Global Vidrios
Santo Domingo
Ave. Gustavo Mejía Ricart no. 196. Ens. Quisqueya.
Teléfono:
(809) 683-2817 / (809) 472-2322
At Seguros Sura S.A., we have the necessary tools to control access to our information systems, and we continually investigate and update our infrastructure to achieve a level of security in line with market standards.
To provide you with greater security when making inquiries and transactions, we recommend that you always log in to your account using the Log in option on the right-hand section of the page.
Report any irregularity and help us put an end to electronic fraud.
If you receive an email that appears to be from Seguros Sura S.A. and you are suspicious of its origin, or if you notice something suspicious or unusual when accessing the site to make transactions, immediately contact the Customer Service Line at 809-985-5000 option 2.
To be registered on some of our pages, you must meet the minimum conditions required in the password request procedure; otherwise, SEGUROS SURA reserves the right to reject the request.
For your safety, when using the password assigned to you for the first time, the system will automatically request that you change it. This new password should not be related to events like birthdays, anniversaries, license plate numbers, or any information that is easy to know or find out.
Recommendations:
Recommendations:
A secure site ensures that all information travels encrypted, from the client to the server or vice versa.
Recommendations:
As internet users, we are exposed to malicious programs, viruses, or different techniques that can be used to obtain confidential information.
Its purpose is to alter the normal functioning of the computer without the user’s permission or knowledge. Viruses usually replace executable files with others infected with their code. Viruses can intentionally destroy the data stored on a computer, although there are also more “benign” ones that are merely annoying.
Computer viruses primarily function to propagate; they are very harmful, and some contain an additional payload with various objectives, from a simple joke to causing significant damage to systems or even blocking computer networks by generating useless traffic.
Some types of computer viruses and techniques used to compromise your information.
From the English malicious software, it is a program designed to infiltrate or damage a device without the owner’s knowledge and for various purposes, including anything from a trojan to spyware.
These are applications that collect information about a person or organization without their knowledge. The most common function of these programs is to gather information about the user and distribute it to advertising companies or other interested organizations. However, they have also been used in legal circles to collect information against crime suspects, such as in software piracy cases.
From the English ransom, meaning ransom, and ware, a shortening of software, it is a type of malicious program that restricts access to certain parts or files of the infected operating system and demands a ransom to remove this restriction.
A keylogger is a key recorder that can be harmful to your mobile device because you don’t know who is watching what you type, especially if it is something confidential like a credit card number or an online account password.
Phishing is a form of internet fraud that uses deceptive emails and fraudulent websites designed to confuse recipients into disclosing personal financial information, such as credit or debit card numbers, passwords, usernames, or other personal data like ID numbers.
Phishing is a computer term that refers to a type of crime within the scope of scams and is committed through social engineering techniques aimed at fraudulently acquiring confidential information (such as a password or detailed information about credit cards or other banking information).
Cybercriminals send an email on behalf of an allegedly trustworthy entity or person, including urgent situations to make people react immediately and respond with the information they want. They usually include a fake link that appears to lead to the legitimate website they are impersonating but actually leads to a fake site or even a pop-up window with the same appearance as the official website of the financial institution. They may also include attachments that in some cases are malware.
In network security terms, it refers to the use of identity impersonation techniques, generally for malicious or investigative purposes. There are different types depending on the technology.
IP Spoofing: IP spoofing. It basically consists of replacing the source IP address of a TCP/IP packet with another IP address that you want to impersonate. Keep in mind that the responses from the host receiving the packets will be directed to the falsified IP.
ARP Spoofing: identity spoofing by ARP table falsification. It involves constructing modified ARP request and response frames with the aim of falsifying the ARP table (IP-MAC relationship) of a victim and forcing them to send packets to an attacking host instead of their legitimate destination.
DNS Spoofing: identity spoofing by domain name. It involves falsifying a “Domain Name-IP” relationship in response to a name resolution query, i.e., resolving a certain DNS name with a fake IP address or vice versa.
Web Spoofing: impersonation of a real website (not to be confused with phishing). It routes the victim’s connection through a fake page to other web pages to obtain information from the victim (web pages visited, form information, passwords, etc.). The fake web page acts as a proxy, requesting the information required by the victim from each original server and even bypassing SSL protection.
Mail Spoofing: email spoofing of other people’s or entities’ email addresses. This technique is used for sending phishing and SPAM emails.
Santo Domingo
Ave. Gustavo Mejía Ricart no. 196. Ens. Quisqueya.
(809) 683-2817 / (809) 472-2322
Santo Domingo
Ave.abraham lincoln esq. José contreras.
(809) 532-4587
Santiago de los Caballeros
C/ Dr. Emilio ginebra, no.10
(809) 582-2739
Santiago de los Caballeros
Av. 27 de Febrero No.43
(809) 576-7252 / (809) 575-1376
San Pedro de Macorís
C/enrique a. Mejía, placer bonito
(809) 339-2004 / (849) 265-4678
La Altagracia
Carretera Verón, Bávaro Km 2
(809) 455-1515