Security information on Online Banking & App

Your security is our highest priority

Anadi Online Banking gives you access to a device-independent, comprehensive banking platform with which you can take care of your banking activities comfortably and easily. Read what we are doing to ensure secure Online Banking and what you should consider.

Customer authorization via personal access data

Full access to Online Banking and the App is only possible with your personal access data: user number, user name, and personal identification number (PIN). This is to ensure that only you have access to your accounts. For your first login you receive a user name and an initial PIN from Anadi Bank. This initial PIN is only valid one time and must be changed by you during your first login. You also set a user name. We make the first login easy for you by guiding you through the process. Besides you, no one knows the combination of your access data, not even Anadi Bank.

Authorization of transactions and changes in Online Banking via Transaction Authorization Numbers (TAN)

When you want to authorize payment transactions or make changes to your data or settings, you must enter a Transaction Authorization Number (TAN). For this purpose there are various ways to receive your TANS:

  • mobileTAN: The mobileTAN is sent to your mobile phone by text message. The mobileTAN is directly requested by Online Banking for the individual transaction, generated from the transaction data, and is only valid for this specific order.
  • tresorTAN: The tresorTAN is sent to you in a special app, the “tresorTAN app”. For this TAN you must download the tresorTAN app on your mobile telephone or tablet.
Details about  tresorTAN
  • Transmission of the tresorTAN is carried out directly in the app. Transmission of a text message is no longer necessary.
  • The tresorTAN is transaction specific and can only be used for one transaction.
  • Access to the tresorTAN app is possible through your personal access data. Or you set a shortPIN and activate device link.
  • The tresorTAN app does not have to be installed on the same mobile telephone or tablet as the Online Banking app.

Read more about tresorTAN and the tresorTAN App

When you have activated the tresorTAN app as your signing method, you can choose during each transaction, whether you wish to sign with a mobileTAN or with a tresorTAN.

Online Banking App

The Online Banking app offers additional access possibilities, such as shortPIN and Finger Print Scan (fingerprint and touch ID), which are linked to the respective mobile end device by device link. When logging in with a shortPIN or finger print, no orders or changes can be carried out. If you wish to carry out orders or changes, entry of your PIN or TAN is additionally required.

Please note, while using finger print scan: on your mobile telephone or tablet you can set up several finger prints for access to your device. There is no identity link. Because of these technical circumstances, any fingerprint registered on your mobile telephone or tablet can be used for logging in to your Online Banking.

Blocks in Online Banking

Online Banking blocks itself automatically:

  • When the PIN is entered incorrectly three times.
  • When a TAN is entered incorrectly three times.

You can also set blocks yourself in Online Banking.
For this purpose, go to “Settings” / “Blocks”. Two options are available:

  • User block: When you activate a user block, login is no longer possible. You are immediately logged out of the system.
  • Transaction block: After activating the transaction block, no more transactions can be carried out. Transaction overview is still possible.

Please note:

  • Blocks are effective immediately.
  • You can set a block with an end date or for a specific period of time.
  • If you have not set an end date, or you wish to remove the block earlier than planned, please contact the Online Support Team at the telephone number: +43 (0)50502 2525 from Monday to Friday from 7:30 am to 4:30 pm.
Be alert
  • Check the internet address displayed in the address bar of your browser when logging in to Online Banking. The Anadi Online Banking internet address is
  • Make sure that the site is encrypted. This is recognizable with https://
  • Use secure access data and never give them to third parties.
  • Use the tresorTAN.
  • Update your PC and your mobile telephone, and tablet regularly and use an anti-virus program.
  • Install apps exclusivley from official sources. When updates are available for apps, run these immediately. The Anadi Online Banking App and the Anadi tresorTAN App (named Anadi tresorTAN) are available in the App Store for iOS and in the Google Play Store for Android, Microsoft Store for Windows.
  • Secure your mobile telephone or tablet with screen lock.
  • Never save your access data, account or portfolio data on your computer, mobile telephone or tablet. And never leave them lying anywhere.
  • Check your account statements regularly and contact us if you suspect misuse.

Caution is advised in the case of supposed bank emails. As a basic principle, Austrian banks do not send any emails in which clients are requested to disclose confidential access data and / or transaction numbers. This includes the user number, PIN and TAN. In this case, such emails are always fraud attempts.

Protect yourself from phishing attacks and phishing emails

The term phishing refers to the attempt to gain access to internet users’ data through fraudulent websites, emails or text messages and commit identity theft with these.

  • Phishing is an organized attempt to gain access to secret data such as account data, PIN codes, etc.
  • Attackers impersonate trustworthy persons or companies and attempt to win the trust of users with the help of fraudulent emails. This is how they get access to sensitive data!
  • The target of phishing attacks is access data, e.g. for online banking, online payment systems (such as PayPal), online auction companies (such as Ebay) or online retail shops (such as Amazon). The attacker can take on the identity of the phishing victim with the access data and carry out various actions and transactions in their name.
Caution is advised!

Our employees will never ask you to disclose access data per email or telephone.

  • Stay calm! Phishing attackers want you to first act and then think. When an email conveys that it’s a matter of urgency or something is of high priority, one should always be skeptical. Never let the urgency of a document take control of your actions and double check everything.
  • Verify the facts! Be suspicious of all emails. Also of emails which you receive from recognized companies. In the case of reasonable doubt: search for the company name in a search machine (e.g. Google) and let yourself be redirected to the company’s homepage from there. In order to confirm the telephone number, an (online) telephone book can be accessed.
  • Erase all emails in which personal information or passwords are requested. If this information is requested, this is usually a case of fraud. Also never click on links or downloads in these emails.
  • Ignore (financial) requests for help or tempting offers of assistance via email. Legal companies and organisations won’t ask for help. If you didn’t actively request help yourself, reconsider all offers for such issues as restoring credit rating or re-financing. It is usually a case of fraud. Also, requests from charities to which there is no reference should be erased. If you want to support charity organizations, search for an organization in the internet on your own and click on the link in the search machine.
  • Never let a link misdirect you. Keep control of your data by finding the correct links on your own in a search machine and clicking on them there. Hidden links (a link to a website behind a logo) can also be false. A good counterfeit entices you to click hastily.