the internet to ANYONE, regardless of whether you know them or not
  15. Do not provide any card or personal information while answering a phone call from someone claiming to be from the card issuing bank or a linked organization
  16. Please get in touch with the numbers listed below within 1 hour if you suspect financial fraud

LinkedIn Feeds


Jayakrishnan is the perfect personification of a highly-skilled technology professional, turning out to be a versatile business leader, over the 25 years of his career span.

During the late ’90s, in his early years in the Indian Navy, he was pivotal in building and operating the best-in-class Network & cybersecurity solutions for the Naval Commands, apart for designing and implementing networking & wireless infrastructure and communication technology for Naval Air stations & Naval Aircraft carriers. Later in his corporate career, Jay has been instrumental in running and transforming globally dispersed IT operations, comprising of millions of endpoints and thousands of technology professionals, leading the entire Program Delivery, Technology Adoption and the Digital transformation. In Tesco Fresh & Easy – his past employers – he has led the design and implementation of complex and enterprise-wide IT Transformation Projects worth Millions of Dollars – And adding a feather to his coat of excellence, he has worked as the Head of Data Centre, Platforms and IT Security for QuEST Global Engineering – world’s Third largest engineering Services organisation. Jay has also been integral part of designing, building and transforming the global IT Infrastructure & mobility solutions across multiple Geographies, for various fortune 100 Organisations.

At Tecplix, as the co-founder and Director, Jay’s charter would be to lead and grow the Consulting Practices and the Technology Services Business. His focus areas would be Cyber Security, Hyper-Converged Platforms, AI, Dev Sec Ops, Advanced Cloud Services, Data Centres, Mobility, Automation, and IT Service Management, as Tecplix is well poised to lead large scale Consulting and Managed Services engagements in these areas.

Being a technology enthusiast, Jay spends most of his leisure time, bringing himself up-to-date on latest in the ICT domain. Jay is married to Reshmi and is the proud father of Suthirth.