Personal Card Products
MCB Rates & Fees
MCB's reporting obligation
Recharge with MCB
SWIFT & IBAN
Application Night Deposit Bags
While we take strong measures to protect your financial transactions and the confidentiality of your information, it is extremely important that you also take your own precautions to ensure that your information remains safe and secure.
We advise you to read about these topics and follow the recommended safe computing practices listed below, to protect private information on your personal computer and mobile device.
How we protect you | How to protect yourself
Start by keeping important information to yourself. Others can abuse your information to access your accounts, so always keep your User ID and Password secret and follow these safe-computing practices:
In divulging your User ID or password to third parties, you not only compromise funds kept in your bank account but also contravene the terms of our service agreement and you will be fully liable for any unauthorized access to your accounts and all associated losses arising from these disclosures.
Report lost or stolen Bankomatiko cards immediately to +599 (9) 466-1836 or after business hours +599 (9) 466-0555.
When using the Internet, there is always a risk of contracting virus or the possibility of infiltration by intrusion software commonly known as "Trojan Horses". Computer viruses can modify programs, delete files and erase the contents of hard drives. "Trojan Horses" can have similar effects and may be able to capture keystrokes, including passwords or other secret information. Spyware and other deceptive software can also conduct certain activities on your computer without your knowledge or consent.
Phishing and Pharming
“Phishing” is a type of identity theft where criminals use email to try to bait you into fake websites. Once there, you are asked to disclose confidential financial and personal information, like passwords, credit card numbers, access codes or e-Pass values. The most familiar type of phishing scam is an e-mail threatening serious consequences if you do not log in and take action immediately.
"Pharming" is similar to "Phishing", though it often involves the use of malicious code. When you click on a link in a fraudulent email or otherwise visit an infected website, code is uploaded to your computer. You may not have to do anything other than arrive at the site to be infected. These "Trojan Horses" can then allow a hacker to monitor your activity, hijack control of your computer and log into financial and other sites with your credentials, and execute fraudulent transactions. To avoid these infections, be careful about which websites you visit and never click on links in unsolicited emails.
The potential consequences of any of these threats include damage to your computer, compromise of your secret information, fraudulent transactions on your behalf and the inability to use online banking.
For these reasons, we advise our customers to follow these practices:
Also keep your mobile device safe
Download anti-malware protection for your phone, tablet, e-reader or any other device that has mobile access to the Internet. This software should be able to scan the device, identify and remove malware, plus check applications for malware before downloading from application stores.
Beware of everything you download onto your smartphone, especially applications. Only use reputable application markets. Look at the developer's name, check out reviews and star ratings. Always check the permissions an application requests and ensure that the permissions the application requests match the features the application provides.
If your phone is stolen or lost, the first thing you should do is to call the Contact Center at 466-1836 and report the loss.
Beware of 'free' services and software offering faster web surfing and email virus scanning
We strongly advise you to carefully read the terms of any free services you accept or software you download online before you accept them. They are known to sometimes include your consent to having your entire Internet browsing activity, including secure transactions monitored. In consenting to such terms, you may allow the service provider to collect highly confidential User ID information such as your bank account and credit card numbers and passwords.
There are additional vulnerabilities associated with having a computer directly connected to the Internet for an extended period of time. This applies to all users but it is extremely important for users with DSL or Wireless Broadband Internet access. These methods of connection do not require 'dialing' into the Internet and thus are sometimes described as 'always on' connections. When the computer remains 'on' and connected to the Internet, malicious parties have a continuous window of opportunity for attacks.
If you use a DSL or Wireless Broadband connection for Internet access, you can limit this security risk by disconnecting from the Internet when your session is complete, or by turning off the DSL or wireless modem. However, if you want to continue to take advantage of the 'always on' feature of DSL and Wireless Broadband connections or if you run extended dial-up sessions on the Internet, we recommend the following security measures be taken:
Our recommendation is to disable file sharing. However, if you choose to retain this option for your particular environment, exercise due care and apply appropriate security measures.
If you have a wireless network, there are additional measures that should be taken to protect your Internet connection:
Our online services are designed to be used with the current or immediately preceding version of Microsoft Internet Explorer (IE) or Google Chrome. Keep your operating system and browser current with updates as they are released. While our services generally function well with other browsers, we are unable to offer technical guidance should you experience difficulties.
While Maduro & Curiel's Bank believes these safe computing practices and included links provide reasonable but not absolute protection, the Bank makes no representation or warranty as to their intended use or fitness for the purpose. Any reference to a software provider is for convenience only and does not constitute an endorsement of that company's products. You must make your own decision with respect to their products.