Security information

    General security rules for using the application Online Broker (OLB)

    Suspicion of Login Details Misuse

    Should you suspect that your login credentials for your accounts have been compromised, please contact our Info Line (+420) 498 777 770 or email address info@akcenta.eu.

    Reporting Security Incidents

    If you detect a cyberattack attempt, phishing, misuse of our domain, or any other security event related to our services, please contact us at: security@akcenta.eu

    This contact is intended strictly for reporting security incidents and suspicious activities.

    Ten rules for security

    1. Strong Authentication is Key

    Prefer logging in via the Akcenta Key application, which uses modern authentication methods including biometrics.

    • Activate MFA (Multi-Factor Authentication)
    • Avoid SMS codes if the application can be used
    • Never share authentication codes

    2. Protect Your Access Details

    Your login credentials are personal – their misuse can lead to financial loss.

    • Do not share passwords and do not save them in the browser
    • Use highly complex passwords – minimum 12 characters, combining uppercase and lowercase letters, digits, and special characters. Avoid dates of birth or simple patterns. Ideally, use randomly generated passwords or a passphrase
    • Use a password manager
    • Do not use the same password for multiple services

    3. Update Devices and Applications

    Updates fix vulnerabilities that attackers exploit.

    • Keep the Operating System, browser, and Akcenta Key application up-to-date
    • Install security patches without delay
    • Do not use outdated software versions

    4. Verify Connection Security

    A secure connection protects your data from eavesdropping.

    • Connect only via HTTPS (TLS 1.2 or TLS 1.3)
    • Check the website's certificate validity
    • Activate notifications for invalid certificates

    5. Use Secured Devices

    Your device is the key to your account – protect it.

    • Do not log in from public computers
    • Have antivirus protection and a firewall activated
    • Protect your device with a strong lock (ideally biometric)

    6. Watch out for Phishing

    Phishing is the most common way to steal login credentials.

    • Do not click on links in suspicious emails or SMS
    • AKCENTA CZ a.s. never requests a password or code via email
    • Utilize anti-phishing filters

    7. Verification Codes and Notifications

    The verification code is intended only for you – protect it.

    • The verification code is valid for 3 minutes
    • Do not share the code with anyone
    • Activate notifications
    • Monitor unusual activity

    8. Secure Connection

    Public Wi-Fi is risky – attackers can eavesdrop on traffic.

    • Do not use public Wi-Fi without a VPN
    • Prefer a VPN for access from unsecured networks

    9. Monitor Your Accounts

    Quick reaction can prevent damage.

    • Regularly check transaction history
    • Immediately report suspicious operations

    10. Educate Yourself

    Security starts with you.

    • Follow security recommendations
    • Participate in cybersecurity training
    • Be vigilant – the most common threats are phishing, malware, fraudulent applications, fraudulent phone calls

    Phishing

    What is phishing?

    Phishing is, for example, fraudulent email messages that only look like an email from a valid sender. At first glance, the email looks valid, but on closer inspection of the sender's address, it may differ by just one character, or you may find that the link in the email leads to a fraudulent site. The attachment may look like an innocent-looking Excel file, but even an Excel file can contain malicious code. And the application you're supposed to install to get to the attachment is actually malware. The sender of such an email is simply trying to coax sensitive information such as login credentials (client number, password, security code and other security details) out of you to abuse it. Therefore, when reading emails, it is worth remembering that not all emails that reach you are from valid senders and to take care before entering sensitive data or triggering attachments. In the context of Akcenta CZ, a phishing email may look like information about a failed payment, a request to update security information or a client satisfaction survey. There are no limits to imagination.

    Diversion of payments

    Beware of fraud

    Fraudulent behaviour can take many forms and because of new technologies, there are always new ones. We therefore warn our clients of illegal actions, within which a diversion of payments can occur.

    The whole system works as follows: the perpetrators manage to hack into the supplier’s email account and informs the company (our client) on the supplier’s behalf, to change bank details pertaining to the payment of the supplier invoices. The company in question subsequently modifies the payment instructions for their trading partner and the payments are subsequently remitted in favour of the fraudulent account. The company in question usually finds out only on the basis of the supplier’s urgent notice of claim for unpaid invoices.

    For this reason, we recommend our clients to always verify in several ways (other email or phone) if it is really their trading partner who is actually changing the number of the bank account and not a fraudulent third party.

    This contact is intended exclusively for reporting security incidents and suspicious activities.

    Become a client