Overview
Get the card that best suits you! Choose from our prepaid Debit or Credit Cards for local or international use.
Get the card that best suits you! Choose from our prepaid Debit or Credit Cards for local or international use.
Get your Gold or Classic VISA Credit Cards from any GBTI Branch. These cards are accepted worldwide, at all GBTI ATM Money Zone locations and at all GBTI Point-of-Sale terminals in Guyana or anywhere you see the VISA symbol.
The GBTI VISA Travel Classic card is a prepaid card that can be used locally and internationally, limited only by the funds available on the card and renewable every two years.
The Kaieteur Classic Debit Card gives you secure and convenient 24-hour banking at your fingertips. The card is free and can be used to access all our ATM Money Zones and 235 Point-of-Sale terminals at Prominent Shopping Centers, Supermarkets, Restaurants and Gas Stations. It is renewable every four years. Look for our GBTI Kaieteur Classic Sign!
The following information has been extracted from various resources provided by Visa and MasterCard. This information may be shared with your cardholders as a means of enlightening them about fraud prevention and should only be viewed as a best practice guidance tool. The source of the information is sited below each segment.
Staying Secure When Shopping Online
Credit cards have helped fuel the Internet economy because they provide security, convenience and reliability for online purchases. If you are using your credit card to shop online, there are several tips you should follow to protect yourself and your accounts:
Protect Yourself from Fraud
The rising popularity of payment cards and the Internet has led to a rise in fraud crimes. This section provides suggestions and strategies on how to minimize the chances of fraud happening to you online or offline.
What is Phishing?
Phishing is an e-mail scam technique used by Internet fraudsters to entice unsuspecting consumers to divulge sensitive valuable information. Phishing schemes lead consumers to believe that they are responding to a bona fide e-mail request from a well-known institution to update their information.
A Typical Phishing Hoax Scenario:
Phishing Techniques
Phishing schemes use sophisticated techniques to disguise the origin of their spam e-mails and the forged Web sites, so that it is hard to detect the hoax. Often, spammers exploit the Uniform Resource Locator (URL) “user authentication” syntax feature supported by some Internet browsers to cleverly cloak the fake Web site as an authentic site. This practice deceives the Internet users, because the fake Web site’s URL displayed in the browser address bar matches that of a genuine Web site.
In some phishing instances, criminals request that the recipients download and install “security” software attached to the spam e-mail. If a recipient installs the software, the criminals can monitor the victim’s computer and capture bank and payment card account details. The use of this mechanism, though low in relation to other mechanisms, recently is showing an increasing trend. In addition, spammers “take over” unsecured computers and servers and route spam e-mail via these to conceal the real e-mail source. The criminals use the victim’s computer for launching spam e-mail distribution, unbeknownst to the victim.
We encourage you to safeguard yourself against phishing by following the tips provided below:
Cardholders should obtain and keep the following information when conducting card-not-present transactions such as e-commerce or mail order/ telephone order transactions.