At MEPS, your security is our top priority. To help protect your information while using online payment services, we recommend following these essential security practices:
Online Security Best Practices
Install Trusted Security Software
Always use reputable, up-to-date antivirus and anti-malware software on all devices used to access online payment services.Create Strong Passwords
Use passwords that are at least 8 characters long, combining uppercase and lowercase letters, numbers, and special characters.Avoid Predictable Passwords
Never use personal information such as your name, birthday, or phone number. Choose passwords that are difficult to guess.Update Passwords Regularly
Change your passwords periodically to enhance your account security.Use Trusted Devices
Only access online payment services from secure and trusted devices.Never Share Personal Information
MEPS will never ask for your username, password, or full credit card number via email or SMS. Do not respond to suspicious messages requesting this information.Keep Your System Updated
Ensure your operating system, internet browser, and plug-ins are current. Regular updates help protect against known vulnerabilities.Download Apps from Official Sources
Only download mobile payment apps from official app stores such as Google Play or the Apple App Store.Secure Your Mobile Devices
Install mobile security software to protect your smartphone from potential threats.Avoid Storing Sensitive Data
Do not save passwords or personal information on your device or on paper. Memorize your login credentials when possible.
Security Guidelines
Understanding Common Security Threats
Being aware of potential threats is the first step in protecting yourself online. Here are some of the most common types:
Phishing
A deceptive attempt to steal your login credentials or account details by posing as a trusted entity through email, SMS, or messaging apps. Always verify the source before clicking on links or providing information.
Spam
Mass-distributed, unsolicited messages that often contain links to phishing sites or malware. Avoid opening emails from unknown senders, and keep your email address private when possible.
Keyloggers
Software that secretly records every keystroke you make, including passwords and personal messages. This information can then be sent to cybercriminals. Protect yourself with updated antivirus software and avoid suspicious downloads.
Types of Malware
Malware refers to malicious software designed to harm or exploit your device. Common types include:
Viruses
Programs that alter how your computer operates—often without your knowledge—and can spread to other systems.Worms
Self-replicating programs that spread through networks by exploiting security flaws. Unlike viruses, they don’t need to attach to other software.Trojan Horses
Malicious programs disguised as legitimate files or applications, giving attackers control over your device.Spyware
Secretly gathers personal information and may transmit it without your consent.Ransomware
Locks or restricts access to your device and demands a ransom to restore it.Rootkits
Concealed software that enables unauthorized access to your system, often hiding the presence of other malware.