Beware of Phishing - Riyad Capital
Information Security
Securing your personal information is one of Riyad Capital's priorities, and Riyad Capital is keen on using efficient techniques to assure the safety of your information.
Your responsibility is to help us secure your personal information by following the guidelines below.
To avoid Fraud and phishing:
Your responsibility is to help us secure your personal information by following the guidelines below.
To avoid Fraud and phishing:
- Always make sure you are using Riyad Capital official website https://www.riyadcapital.com.
- Do not interact with social media accounts, calls, emails, and text messages that offering services on behalf of Riyad Capital or ask you to provide or update your information, make sure you are communicating with Riyad Capital through official channels.
- Do not share your password with any one, Riyad Capital employees will never ask you to share your password.
- Report any suspicious calls, emails, and texts that impersonating Riyad Capital to Riyad Capital Customer Service.
- Do not install any applications on your device from unknown or suspected publishers, and check the name of the publisher.
- Install Riyad Capital Apps from the official Riyad Capital profile (Riyad Capital) in the authorized Apps stores.
To protect your investment account:
- It is highly recommended to use a complex password (alphabets, numbers, and symbols) for your Riyad Capital account and should be different than your other passwords.
- Change your password periodically or if you feel that someone is trying to access to your account.
- Do not use public networks or public device for accessing to your Riyad Capital account.
- When you finish your session, make sure to sign-out from your Riyad Capital account.
- Do not stay away from your device when using your Riyad Capital account, doing so could lead to other people using your account.
- Enable two-factor authentication to increase level of security of your device, for example (password + Fingerprint or facial recognition).
- To be protected from vulnerabilities that can be exploited by hackers, update your devices and software to the latest version periodically.
- Install anti-virus software and Do not install untrusted or pirated software.