Safeguarding your computer

There are several precautions institutions and individuals should take, the most important being not to use pirated software, even though it’s cheap or free. The other steps include:

Use firewalls, and anti-virus software from reputed vendors, and ensure these are upgraded regularly.
Perform regular backups of all critical data, that should be kept on a separate device, and backups stored offline.
Never open attachments received in emails, even if from trusted sources. Always ask the sender to confirm what’s in the attachment before opening it.
Never ever click on an URL link, even if from a supposedly trusted sender. Always type in the URL in the browser directly yourself.
For financial transactions, ensure the use of Secure Socket 7. Ensure the protocol shows https://, not merely http://, together with the padlock symbol.
Use two-factor authentication in emails. Ensure the OTP comes to a different mobile device than one used for email. If one gets the SMS OTP on the same device used to access email, there is no added protection.
Big organisations should take several extra precautionary steps as individual users are often the weakest links. They should deploy web and email filters on their network. Configure these devices to scan for known bad domains, sources, and addresses; block these before receiving and downloading messages. Scan all emails, attachments, and downloads both on the host and at the mail gateway with a reputable anti-virus solution.

Disable macros in Microsoft Office products. Some Office products allow disabling of macros that originate from outside an organisation and can provide a hybrid approach when the outfit depends on the legitimate use of macros. For Windows, specific settings can block macros originating from the Internet from running.

Configure access controls, including file, directory, and network share permissions, with least privilege in mind. If a user only needs to read specific files, they should not have write access to those files, directories, or shares.
Regularly check the content of backup files of databases for any unauthorised encrypted contents of data records or external elements.
Restrict users’ abilities (permissions) to install and run unwanted software applications.
Enable personal firewalls on workstations. more  

View all 15 comments Below 15 comments
Contents are note for future guidance. more  
A very informative write-up. Thanks. more  
Good and useful information though some points are already known more  
thank you sir On Wed, May 17, 2017 at 8:56 PM, RG Deshmukh wrote: > more  
Madam, my only worry is that the Central Govt in going ahead, has collected a lot of personal details of persons like the Aadhar, PAN as well as all the bank accounts of individuals are on internet etc. I am not sure whether the govt is well equipped to deal with such a situation as a whole. Even if we as individuals take max precautions this is the scary part. Could you please elaborate? more  
Post a Comment

Related Posts

    • AVOIDABLE TRAGEDY

      The majority of Indians are deeply spiritual, with a wide array of religious beliefs. This diversity in belief is not inherently problematic; in fact, many people seek the grace of the Almighty for...

      By Jayakumar Daniel
      /
    • Drugs that have failed quality tests

      Full list of drugs that failed quality tests. Do share with friends family so if they are taking them they find replacements or consult Doctors Cyra Tablets, Rabeprazole Sodium Tablets I...

      By Sarita Ravichandran
      /
    • Bhartiya Nyay Sanhita needs to be rolled back

      In just 15 days, from the 01st of July, the Indian law system will be turned on its head. The BNS is about to begin. Bharatiya Nyay Sanhita (BNS) gives massive powers to local...

      By Ruchika L Maheshwari
      /
    • Band-Aid causing cancer

      Cancer-causing forever chemicals found in BAND-AIDS where they can get directly into blood through open wounds, report warns Bandages from some of the most well-reputed brands, including...

      By Radha Puri
      /
    • Heatwave Alert

      All do’s and don’t issued by sarkar attached

      By Sneha Goyal
      /
    • How to know if phone security is compromised

      Important Thread: 9 Signs Your Phone’s Security Is Compromised! The phone tapping case, which has been making headlines in Telangana, has sparked concerns about the privacy and sec...

      By Garima Sharma
      /
    • Words of ex CBI director Nageshwar Rao today

      Every Indian’s Aadhar Card, PAN Card, Bank Account, Passport, Driving License, FasTag, DigiYatra, Mobile, DigiLocker, Property and Vehicle Registration, Payments, etc are all digitised and li...

      By Rajesh Suri
      /
    • WHY ARE DOGS ROAMING THE STREETS?

      It is reported that a 7 month old Baby has been mauled to death. It appears the Baby was left unattended by a Cleaning Staff. But who let the dogs out on Streets. ? Their place is in human homes a...

      By Jayakumar Daniel
      /
    • Road side assistance for auto cos during an emergency:

      Road side assistance contact numbers during an emergency: Maruti Suzuki: 1800 102 1800 Hyundai: 1800 102 4645 Tata Motors: 1800 209 8282 Mahindra: 1800 209 6006 Toyot...

      By Ruchika Mistry
      /
    • MOSQUITO ERADICATION

      There are a lot of eradication programmes that Netas are talking about. Nobody talks about eradication of mosquitoes. Because of this menace there are more ills than all others put together. ...

      By VIJAYKUMAR N
      /
    • How to ensure whatsapp call doesnt compromise your location

      Did you know that when you make a whatsapp call you disclose your IP addresses to the other person, thereby exposing certain information, including data provider and geographical location.

      By Ruchika L Maheshwari
      /
Share
Enter your email and mobile number and we will send you the instructions

Note - The email can sometime gets delivered to the spam folder, so the instruction will be send to your mobile as well

All My Circles
Invite to
(Maximum 500 email ids allowed.)