Soporte

Seguridad

¿Están seguros mis fondos con Luxon Pay?

Sí, utilizamos una variedad de métodos para garantizar que su dinero y su información personal permanezcan seguros en todo momento:

Niveles de encriptación estándar de la industria para toda la información confidencial. Centros de datos altamente seguros. Monitoreo automatizado de transacciones las 24 horas del día, los 7 días de la semana, más nuestros equipos de fraude y conformidad. Soporte las 24 horas del día, los 7 días de la semana para inquietudes en el momento.

¿Qué es la Autenticación Reforzada de Clientes (ARC)?

La forma en que su banco o proveedor de servicios de pago verifica su identidad o valida una orden de pago particular está cambiando. Estos cambios están diseñados para reducir el riesgo de que un estafador se haga pasar por usted para robar su dinero. Información para consumidores sobre Autenticación Reforzada de Clientes.

¿Está disponible la Autenticación de 2 Factores (A2F) en Luxon Pay?

Sí, para aumentar la seguridad de su cuenta, puede configurar SMS o Google Authenticator como A2F. Vaya a su cuenta, seleccione ‘Seguridad ‘ y Autenticación de 2 Factores para habilitar A2F y personalizar su configuración.

¿Cómo puedo administrar mis dispositivos de confianza?

Puede administrar sus dispositivos de confianza seleccionando ‘Cuenta’, luego ‘Seguridad’ y finalmente ‘Dispositivos de confianza’. Desde aquí, puede administrar sus dispositivos.

¿Puedo iniciar sesión en Luxon Pay con un proxy IP o VPN?

No, no puede iniciar sesión en Luxon Pay utilizando un proxy IP o una conexión VPN. Esto es como precaución para proteger sus fondos e datos personales. Es posible que su cuenta sea suspendida si intenta iniciar sesión a través de un proxy IP o VPN.

¿Cómo mantengo segura mi cuenta de Luxon Pay?

Para garantizar el más alto nivel de seguridad, por favor:

  • Asegúrese de nunca compartir la información de su cuenta, como la contraseña de la cuenta, con nadie más.
  • Asegúrese de tener activada la Autenticación de 2 Factores (A2F) en su cuenta.
  • Cree una contraseña fuerte que sea difícil de adivinar.
  • No utilice la misma contraseña en su cuenta Luxon Pay y en otros servicios en línea.
  • Cambie su contraseña regularmente.
  • Tenga cuidado si un correo electrónico parece sospechoso.
  • Si cree que alguien que no sea usted ha realizado una transacción, utilizando su cuenta, comuníquese con nuestro Equipo de Soportea través del Chat en Vivo inmediatamente.

¿Mis transacciones están protegidas con Autenticación Reforzada de Clientes (ARC)?

Sí, sus transacciones en Luxon Pay tienen autenticación adicional, incluida la administración confiable de dispositivos y la verificación por SMS.

¿Es posible activar/desactivar la identificación facial/por huella digital?

Sí, es posible activar/desactivar la identificación facial/por huella digital yendo a ‘Cuenta’ y seleccionando ‘Seguridad’. Aquí puede activar o desactivar estos ajustes.

Cómo puedo proteger mi cuenta cuando inicio sesión a través de una computadora pública.

Cuando inicie sesión a través de su aplicación de escritorio, asegúrese de desmarcar la casilla “Agregar a dispositivos de confianza” si está utilizando una computadora pública.

What is Authorised Push Payment (APP) Fraud?

Authorised Push Payment Fraud is when scammers trick people or businesses into transferring money manually. They pretend to be trustworthy figures like banks or solicitors. These scams are widespread, targeting high-value transactions. Automated fraud is increasing. Victims transfer money without realising it, leading to significant financial losses. Globally, APP Fraud is common. It impacts people and businesses. Fraudsters use tricks like impersonation to sneak in payments without victims catching the scam. Authorised Push Payment fraud requires convincing payers to allow payments under false pretences. Scammers pose as trusted entities, such as your bank or a company representative.

How Does Authorised Push Payment Fraud Work?

APP fraud involves manipulating victims into approving payments to appear legitimate. The fraudster investigates, gathers personal details, and deceives victims, often impersonating trusted entities. Victims unknowingly initiate irreversible payments. The fraudster quickly withdraws funds, making the recovery challenging.

Criminals also use varied tactics, such as phishing. They also elaborate schemes like romance scams. They exploit a sense of necessity, claiming urgent needs or emergencies. This pushes victims to comply hurriedly. The urgency, misrepresentation, and emotional manipulation convince victims to approve payments. This enables fraudsters to get stolen funds quickly.

Below is how Authorised Push Payment Fraud works:

  1. Deceptive Contact: Scammers pose as trusted entities, often through emails or phone calls.
  2. False Urgency: They create a sense of urgency, pressuring you to act quickly.
  3. Fraudulent Instructions: You receive instructions to transfer money, believing it’s a legitimate request.
  4. Account Exploitation: Scammers exploit your trust to access funds directly from your bank account.
  5. No Recourse: Unlike unauthorised transactions, you willingly transfer money, making it challenging to recover funds.

What are the Types of Authorised Push Payment Fraud?

Authorised push payment fraud comes in various forms, all centred on deception. Here are specific types of scams, each exploiting misrepresentation, impersonation, or social engineering:

  1. Invoice Scam
    – Victims pay a fake invoice, misled by social engineering and falsified documents.
    – Targets regular payments or tricks businesses into changing payees.
  2. Romance Scam
    – Fraudsters forge romantic connections to exploit victims emotionally.
    – Often culminates in Authorised Push Payment Fraud, with requests for real-time money transfers.
  3. Personal Relationship Scam
    – Similar to romance scams, fraudsters impersonate family or friends.
    – Urgency and personal information are used to convince victims to send money quickly.
  4. Property Funds Scam
    – Targets property purchases, with fraudsters manipulating payee information.
    – Infiltrates real estate transactions through false documentation and social engineering.
  5. Account Takeover Fraud
    – Criminals gain direct access to victims’ accounts for fraudulent activities.
    – Enables fraudsters to perform authorised push payments without victim authorisation.
  6. Contractor Scam
    – Deceptive home renovation scheme where victims pay the fraudster instead of the real contractor.
    – Fraudsters use phishing to gather renovation information, submit a fake invoice, and disappear with the payment.

What are Common Examples of APP Scams?

  1. Home Renovation Scam
    Criminals spot a house under renovation and learn about the homeowner and builder. They send a fake invoice, seemingly from the builder, redirecting funds to their account. The scam is only noticed when it’s too late.
  2. New Bank Details Scam
    Fraudsters target a business, posing as a supplier. They notify a change in bank details for future payments. The company updates the information, unknowingly directing payments to the fraudsters until the deception is discovered.
  3. Property Purchase Fraud
    Scammers target property buyers, intercepting emails between them and professionals. They alter bank details on crucial documents. During a transaction, funds intended for the property payment end up in the fraudster’s account.
  4. Familial Impersonation Frauds
    Someone gets a payment request, seemingly from a family member in urgent need. Eager to help, they send money without confirming the email. Later, it turns out the family member is unaware, and the funds land in the hands of a scammer.
  5. Relationship Scams
    Fraud often preys on social media relationships. A person bonding with someone on Instagram is persuaded to send money via a payment platform. After the transfer, attempts to reach the “partner” fail; the Instagram account vanishes, leaving the victim deceived and heartbroken.

How can you protect yourself from potential scams?

  • Keep your One-Time Passcodes (OTPs) to yourself. Never share them with anyone calling you, no matter how legitimate they may seem.
  • Your PIN should never be shared with anyone.
  • Don’t give personal details over the phone unless you’ve been able to positively identify the caller to be genuine – especially if you aren’t expecting the call.
  • Check your account regularly to be sure that you recognise all the activity. If there are any transactions or changes to your account that you don’t recognise, contact us immediately.
  • Use a variety of passcodes and PINs for your account. Make sure they are not easy to guess.
  • Regularly change your online passcodes. Try to use a combination of uppercase and lowercase letters, as well as numbers and special characters.
  • Keep your contact details up to date. This means we can contact you promptly if necessary.

 

It’s important to keep an eye out for potential fraud or scams. If you have any doubts or concerns about the safety of your account, please contact us.

¿No encuentra lo que busca?

Chat en vivo 24/7

Hable directamente con un miembro de nuestro equipo haciendo clic en el círculo pequeño en la esquina inferior derecha.

Correo electrónico

Envíe sus preguntas a nuestro equipo de soporte por correo electrónico support@luxon.com.

Escriba ahora