General Information
Take strides to ensure the security of your work with WebMoney e-purses by observing the following simple rules,
as the set of measures designed to protect your personal computer will help to avoid any unpleasant situations.
Online thieves typically steal usernames and passwords to access services, as well as other important data which can
be used to obtain access to the computer and, consequently, to the information stored in it.
USE LICENSED OPERATION SYSTEM
Read more
Hide
Please avoid installing any counterfeit OS offering free cracks or patches,
as only licensed operation systems possess all the required security features.
INSTALL RECENT ANTIVIRUS PROTECTION ON YOUR COMPUTER
Read more
Hide
Antivirus software is continuously being improved to offer reliable protection from unauthorised access to your personal data,
including documents, software, and files with secret keys for accessing e-purses, usernames, and passwords.
If possible, please avoid free antiviruses, be sure to update the virus database daily, and never use counterfeit antivirus software.
BE EXTREMELY CAREFUL WHEN OPENING FILES AND INSTALLING NEW SOFTWARE
Read more
Hide
New documents or software that you obtain can damage your computer,
even if sent from seemingly-reliable sources, such as friends or colleagues.
Always check new files with antivirus software and carefully read all warnings provided by your OS.
STORE BACKUPS OF IMPORTANT INFORMATION ON REMOVABLE STORAGE DEVICES (COMPACT DISKS, SMART- OR FLASH-DRIVES)
Read more
Hide
Even if you are using a licensed operation system, there is always a chance that your files will be damaged,
such as during a power failure. Copying confidential information (files with secret keys, backup copies of
purses files, etc.) to a removable storage device enables avoiding unpleasant situations that may arise unexpectedly.
CONTROL ACCESS TO YOUR COMPUTER
Read more
Hide
Limit third-party access to your computer to prevent the loss, theft, or accidental deletion of information.
Set a password and block access wherever you leave your computer or stop software used for financial operations.
While the above recommendations may seem very simple and obvious,
our extensive experience has convinced us that following these rules
is sufficient for securing your computer.