Security Instructions for Safe Internet Useervices” OOD


Taking care of the security of websites and functionalities available through it—registration forms, landing pages, chats, and others— is personal responsibility of each customer. We aim to handle your personal data, which you enter and share with us when using our website or services, with the utmost care. Therefore, with this instruction, we will try to:

  • inform you about the risks associated with usage of various products and services that you access in the Internet;
  • provide you with some practical tips which can reduce the risk of harm to your identity in various cybercrimes, such as: acquiring and using your personal data for the benefit of social engineering schemes and fraud.

Access of websites and forms requiring the input of your personal data

  1. Make sure you are accessing the official website of the company before entering your username and password;
  2. When accessing our website, especially when using its functionalities that require entering your personal data, use only individual smart devices rather than shared ones. It is recommended to use a single device, and when using multiple devices, limit their number to a minimum. Ensure that the devices you use for this purpose are checked and protected with appropriate and updated antivirus software;
  3. Do not enter your personal data in the presence of other people or in public places, including avoid the use of public (open) Wi-Fi networks);
  4. Do not use the features of your browser that allow automatic joining or filling forms of your personal data. Instead, manually type any complete address;
  5. Do not include our site in the toolbar of your browser (search engine) for frequently visited sites (Bookmarks, Favorites). Bookmarking your favorite sites makes it easier for fraudsters to navigate and identify where and for what purposes you enter your personal information, such as: names, phone numbers, email addresses, user IDs, passwords, etc., and attempt to exploit them;
  6. Always check if the websites are secure. The check may be done in several steps, and namely:
    • On the left side of the address field, there should be a locked padlock, which - depending on the browser you are using - would look something like one of the following:

Google Chrome


Mozilla Firefox

  • You should click on it to open a window with the status 'Connection is secure”;
  • If you wish, by clicking on the label 'Connection is secure,' you can check details about the security certificate of the site.

Browsers (search engines)

  1. When using the features of any website(s), never save your username and/ or password for access them in your browser;
  2. Always check whether the browser you are using is still supported by its developer, keeping in mind that for example support for Internet Explorer has been discontinued;
  3. Regularly update your browser. For your convenience, you can configure automatic update features;
  4. Use phishing filters of your browser;
  5. Do not install additional toolbars (such as ASK toolbar, Google toolbar, and others), as they can be used to distribute malicious software.

Username and password

As you know, access data consists of your username and password. More information about best practices for creating highly secure passwords can be found in the "Frequently Asked Questions (FAQ)" section on numerous websites.

Two-factor authentication for your profiles

You can learn more details about two-factor authentication for your profiles in the Frequently Asked Questions (FAQ) section on our website).

Technical Security of the Devices You Use

  1. Make sure that the operating system and individual software products you use are as up-to-date as possible. Usually, operating systems and software products on the market have an option for automatic updates. Use this option and always set your devices to update automatically. If accidentally installed operating systems and software products on your device do not have the option for automatic updates, you can manually search for the latest versions to download and install the latest versions only from manufacturers’ websites. Never take actions or download operating systems and software products from messages received via email or chat communications addressed to you. Such messages are sent by fraudsters and the urgency in these notifications for updating operating systems or software products are false. Through uploaded malicious software, they aim to access your personal data. By using up-to-date and licensed operating systems and software products, you minimize the risk your personal data to be used in cybercrimes;
  2. Install a "firewall" on the device you use to access your various profiles. The purpose of firewalls is to protect you from fraudsters while you are online and they allow to be configured to notify you in case of attempts of probable attacks;
  3. Install a secure antivirus program on your device from a reputable and licensed manufacturer. Its function is to protect your device from various types of viruses through which malicious third parties try to gain remote access and control over the device you are using;
  4. Do not install or use "cracked" programs from torrent sites, as this poses a significant security risk to your device and the data you store on it. "Cracked" programs have compromised protection and can be used to install malicious software and "Trojan horses" on your device;
  5. Keep in mind that, at the moment, the Windows XP operating system is no longer supported by its manufacturer. Therefore, we advise you to take action and install an up-to-date operating system to ensure and upgrade your security level. We would also like to inform you that the latest version of one of the most widely used operating systems is Windows 11.

Phishing, Vishing, Smishing and Pharming

More details about the meaning of the terms phishing, vishing, smishing, and pharming can be found in the Frequently Asked Questions (FAQ) section on our website).

We are always at your disposal if you have any questions related to our methods and channels of communication with you, including being ready to assist you whenever you have suspicions of abuse against you.