Cyber Security Do's and Don'ts - Good One

Increased dependency on information in various forms from computers to smart phones, cyber security has assumed importance for individuals and organizations alike, due to proliferation of cyber crime, intimidation, stalking and other forms of malicious attacks in this medium. Cyber gangs are increasingly using malware or malicious software such as viruses, Trojan horses, spyware, Crime ware, Joke programs, and mail bombs and so on to target victims. On the other hand growth of Spam and Phishing through email has rendered common users of computer networks vulnerable to cyber fraud.

Thus cyber crime which is unlawful acts wherein computer is either a tool or a target or both involving criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief has become a major threat to individuals and organizations. Moreover abuse of computers has also given birth to new age crimes. Many of these acts are subject to Indian Penal Code while some issues have been addressed in the Information Technology (IT) Act, 2000 and IT Amendment Act 2008.

As in the case of other threats, prevention is the best form of cure. Thus some basic - Do’s and Don’ts on Cyber Security have been included herein as guidelines for individual users of computer, IT networks and mobile phones. These are by no means unique but compiled from various sources as a single point input to enhance individual awareness of this essential aspect of everyday life.

Do’s

• Do ensure physical security of your computer, laptop or mobile phone at all times, unattended hardware will provide ordinary as well as cyber criminals a lucrative opportunity for intrusion apart from loss of a valuable item.
• Do ensure access control by incorporating appropriate identification and authentication mechanism like 'complex passwords' at different levels and ' dynamic log-in' by verifying users' magnetic strip cards, fingerprints and voice recognition, depending upon the nature and sensitivity of data.
• Do use effective encryption techniques while communicating sensitive information over networks. Simple encryption software can be downloaded.
• Do ensure that you overwrite sensitive files with some junk data before deleting these. Antivirus software has facilities for file shredding use the same instead of simply deleting the file.
• Do ensure you have a back up copy of sensitive files and keep the same constantly updated. Antivirus software frequently has back up facilities bundled with the main package avail of the same.
• Do ensure use of original software purchased from authorized vendor. This is expensive but will ensure security of your information.
• Do be careful while installing software, criminals dupe users into downloading malicious software.
• Do update software regularly. Suppliers of PCs, software, and operating systems such as Windows frequently issue software updates (patches) to fix minor problems (bugs) or improve security. Keeping the computer up to date is important.
• Do update your anti-virus software regularly. McAfee security software like McAfee Total Protection update automatically and continuously via the Internet avail of these facilities.
• Do ensure that all removable media as CDs, pen drives and so on are in proper custody and regularly accounted for.
• Do test every removable hard disk, CD and pen drive for virus contamination by running a scan on the system on insertion.
• Do destroy damaged and unusable CDs / pen drives by burning rather than dumping in the garbage in case these contain sensitive information.
• Do ensure that maintenance and repair is done by a competent person from an authorized agency and person does not pilfer data or manipulate the system
• Do use Uninterrupted Power Supply (UPS) with sufficient back up in case you have frequent power break downs which are normal in India except in Mumbai.
• Do delete chain and junk emails rather than forwarding these.
• Do ensure software is loaded to delete all information on a laptop or mobile phone from remote locations to safeguard the same in case it is stolen.
• Do ensure that user name and pass words for a computer even if only one person is using the laptop or computer. As all files contain the user name, this will ensure that your identity is also secure in case of identity theft.
• Do ensure that passwords are used in multiple tiers, firstly access to the system, the user and also documents with separate passwords for each.
• Do make smart passwords a habit. This will include a combination of upper- and lower-case letters, numbers and symbols. Minimum length of a good password is eight characters which should be frequently changed by setting an expiry period. Password generators should be used in large organizations.
• Do ensure security if you are using cloud computing services. Check level of security provided by cloud computing provider and as most of these are based outside India legal aspects need consideration.
• Do ensure that you observe all security norms of your organization in case you are permitted to work on personal computers, laptops or mobile phones, from home.
• Do plan for the worst case scenario, this may be a good strategy rather than relying on minimal security due to factors of cost or ignorance.
• Do update Email list regularly and delete contacts who are unknown from time to time,
• Do log out of websites after accessing desired information.
• Do exercise caution when downloading files from the Internet. Ensure that the source is a legitimate and reputable one. Verify that an anti-virus program in the email checks the files on the download site.
• Do err on the side of caution when in doubt and do not open, download, or execute any files or email attachments.
• Do maintain logbook regarding all activities carried out on computer systems indicating the name of the user, duration for which a particular user used the computer, type of activity carried out etc. 'Audit Trail Concept' should be incorporated in the system where high security is essential.
• Do ensure that all financial transactions have multiple levels of security including a system of one time passwords and authentication of persons issuing instructions.
• Do always visit Internet Banking site through the bank’s web site.
• Do verify domain name displayed on the site to avoid spoof websites.
• Do ensure a suitable firewall is installed in your PC to protect the contents from outsiders on the internet.
• Do enter User ID and Password only at the authenticated login page of the Bank and use virtual keyboard feature while logging into your Internet banking account.
• Do check account and transaction history regularly. Check your statements for any transactions that look suspicious.
• Do check the Last Log-in Date and Time on the top right hand corner to monitor any unauthorised logins.
• Do, “Log Out,” after using the Internet Banking Service and not just close the window.
• Do close your Internet browser after logging out of each Internet Banking session.
• Do contact bank if you lose your pin number or card immediately on the Customer Service Number and by Email.
• Do change your password and pin number frequently.
• Do report any suspicious infringement immediately to bank’s customer care telephone and through email.
• Do treat your smart phone like a wallet - keep it safe and on your person at all times.
• Do remember your smart phone is a computer, thus all security rules should apply to the same.
• Do use only reputed mobile applications (apps)
• Do turn on the security features of your phone, set a password or Personal Identification Number (PIN). Use the same rules for setting passwords as for computers.
• Do check for updates to phones operating system regularly. Install them as soon as they are available.
• Do use only encrypted networks for Wi-Fi.
• Do note down complete details of your phone in case of theft, in particular the unique International Mobile Station Equipment Identity (IMEI). Network provider can stop phone being used if it is stolen.
• Do report loss of telephone to network operator immediately so it can be disabled. If you find it the same can be easily re-enable the phone.
• Do check your phone bill details regularly, an infected phone will also lead to inflated bills.

Don’ts


• Do not use pirated software – including operating system, application and antivirus, as it is not just a security hazard but may also result in systems crash at a critical time.
• Do not download any files from Emails send by strangers. Preferably use email services as Google which contains software that checks virus in attachments.
• Do not download files from the Internet directly without confirming the source. Use an anti-virus program that checks files before downloading.
• Do not open files when in doubt even from known Email addresses. Some viruses can replicate themselves and spread through email. Confirm that your contact really sent an attachment.
• Do not open any files attached to an email if the subject line is questionable or unexpected.
• Don't let any un-authorised person use your computer system.
• Don't share your password with anyone, not even with your colleagues.
• Don’t have a, ‘family,’ password based on the names of members of the family as these are the easiest to break.
• Don't connect computers directly to mains. Also, no heavy electric load drawing machines like photo copier, shredder, A/C, cooler etc should be connected to the source of power supply to the computer.
• Don't play computer games or visit pornographic sites as these are the main carriers of viruses and an unsuspecting / easy medium for an intruder to break into your computer system.
• Don't loan programme disks as these may be returned with viruses. If it becomes unavoidable, loan only a copy and not the original CD.
• Don't allow smoking in the vicinity of the computers. Smoke raises the carbon particles, which may enter into computers and create hazards.
• Don't allow eatables inside the computer room lest these raise dust and moisture level of the room to the detriment of the computer system.
• Don't panic if your system comes to a halt. Try to find out the cause and take precautions for future.
• Do not share your credit card or debit card information particularly the CVV (three digits behind the card) with anyone on telephone. These can be punched in the phone rather than reading out to an operator for making payments.
• Do not access Internet Banking website through a link from another website or a link in an e-mail.
• Do not access Internet Banking site at Cyber cafes and shared PCs.
• Do not copy paste your login credential / account information always type it
• Do not respond/avoid opening or replying to spam emails asking for confidential credentials, even if purportedly sent by the Bank. Bank never asks for confidential information like user ID, password, credit card number, CVV, etc, via mail, SMS or bank initiated phone calls.
• Do not use the same password for all your online accounts.
• Do not provide any information on a page which might have come up as a pop-up on your computer.
• Do not get carried away by Emails promising large sums of money through an inheritance or other sources. These are invariably Spam.
• Do not make friend requests to strangers on Facebook or Twitter
• Do not forward or reply to chain email. Delete chain emails and junk email.
• Do not save passwords or PINs as contacts on phone unless they are encrypted.
• Don’t turn on Bluetooth permanently, do so only when planning to use the same and then only in a safe environment.
• Do not open multimedia messages (MMS) or attachments in emails, or click on links in emails and SMS messages unless they are from a trusted source. They could contain malicious software or lead to a malicious website.
• Do not leave mobile phones, laptops,, tablets, digital cameras, and other devices that use lithium batteries on dash board of car during excessive heat with glasses rolled up as they are not only attractive targets for thieves but may also explode.
Conclusion
A number of basic measures are suggested herein, for as the proverb goes – it is better to be safe than sorry. But no security can be foolproof. People make mistakes, equipment fails and threats keep shifting thus constant review is essential. As consumers of the information economy each person has a responsibility to contribute to cyber security in his own way. One security hole could provide access to a scamster to the network. Thus ensuring cyber security is your responsibility and adherence to the Do’s and Don’ts will be your contribution to the same. more  

View all 7 comments Below 7 comments
Thanks Aditya ji more  
Welcome Mr Mittal more  
Thanks Mr Aditya Goyal for finding my post helpful more  
Very useful. Thanks. more  
Very helpful and worth considering by vigilent users and other to secure their data ,mail, PW and finances more  
Post a Comment

Related Posts

    • Band-Aid causing cancer

      Cancer-causing forever chemicals found in BAND-AIDS where they can get directly into blood through open wounds, report warns Bandages from some of the most well-reputed brands, including...

      By Radha Puri
      /
    • Heatwave Alert

      All do’s and don’t issued by sarkar attached

      By Sneha Goyal
      /
    • How to know if phone security is compromised

      Important Thread: 9 Signs Your Phone’s Security Is Compromised! The phone tapping case, which has been making headlines in Telangana, has sparked concerns about the privacy and sec...

      By Garima Sharma
      /
    • Words of ex CBI director Nageshwar Rao today

      Every Indian’s Aadhar Card, PAN Card, Bank Account, Passport, Driving License, FasTag, DigiYatra, Mobile, DigiLocker, Property and Vehicle Registration, Payments, etc are all digitised and li...

      By Rajesh Suri
      /
    • WHY ARE DOGS ROAMING THE STREETS?

      It is reported that a 7 month old Baby has been mauled to death. It appears the Baby was left unattended by a Cleaning Staff. But who let the dogs out on Streets. ? Their place is in human homes a...

      By Jayakumar Daniel
      /
    • Road side assistance for auto cos during an emergency:

      Road side assistance contact numbers during an emergency: Maruti Suzuki: 1800 102 1800 Hyundai: 1800 102 4645 Tata Motors: 1800 209 8282 Mahindra: 1800 209 6006 Toyot...

      By Ruchika Mistry
      /
    • MOSQUITO ERADICATION

      There are a lot of eradication programmes that Netas are talking about. Nobody talks about eradication of mosquitoes. Because of this menace there are more ills than all others put together. ...

      By VIJAYKUMAR N
      /
    • How to ensure whatsapp call doesnt compromise your location

      Did you know that when you make a whatsapp call you disclose your IP addresses to the other person, thereby exposing certain information, including data provider and geographical location.

      By Ruchika L Maheshwari
      /
    • Be careful of matrimony sites

      WhatsApp video scam has now moved to matrimonial websites Here's a woman who connected with this man through bharat matrimony She shared her WhatsApp number. Then got on a vi...

      By Bharat Lal
      /
    • 90% paints in India are bad

      Over 90% of 51 paints used to paint houses, which are available in the Indian market, analysed by two research and advocacy groups contain lead concentrations above the Central government’s p...

      By Sudesh Rai
      /
    • Dog feeders and lovers

      people are giving advice on what to do if stray dog comes after you or to prevent being chased altogether.... "Stay calm" "Don't carry a stick "Don't carry pepper spray" "...

      By Swati M
      /
Share
Enter your email and mobile number and we will send you the instructions

Note - The email can sometime gets delivered to the spam folder, so the instruction will be send to your mobile as well

All My Circles
Invite to
(Maximum 500 email ids allowed.)