Information Security
The Internet provides us with an easy access to information, entertainment and financial services, and allows us to go online shopping. However, the Internet has enabled intruders to devise new fraud schemes.
Jýsan Bank ensures reliable protection of its clients' assets, as well as their personal data. Today all actions of tricksters are aimed solely at clients, their carelessness and blind confidence.
Jýsan Bank uses the cutting-edge data storage, transfer and protection technologies
We undergo regular information security audits
Any payments and money transfers are subject to online monitoring
If you are victimized by swindlers, please immediately contact the Call Center at: 7711 (free if you call from a mobile phone)
The below is information that will help you minimize the risks and ensure safety of your personal data.
Protect yourself!
In no event shall Jýsan Bank contact you by telephone without a prior inquiry, or send any electronic messages or SMS, or request for details of your bank card, Internet Banking password, SMS-codes or any other personal data.
  • Do not give your SMS-code to anyone, including any person who pretends to be a Bank employee
  • Do not indicate someone else's mobile phone number as the trusted one
  • Do not inform anyone of your bank card details: 16-digit number, validity period and CVV/CVC (3-digit code on the back of the card). You should not publish details of your card in the Internet or send them via messengers either
If you receive any unwanted requests for confidential data, please inform the Bank to that effect
Types of Swindle
The essence of any fraud scheme is to steal a person's identity, be it bank details, SMS-codes required to access a bank card, or personal identification documents.
Phone Fraud
It has become widespread lately. A person calls the client and introduces himself as a Bank employee, usually, a member of Security Service. Under the pretext of a reported unauthorized card transaction, he asks to disclose the card details, as well as SMS-codes. In the situation of stress, phone phreaks appear to be quite convincing and give the potential victim no time to analyze the ongoing conversation. Usually the tricksters get telephone numbers from public sources – collect them from social media and find them in advertisements.
  • Never give your code from a SMS to anyone; the code is solely required to make payments and to transfer money
  • The Bank will never be the first to call you
  • Think long and hard before publishing your phone number on a public website or social media
  • The incoming telephone number can be the same as the Bank's one, it can be a hidden call from abroad through IP telephony
  • Focus on the accent of the person on the other end, as phone phreaks most commonly call from Eastern Europe
  • If you have any suspicions and doubts, cut the connection
Fishing is a type of Phishing is a type of Internet fraud aimed at stealing of data directly from a user by employing his/her carelessness. focused on theft of data, directly from the user, using inattention.

  1. Cloned internet shop or Internet Banking. A website could be replicated with much fidelity, however, its address in the address window would be somewhat different, as there would be some extra symbols. Furthermore, the website would have no security certificate, i.e. URL link beginning with https.
  2. False social media and messenger accounts. The scheme is similar to creating a cloned website. The client looks for the Bank's Support Service in social media to fix a problem, but runs into swindlers who, in turn, try to get his/her bank card details.
  3. Spamming. A letter allegedly sent by the Bank with a pressing request is received via email. For example, with the request to confirm details of a bank card.
  4. Surveys and prize drawing. False surveys are conducted in social media in the name of the Bank, when a major reward is promised for the answers. To receive the payment to a card, its payment details are to be specified. In case of a prize drawing, the victim is informed of the winning and asked to provide his/her card payment details in order to receive the prize.
  • Never conduct any payment transactions through websites unknown to you
  • Read carefully the URL address of the site, check if it is written correctly
  • If something on the site looks "crooked" or any design components are not in line with the general style, this may be a phishing site
  • Payment page must begin with "https" – this means the resource has a secured connection
  • Do not open any email attachments from unknown senders
  • Make sure that the Bank page is verified by the social media administration with an appropriate icon
Sale Advertisements
A trickster calls you in response to your advertisement for sale of an apartment, car, furniture or other property and informs that he is ready to make an advance payment to your card and for this purpose he requires your card details. Later the trickster asks you to disclose the SMS-code received to the seller's mobile phone, allegedly in order to confirm the money transfer.

There is also another variant, when the trickster publishes an excessively favorable offer for sale. When you call him, he informs you that an upfront payment is required to reserve the order. Once the trickster receives the money, he disappears.
  • Never provide a potential buyer with all the details of your payment card; to make a money transfer, the 16-digit number would suffice
  • If you receive an insanely favorable offer, be especially careful – most probably, it is a stunt of the crooks
Skimming is a payment card cloning by copying the magnetic stripe. It is a relatively old fraud technique, which has been gradually disappearing thanks to innovative technologies.

A duplicate card is made when the client uses an ATM in a foreign country. Fraudsters install a special device, so-called skimmer, on the ATM to read out the data from the card's magnetic stripe. A camera or an overlay keyboard is also installed to read out the PIN-code. However, cards issued in Kazakhstan have EMV chips, hence, it is possible to dispute fraudulent transactions and collect the money. Skimming was popular in the South Eastern Asian, East European countries, the USA and Latin America.
  • When using an ATM abroad, make sure that there are no irrelevant devices installed on the ATM
  • When entering the PIN-code, cover up the keyboard with your hand
  • Upon arrival to Kazakhstan, eliminate the risk of foreign transactions through the mobile application
  • Open a separate card for your foreign tours and top it up only when necessary
Credit Fraud
Fraud of this type involves obtaining a loan in the name of an unwitting person through manipulations with personal identification documents. As a rule, such loans are received from appliance shops or online from microlenders, which fail to conduct a borrower due diligence properly. The loan may be disputed, however it would take much time and efforts.
  1. Lost documents. Persons often apply to the concerned authorities with a delay to replace their lost documents. Fraudsters find a person who looks like the photo and have the loan issued with his/her help.
  2. Forged documents. In this case, lost or valid documents of an old template are used. The holder's photo is replaced with the fraudster's one.
  3. Intimate circle. It is a fraud performed by persons who have access to the others' documents, for example, documents of their relatives or colleagues.
  • Do not give your papers to any third parties
  • It is important to apply to the Public Service Center on a timely basis to replace the personal identity document lost
  • Availability of a credit score, hence, availability of your updated photo in the banks' databases, will help you protect yourself from credit frauds
Domestic Fraud
It is the most common fraud type, when family members, close relatives, colleagues or other persons from your immediate circle get an unauthorized access to your card.
  • Do not leave your cards and documents unattended, whether in the office or at home
  • Do not give your cards to any third parties; whether at a restaurant or at shop, any payment transactions must be conducted in your presence
  • Hold your card details, passwords to the Internet Banking and mobile application confidential
  • Open an additional card for your relatives to monitor all expenses
General Security Precautions
Information security measures are as important nowadays as personal hygiene. We recommend you as follows:
  • Install an antivirus software on your computer and have it updated on a regular basis
  • Use the latest version of your web browser to access the Internet
  • Use unique and difficult-to-guess passwords that should be at least eight symbols long. The password must consist of a combination of uppercase and lower-case characters, as well as figures and special characters
  • Update your passwords every 60 days, and do not use the same password for different websites or applications
  • Public Wi-Fi networks, for example, at airports, hotels and restaurants fail to ensure a sufficient safety level. Please avoid using them
  • Use a password with the automatic blocking functionality on your smartphone or tablet
  • Be careful when choosing and installing mobile applications, as a virus or trojan can be attached to the non-authoritative versions
  • Do not click on any links in email messages. Make it a routine to copy and paste the links in your browser
An error has occurred
For technical reasons, your application can not be accepted at this time, repeat the attempt later.
The application is accepted
Thank you, your application is accepted. Our manager will contact you very soon