Safeguarding your computer

There are several precautions institutions and individuals should take, the most important being not to use pirated software, even though it’s cheap or free. The other steps include:

Use firewalls, and anti-virus software from reputed vendors, and ensure these are upgraded regularly.
Perform regular backups of all critical data, that should be kept on a separate device, and backups stored offline.
Never open attachments received in emails, even if from trusted sources. Always ask the sender to confirm what’s in the attachment before opening it.
Never ever click on an URL link, even if from a supposedly trusted sender. Always type in the URL in the browser directly yourself.
For financial transactions, ensure the use of Secure Socket 7. Ensure the protocol shows https://, not merely http://, together with the padlock symbol.
Use two-factor authentication in emails. Ensure the OTP comes to a different mobile device than one used for email. If one gets the SMS OTP on the same device used to access email, there is no added protection.
Big organisations should take several extra precautionary steps as individual users are often the weakest links. They should deploy web and email filters on their network. Configure these devices to scan for known bad domains, sources, and addresses; block these before receiving and downloading messages. Scan all emails, attachments, and downloads both on the host and at the mail gateway with a reputable anti-virus solution.

Disable macros in Microsoft Office products. Some Office products allow disabling of macros that originate from outside an organisation and can provide a hybrid approach when the outfit depends on the legitimate use of macros. For Windows, specific settings can block macros originating from the Internet from running.

Configure access controls, including file, directory, and network share permissions, with least privilege in mind. If a user only needs to read specific files, they should not have write access to those files, directories, or shares.
Regularly check the content of backup files of databases for any unauthorised encrypted contents of data records or external elements.
Restrict users’ abilities (permissions) to install and run unwanted software applications.
Enable personal firewalls on workstations. more  

View all 15 comments Below 15 comments
Contents are note for future guidance. more  
A very informative write-up. Thanks. more  
Good and useful information though some points are already known more  
thank you sir On Wed, May 17, 2017 at 8:56 PM, RG Deshmukh wrote: > more  
Madam, my only worry is that the Central Govt in going ahead, has collected a lot of personal details of persons like the Aadhar, PAN as well as all the bank accounts of individuals are on internet etc. I am not sure whether the govt is well equipped to deal with such a situation as a whole. Even if we as individuals take max precautions this is the scary part. Could you please elaborate? more  
Post a Comment

Related Posts

    • Band-Aid causing cancer

      Cancer-causing forever chemicals found in BAND-AIDS where they can get directly into blood through open wounds, report warns Bandages from some of the most well-reputed brands, including...

      By Radha Puri
      /
    • Heatwave Alert

      All do’s and don’t issued by sarkar attached

      By Sneha Goyal
      /
    • How to know if phone security is compromised

      Important Thread: 9 Signs Your Phone’s Security Is Compromised! The phone tapping case, which has been making headlines in Telangana, has sparked concerns about the privacy and sec...

      By Garima Sharma
      /
    • Words of ex CBI director Nageshwar Rao today

      Every Indian’s Aadhar Card, PAN Card, Bank Account, Passport, Driving License, FasTag, DigiYatra, Mobile, DigiLocker, Property and Vehicle Registration, Payments, etc are all digitised and li...

      By Rajesh Suri
      /
    • WHY ARE DOGS ROAMING THE STREETS?

      It is reported that a 7 month old Baby has been mauled to death. It appears the Baby was left unattended by a Cleaning Staff. But who let the dogs out on Streets. ? Their place is in human homes a...

      By Jayakumar Daniel
      /
    • Road side assistance for auto cos during an emergency:

      Road side assistance contact numbers during an emergency: Maruti Suzuki: 1800 102 1800 Hyundai: 1800 102 4645 Tata Motors: 1800 209 8282 Mahindra: 1800 209 6006 Toyot...

      By Ruchika Mistry
      /
    • MOSQUITO ERADICATION

      There are a lot of eradication programmes that Netas are talking about. Nobody talks about eradication of mosquitoes. Because of this menace there are more ills than all others put together. ...

      By VIJAYKUMAR N
      /
    • How to ensure whatsapp call doesnt compromise your location

      Did you know that when you make a whatsapp call you disclose your IP addresses to the other person, thereby exposing certain information, including data provider and geographical location.

      By Ruchika L Maheshwari
      /
    • Be careful of matrimony sites

      WhatsApp video scam has now moved to matrimonial websites Here's a woman who connected with this man through bharat matrimony She shared her WhatsApp number. Then got on a vi...

      By Bharat Lal
      /
    • 90% paints in India are bad

      Over 90% of 51 paints used to paint houses, which are available in the Indian market, analysed by two research and advocacy groups contain lead concentrations above the Central government’s p...

      By Sudesh Rai
      /
    • Dog feeders and lovers

      people are giving advice on what to do if stray dog comes after you or to prevent being chased altogether.... "Stay calm" "Don't carry a stick "Don't carry pepper spray" "...

      By Swati M
      /
Share
Enter your email and mobile number and we will send you the instructions

Note - The email can sometime gets delivered to the spam folder, so the instruction will be send to your mobile as well

All My Circles
Invite to
(Maximum 500 email ids allowed.)