BLIK is a fast and secure payment method on the Internet and in stationary stores. The BLIK code is used to initiate a transaction - after acceptance in the Bank's mobile application the transaction is carried out and money is withdrawn from the account.
However, remember that sharing the BLIK code with a third party may result in the initiation of a transaction on your behalf by another person - e.g. a fraudster. Providing the BLIK code to unknown people on the Internet may lead to the theft of funds from the account and loss of savings. Therefore, never share the BLIK code - even with a friend on social media or a seller on an advertising portal, and if you have already done so - verify the transaction data before confirming it in the bank's mobile application.
Good online habits
A friend in need?
If a friend or family member asks you for a BLIK code, make sure you are talking to the right person. It's best to call her and ask if she just wrote to you. If your friend does not answer, ask him or her in the chat about something that only you and him know or suggest that you make him a BLIK transfer to the phone. Do not send the code until you have verified the identity of the other person.
The seller is asking for the BLIK code?
Remember that the BLIK code is used to authorise the transaction and you cannot send funds to anyone by entering the BLIK code. To use the BLIK code, you need a payment system that will process a transaction such as Payu, Przelewy24 or Tpay. Therefore, if on one of the sales portals a user asks you to provide him with a BLIK code, he will most likely use the code to withdraw money at an ATM or make purchases in the online store himself. And by confirming such a transaction in the banking application, you lose your money and fall victim to fraud.
Remember these rules
protects your social profiles and the accounts you use on the Internet from attempts to access them. Access to them is protected twice: with a password and a code sent via SMS or an authentication application.
always check the transaction summary before confirming the transaction in your application. There you will see the amount that you are authorising and often also information about the store where the purchase is being made or the ATM from which the money is being withdrawn.
always confirm the identity of the person who writes to you asking for the BLIK code. Best to give them a call. If the call is rejected or you have any doubts as to the intentions of the other person, do not share the BLIK code with them and protect your money.
The advancement of the Internet has made it possible to use a wide range of products and increased competition on the market.
By using BLIK payments, we can make transactions quickly, conveniently and safely. However, one should remember about dishonest network users who try to cheat, for example by publishing fake ads on auction portals or by listing online shops whose aim is to obtain funds. Therefore, when buying online, always follow the safety rules and good practices so as not to fall victim to fraudsters.
Remember these rules
Install an antivirus program that will allow you to safely use the Internet.
Verify the seller and/or store. Read the shop or seller reviews and the reviews of the products you receive. Also make sure that the store has an SSL certificate that confirms the credibility of the website and encrypts confidential information provided during shopping.
Check your transaction summary before confirming it in your banking app. In the summary you will see the amount of the purchase and often also the name of the store where you are buying from.
Be careful when dealing with a seller outside of the shopping portal and do not give them money directly. Also, do not click on suspicious links, where you are asked to enter your payment card details or log in to your bank.
Use payment systems that are part of online stores and allow you to safely carry out transactions. The funds will then go to the seller after completing the order.
The phone is now a small computer that each of us has in our pocket. It allows us to connect with the world from anywhere and is already an integral part of our everyday life.
We collect most of the data on the phone, which makes our lives easier, but is also an attractive target for cybercriminals to attack. All personal and financial data can be used by criminals to steal funds from our account, steal our identity or create a basis for deceiving others, e.g. our friends. Therefore, we must take particular care of the security of our phone, and security such as a screen lock or anti-virus software is a must.
Take care of security
The phone is used by us every day for every smallest activity, so it is so important to remember about good habits online and ensuring the security of your data.
Remember these rules
Enable touch screen lock,
preferably biometrics or PIN, and automatic screen lock.
Set hard passwords
for important applications and folders.
Install and update
antivirus software on your phone.
Do not leave the device
to public Wi-Fi networks.
the operating software and the applications you use.
Turn off Bluetooth,
when not in use.
Do not install applications
from outside the official stores of smartphone manufacturers, e.g. Google Play or the App Store.
Encrypt the device if possible
and enable the option to remotely wipe the device or its location.
Restrict application permissions
to the necessary minimum.
Don't click on suspicious links
Cybercriminals do what they can to obtain data and funds - using phishing and smishing.
They often send mass mailings or text messages prompting the user to click on links that link to malicious sites and end up stealing data or funds. A large proportion of e-mails or text messages are sent en masse, but cybercriminals sometimes observe their victim by adjusting e-mails or text messages so that the victim's vigilance is put to sleep. For example, they pretend to be an e-mail that the victim regularly receives in his inbox. Therefore, vigilance, limited online trust and link verification are good practice to ensure security in a dynamic world.
Remember these rules
Regularly update your antivirus software - this is the basis of online security.
Enter the website address directly in the browser to verify its certificate. In fake SMS messages and e-mails, the so-called tiny-URL, i.e. shortened website addresses are often used, so in the case of banking, courier, health or office services, never use the links provided.
Use additional tools to ensure security and the ability to verify suspicious links – e.g. VirusTotal.
Never click on links in e-mails and text messages that seem suspicious.
Always verify the sender: check the email address or phone number from which the message came.
Pay particular attention to e-mails, text messages and messaging messages motivating you to take the next steps immediately, most often clicking on the link sent or opening an unexpected attachment.
Check grammar and spelling - dangerous messages with malicious links and attachments usually contain errors or lack Polish characters.
Verify the caller from a "government office"
Phone calls from a bank or a government office - once a reliable communication channel - is also used these days by criminals to steal funds.
Criminals pretending to be calling from an office/bank number call and use social engineering to persuade unsuspecting victims to perform a specific action - providing login details, installing software or withdrawing funds and depositing at an ATM to a special account. The key to avoiding this type of scam is limited trust and verification of who is calling.
Remember these rules
Do not click on links in emails and text messages that seem suspicious.
Do not install additional software at the request of an "office/bank employee" - especially if you do not have it specified in the contracts.
Do not withdraw funds from an ATM and do not make a return deposit using the BLIK code provided by the "employee".
Familiarize yourself with customer service procedures: if identity verification deviates from the procedure, hang up.
If you have doubts about the contact from the office/bank, hang up and make a call to confirm the consultant's identity and the reason for contact.