Cyber Security Do's and Dont's

On the occasion of Safer Internet Day, we are sharing these useful Do's and Don'ts related to cyber security. Do follow and share the same with your social media contacts so they become aware as well.

Indian Police Foundation

Cyber Security Do's and Dont's

Do’s

• Do ensure physical security of your computer, laptop or mobile phone at all times, unattended hardware will provide ordinary as well as cyber criminals a lucrative opportunity for intrusion apart from loss of a valuable item.
• Do ensure access control by incorporating appropriate identification and authentication mechanism like 'complex passwords' at different levels and ' dynamic log-in' by verifying users' magnetic strip cards, fingerprints and voice recognition, depending upon the nature and sensitivity of data.
• Do use effective encryption techniques while communicating sensitive information over networks. Simple encryption software can be downloaded.
• Do ensure that you overwrite sensitive files with some junk data before deleting these. Antivirus software has facilities for file shredding use the same instead of simply deleting the file.
• Do ensure you have a back up copy of sensitive files and keep the same constantly updated. Antivirus software frequently has back up facilities bundled with the main package avail of the same.
• Do ensure use of original software purchased from authorized vendor. This is expensive but will ensure security of your information.
• Do be careful while installing software, criminals dupe users into downloading malicious software.
• Do update software regularly. Suppliers of PCs, software, and operating systems such as Windows frequently issue software updates (patches) to fix minor problems (bugs) or improve security. Keeping the computer up to date is important.
• Do update your anti-virus software regularly. McAfee security software like McAfee Total Protection update automatically and continuously via the Internet avail of these facilities.
• Do ensure that all removable media as CDs, pen drives and so on are in proper custody and regularly accounted for.
• Do test every removable hard disk, CD and pen drive for virus contamination by running a scan on the system on insertion.
• Do destroy damaged and unusable CDs / pen drives by burning rather than dumping in the garbage in case these contain sensitive information.
• Do ensure that maintenance and repair is done by a competent person from an authorized agency and person does not pilfer data or manipulate the system
• Do use Uninterrupted Power Supply (UPS) with sufficient back up in case you have frequent power break downs which are normal in India except in Mumbai.
• Do delete chain and junk emails rather than forwarding these.
• Do ensure software is loaded to delete all information on a laptop or mobile phone from remote locations to safeguard the same in case it is stolen.
• Do ensure that user name and pass words for a computer even if only one person is using the laptop or computer. As all files contain the user name, this will ensure that your identity is also secure in case of identity theft.
• Do ensure that passwords are used in multiple tiers, firstly access to the system, the user and also documents with separate passwords for each.
• Do make smart passwords a habit. This will include a combination of upper- and lower-case letters, numbers and symbols. Minimum length of a good password is eight characters which should be frequently changed by setting an expiry period. Password generators should be used in large organizations.
• Do ensure security if you are using cloud computing services. Check level of security provided by cloud computing provider and as most of these are based outside India legal aspects need consideration.
• Do ensure that you observe all security norms of your organization in case you are permitted to work on personal computers, laptops or mobile phones, from home.
• Do plan for the worst case scenario, this may be a good strategy rather than relying on minimal security due to factors of cost or ignorance.
• Do update Email list regularly and delete contacts who are unknown from time to time,
• Do log out of websites after accessing desired information.
• Do exercise caution when downloading files from the Internet. Ensure that the source is a legitimate and reputable one. Verify that an anti-virus program in the email checks the files on the download site.
• Do err on the side of caution when in doubt and do not open, download, or execute any files or email attachments.
• Do maintain logbook regarding all activities carried out on computer systems indicating the name of the user, duration for which a particular user used the computer, type of activity carried out etc. 'Audit Trail Concept' should be incorporated in the system where high security is essential.
• Do ensure that all financial transactions have multiple levels of security including a system of one time passwords and authentication of persons issuing instructions.
• Do always visit Internet Banking site through the bank’s web site.
• Do verify domain name displayed on the site to avoid spoof websites.
• Do ensure a suitable firewall is installed in your PC to protect the contents from outsiders on the internet.
• Do enter User ID and Password only at the authenticated login page of the Bank and use virtual keyboard feature while logging into your Internet banking account.
• Do check account and transaction history regularly. Check your statements for any transactions that look suspicious.
• Do check the Last Log-in Date and Time on the top right hand corner to monitor any unauthorised logins.
• Do, “Log Out,” after using the Internet Banking Service and not just close the window.
• Do close your Internet browser after logging out of each Internet Banking session.
• Do contact bank if you lose your pin number or card immediately on the Customer Service Number and by Email.
• Do change your password and pin number frequently.
• Do report any suspicious infringement immediately to bank’s customer care telephone and through email.
• Do treat your smart phone like a wallet - keep it safe and on your person at all times.
• Do remember your smart phone is a computer, thus all security rules should apply to the same.
• Do use only reputed mobile applications (apps)
• Do turn on the security features of your phone, set a password or Personal Identification Number (PIN). Use the same rules for setting passwords as for computers.
• Do check for updates to phones operating system regularly. Install them as soon as they are available.
• Do use only encrypted networks for Wi-Fi.
• Do note down complete details of your phone in case of theft, in particular the unique International Mobile Station Equipment Identity (IMEI). Network provider can stop phone being used if it is stolen.
• Do report loss of telephone to network operator immediately so it can be disabled. If you find it the same can be easily re-enable the phone.
• Do check your phone bill details regularly, an infected phone will also lead to inflated bills.

Don’ts

• Do not use pirated software – including operating system, application and antivirus, as it is not just a security hazard but may also result in systems crash at a critical time.
• Do not download any files from Emails send by strangers. Preferably use email services as Google which contains software that checks virus in attachments.
• Do not download files from the Internet directly without confirming the source. Use an anti-virus program that checks files before downloading.
• Do not open files when in doubt even from known Email addresses. Some viruses can replicate themselves and spread through email. Confirm that your contact really sent an attachment.
• Do not open any files attached to an email if the subject line is questionable or unexpected.
• Don't let any un-authorised person use your computer system.
• Don't share your password with anyone, not even with your colleagues.
• Don’t have a, ‘family,’ password based on the names of members of the family as these are the easiest to break.
• Don't connect computers directly to mains. Also, no heavy electric load drawing machines like photo copier, shredder, A/C, cooler etc should be connected to the source of power supply to the computer.
• Don't play computer games or visit pornographic sites as these are the main carriers of viruses and an unsuspecting / easy medium for an intruder to break into your computer system.
• Don't loan programme disks as these may be returned with viruses. If it becomes unavoidable, loan only a copy and not the original CD.
• Don't allow smoking in the vicinity of the computers. Smoke raises the carbon particles, which may enter into computers and create hazards.
• Don't allow eatables inside the computer room lest these raise dust and moisture level of the room to the detriment of the computer system.
• Don't panic if your system comes to a halt. Try to find out the cause and take precautions for future.
• Do not share your credit card or debit card information particularly the CVV (three digits behind the card) with anyone on telephone. These can be punched in the phone rather than reading out to an operator for making payments.
• Do not access Internet Banking website through a link from another website or a link in an e-mail.
• Do not access Internet Banking site at Cyber cafes and shared PCs.
• Do not copy paste your login credential / account information always type it
• Do not respond/avoid opening or replying to spam emails asking for confidential credentials, even if purportedly sent by the Bank. Bank never asks for confidential information like user ID, password, credit card number, CVV, etc, via mail, SMS or bank initiated phone calls.
• Do not use the same password for all your online accounts.
• Do not provide any information on a page which might have come up as a pop-up on your computer.
• Do not get carried away by Emails promising large sums of money through an inheritance or other sources. These are invariably Spam.
• Do not make friend requests to strangers on Facebook or Twitter
• Do not forward or reply to chain email. Delete chain emails and junk email.
• Do not save passwords or PINs as contacts on phone unless they are encrypted.
• Don’t turn on Bluetooth permanently, do so only when planning to use the same and then only in a safe environment.
• Do not open multimedia messages (MMS) or attachments in emails, or click on links in emails and SMS messages unless they are from a trusted source. They could contain malicious software or lead to a malicious website.
• Do not leave mobile phones, laptops,, tablets, digital cameras, and other devices that use lithium batteries on dash board of car during excessive heat with glasses rolled up as they are not only attractive targets for thieves but may also explode.
Conclusion
A number of basic measures are suggested herein, for as the proverb goes – it is better to be safe than sorry. But no security can be foolproof. People make mistakes, equipment fails and threats keep shifting thus constant review is essential. As consumers of the information economy each person has a responsibility to contribute to cyber security in his own way. One security hole could provide access to a scamster to the network. Thus ensuring cyber security is your responsibility and adherence to the Do’s and Don’ts will be your contribution to the same. more  

View all 42 comments Below 42 comments
Kindly add: Delete cookies at regular intervals - preferably everyday. Delete temporary files (created by some Apps in Mobile Phones) by suitable system maintenance. Convert downloaded files to suitable Text file/Document file ( particularly if unloaded from websites of not that repute websites). Don't get lured by some unsolicited offers/scarewares - like 'free services' to increase the speed of your system performance, free anti-virus (since your system was found infected), etc. While making monetary transaction check the bona-fides of the beneficiary - is it http or https (with a symbol of lock). more  
All these information are very useful Though we may be aware of them but we never practice them We promote cyber crime in this way S.Sanyal more  
I refer to the comments of few members. Thanks for such advisories. First of all , we need to understand the importance of prevention. It is a true fact that prevention is better than cure and secondly assert rights come after we discharge our responsibilities. After all when we sleep or go out of the house, we lock our doors to prevent any trespassing, theft, loot etc. Similarly it is our responsibility to take care of our action points to avoid falling into the traps. However, I request the author to upload the database of the officials to be contacted to report for cyber complaints and database may contain at least email ids and fax Nos., postal address etc. more  
Thanks for the mail.  It is informative. On Tuesday, 6 February 2018 7:40 PM, Indian Police Foundation wrote: more  
Post a Comment

Related Posts

    • 53 commonly used drugs unsafe failed quality test

      53 medicines including paracetamol failed in quality test!! Attached is the full list. Apart from vitamins, sugar and blood pressure medicines, antibiotics are also included in the list...

      By Amit Mishra
      /
    • Devices becoming bimba

      As we saw in Lebanon how pagers and walkie talkie were exploded by the israelis, devices will be used for surveillance and attacks of different kinds in the not so far future. Medical de...

      By Ruchika L Maheshwari
      /
    • AVOIDABLE TRAGEDY

      The majority of Indians are deeply spiritual, with a wide array of religious beliefs. This diversity in belief is not inherently problematic; in fact, many people seek the grace of the Almighty for...

      By Jayakumar Daniel
      /
    • Drugs that have failed quality tests

      Full list of drugs that failed quality tests. Do share with friends family so if they are taking them they find replacements or consult Doctors Cyra Tablets, Rabeprazole Sodium Tablets I...

      By Sarita Ravichandran
      /
    • Bhartiya Nyay Sanhita needs to be rolled back

      In just 15 days, from the 01st of July, the Indian law system will be turned on its head. The BNS is about to begin. Bharatiya Nyay Sanhita (BNS) gives massive powers to local...

      By Ruchika L Maheshwari
      /
    • Band-Aid causing cancer

      Cancer-causing forever chemicals found in BAND-AIDS where they can get directly into blood through open wounds, report warns Bandages from some of the most well-reputed brands, including...

      By Radha Puri
      /
    • Heatwave Alert

      All do’s and don’t issued by sarkar attached

      By Sneha Goyal
      /
    • How to know if phone security is compromised

      Important Thread: 9 Signs Your Phone’s Security Is Compromised! The phone tapping case, which has been making headlines in Telangana, has sparked concerns about the privacy and sec...

      By Garima Sharma
      /
    • Words of ex CBI director Nageshwar Rao today

      Every Indian’s Aadhar Card, PAN Card, Bank Account, Passport, Driving License, FasTag, DigiYatra, Mobile, DigiLocker, Property and Vehicle Registration, Payments, etc are all digitised and li...

      By Rajesh Suri
      /
    • WHY ARE DOGS ROAMING THE STREETS?

      It is reported that a 7 month old Baby has been mauled to death. It appears the Baby was left unattended by a Cleaning Staff. But who let the dogs out on Streets. ? Their place is in human homes a...

      By Jayakumar Daniel
      /
    • Road side assistance for auto cos during an emergency:

      Road side assistance contact numbers during an emergency: Maruti Suzuki: 1800 102 1800 Hyundai: 1800 102 4645 Tata Motors: 1800 209 8282 Mahindra: 1800 209 6006 Toyot...

      By Ruchika Mistry
      /
Share
Enter your email and mobile number and we will send you the instructions

Note - The email can sometime gets delivered to the spam folder, so the instruction will be send to your mobile as well

All My Circles
Invite to
(Maximum 500 email ids allowed.)