Be wary of phishing scams. Please visit our Security Advisory page for more information.

Security Policy

We appreciate our customers' concerns about security issues when they conduct transactions over the Internet. We have implemented several ways to ensure that our customers' confidential transaction details and their policy information are protected and secured.

We use the following methods of protecting our customers' policy information and transactions: 

  1. Firewalls
    We have put in place several layers of firewalls between our computer systems and the Internet.

  2. Encryption
    We use 128-bit Secure Socket Layer (SSL) encryption to protect our customers policy information and private transaction data. 128-bit SSL encryption is the industry standard security protocol used for encryption of data send over the Internet. All browsers and application software should be upgraded to support SSL 128-bit encryption.

User-id and passwords
The only way into our highly secured internal computer systems is through the use of our customers' individual valid user-ids and passwords, ensuring that only permitted users can gain entry into our computer systems.

Before entering your user ID and password, you should always ensure that the website you are visiting belongs to Great Eastern. This can be verified by the URL displayed in your browser as well as the Great Eastern's URL in its digital certificate. To verify the digital certificate, double click on the yellow icon (bottom right side of the screen) and make sure that the issuer is and the date is valid.

We constantly test our systems to ensure that no possible breaches of our security can happen such that our customers' security and confidential policy information is not compromised in any way. We are always on the look-out for new technology that will increase the security of our systems so that our customers can rest assured that their valuable and confidential information is kept safe. 

1. Protect and safeguard your password 

  • Do not disclose personal, financial or credit card information to little known or suspect websites.
  • Change your password on a regular basis i.e. every 90 days.
  • Keep your password confidential and do not disclose it to anyone.
  • Do not choose a password that is easily guessed.
  • Password should not be based on user-id, personal telephone number, birthday or other personal information.
  • Do not use shared, public or Internet cafe computers to access e-Connect.
  • Never use the same password for other web-based services (Financial or Non-Financial) such as for email, online services, particularly when they related to different websites.
  • Do not write down your password or store it in computer hard-disk, diskette, mobile phone or other insecure means.
  • Change your password immediately if you suspect it has been disclosed to others or any unauthorized access. Do not use your password when someone else can see you keying it in.
  • Do not select the option on browsers for storing or retaining user name and password.
  • Do not reveal the One Time Password (OTP) generated by your security token to anyone.
  • Inform Great Eastern immediately on the loss of your mobile phone or change in your mobile phone number.
  • Great Eastern staff will not request customers to disclose their user ID and password under any circumstances. 

De-activate the function from storing or retaining your user-id/password on browsers by using the following steps:

Internet Explorer

Launch your Internet Explorer browser and click on "Tools" >> "Internet Options" >> "Content".

Under "Personal Information", click on "AutoComplete". Uncheck "User names and passwords on forms" and click on "Clear Passwords".

Click on "OK" to save your changes

2.     Protect your PC from viruses and malicious programs

  • Malicious program (or malware) is usually sent as an attachment or URL link (when clicked, will redirect to websites embedded with malicious contents) in emails claiming to be from someone you know, or disguised as genuine software coming from an official site. When installed, malware can steal your personal and financial information, send spam emails on your behalf or perform fraudulent activities under your name.
  • Equip your PC with the latest anti-virus,anti-spyware and firewall software to protect yourself against any virus attacks and other malicious attacks, particularly when you are using broadband connections, digital subscriber lines or cable modems.
  • Update the anti-virus and firewall products with newer versions on a regular basis.
  • Use personal firewall software to hide your computer from Internet outlaws.
  • Do not click on website links or attachments in emails received from unknown senders.
  • Do not run or download any programs received from suspicious emails.
  • Protect your computer from malicious programs by using anti-virus software.
  • Install the latest updates on your operating system and applications such as Microsoft Windows / Office, Adobe Reader, Flash, etc.
  • Signs of malware infection may include sudden slowness in your computer, change from the usual logon procedures or an increase in pop-up banners. If you suspect that your computer has been infected by malware, refrain from using Great Eastern websites until your computer is cleaned.

3. Beware of and Protect your PC from Spyware.

  • Spyware is a software program installed in your computer that secretly gathers information about you on the Internet without your knowledge. It is sometimes bundled with shareware or freeware programs that are downloaded from the Internet.
  • Spyware has the ability to maliciously gain access to your passwords and other sensitive information. They also have the ability to monitor keystrokes, scan files on your hard drive and relay the information to unauthorized third parties leading to system instability or a crash.
  • Use anti-spyware software to find and remove hidden programs.
  • Use personal firewall software to hide your computer from Internet outlaws.
  • Be careful of any third-party software that claims to speed up your internet connection. This type of software can be packaged to look like a professional software or service, but when installed, it may redirect your Internet session through their own server, allowing fraudsters to see your online activities and potentially gain access to your personal information.
  • Be alert on any Spyware-like activities on your computer such as lots of pop-up banners or unsolicited email that claims to know you.
  • You can usually safely uninstall such software by going to your Control Panel, selecting Add/Remove Programs, find the application and select Remove. Some spyware software may make it difficult for you to uninstall, in such cases you may need to seek professional help to get it removed thoroughly.

4. Avoiding Hoax Emails (Phishing emails)

  • Phishing are fraud emails sent by fraudsters which trick you into providing your personal information, or downloading a virus that can steal your information.
  • Be wary of any email you receive from people you don't know or trust. Delete any emails you think are suspicious, such as spam, chain or junk mail. Delete the email from your 'Inbox

    If you receive an email or anything that is suspected to be fraudulent activity connected with GE, please do not respond to it. For example, you may receive an email that claims to be from GE asking you to click on a link to a website within the email to update sensitive information for certain reasons. When you click on the link, you will be directed to a bogus web site that may look exactly like ours where you will be asked to enter sensitive information. Emails like these may look quite sophisticated and even carry our logos. However, do not trust them.

    When in doubt or suspicious about the authenticity of the request, do not provide personal or financial information, always double-check with Great Eastern. Contact us via our official channels: Never rely on any information or link from the fraudulent email.
  • Never click onto a link in an email to go to the GE login page. Always access GE by typing the full website address into your browser.
  • You also may wish to contact your Internet Service Provider for support in blocking e-mails or to subscribe to a spam filter they may offer.
  • Never send sensitive information by email.
  • Don't answer any unexpected email requesting personal information.

5. Internet Security

  • Make regular backup of critical data.
  • Never download files from PCs or sites which you aren't sure about its safety.
  • Do not install software or run programs of unknown origin.
  • Be careful of anyone who attempts to illegally obtain sensitive information from you by pretending to represent Great Eastern.
  • Remove file and printer sharing in your PCs, especially when they have internet access via cable modems, broadband connections or similar set-ups.
  • Never blindly type commands that others tell you to type, or go to web addresses mentioned by strangers, or run pre-fabricated programs or scripts
  • Log out the online session and turn off the computer when not in use, even if it is for a short while. This will prevent any transactions from being performed without your authorisation.

Do business only with Internet companies that use a secure form to capture private information. To verify your session is secure, look for "https" instead of "http" in the URL address line. You can also check that your information is encrypted by ensuring that a symbol of a locked padlock appears at the bottom of your browser.

  • Check your transaction history regularly to ensure that all details are updated and there are no unauthorized transactions.
  • Customers are also encouraged to use the latest versions of Internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on. It is also prudent to install the latest released anti-virus signatures and operating system/internet browser security updates.

6. Protect yourself from Smishing (SMS Phishing)

  • Smishing or SMS Phishing is a phishing scam used in mobile devices. Fraudsters send you text messages that contain different methods of capturing your personal banking information by pretending to be representatives of legitimate organisations.
  • You receive unsolicited text messages (SMS) from representatives claiming to be from organisations such as your Bank, Insurance company or Internet Service Provider. When you call or reply back, they ask questions that lead you to reveal personal banking information, which they will use for fraudulent activities.
  • Safeguard your personal information. Do not provide your personal data, such as your NRIC, to commercial enterprises such as retailers, unless absolutely necessary.
  • Never reply to SMSes, calls or emails on transactions that you did not perform. Do not reply to a text message that asks for your confidential information either.
  • Never click on any website links found in unsolicited SMS or multi-media messages (MMS) from unknown sources. Do not reply to such SMSes and delete them immediately.

7. Vishing (Voice Phishing)

  • Vishing (also known as Voice Phishing) is a form of phishing, where the attacker uses a phone call to lure you into giving your personal or policy information. The phone call can either be live or automated.
  • You receive a suspicious call or voice mail claiming that your policy account will be cancelled if you do not call their hotline and enter your personal information.
  • When in doubt, do not provide any personal or financial information.
  • Validate that the calls you receive about Great Eastern policy account are from trustworthy sources by contacting our customer service hotline.

8. Mobile Security

  • Download the Great Eastern mobile application only from Apple app store, or Great Eastern hosted sites. Downloading from websites other than these could lead to using a mobile application that is not legitimate.
  • Do not hack or modify (e.g. jailbreak or 'rooted') your mobile device. Doing so can make your mobile device more prone to viruses and malicious software.

9. Data Synchronisation of Mobile Devices

  • Some smart phones have features that allow data synchronisation between your mobile device and online storage or cloud services in near real time. Information that could be synchronized includes SMS, email, etc.
  • If you have enabled the abovementioned data synchronisation, sensitive information sent via SMS or emails by financial institutions (FIs), such as one-time passwords (OTPs), could be accessed by criminals if your login credentials to the online storage or cloud services have been compromised. Exposed OTPs together with online banking credentials or credit card information that had been harvested from you can potentially be used by criminals to perform fraudulent financial transactions.
  •  In light of such cyber risk, you are advised to secure your mobile devices and related online accounts.

10. Customer service for contingency matters
If you suspect that security breaches may have occurred and online transaction(s) might have been fraudulently accessed please do not hesitate to call our Hotline help: 1800 - 248 2888 or E-mail us at :

If you contact us via phone, our customer service officer will be able to advise you on the immediate action available. If necessary, your login access may be suspended to protect your interest. Our customer service officer may also obtain the necessary details from you regarding the matter to facilitate investigations.

If you notify us via email, please include your

  • name and user ID
  • date and time of access
  • description of error and
  • description of error and description of security breach or fraud

Once we are notified of any dispute, we will commence investigations immediately and revert to you as soon as possible, depending on the complexity of the dispute.

This website is best viewed with: Internet Explorer 9 and above.

Screen resolution 1024 X 768 pixels.