Cyber Security - Guide and Tips
Smrati Mehta
IICA Certified Independent Director, Independent Consultant (Freelance) & Facilitator | Leading Transformations | Neurodiversity Champion | Ex AVP National Stock Exchange of India Ltd.
News on cybercrime keeps making shockwaves now and then. As per media reports, a staggering amount of Rs.7000 cr has been looted by cyber thugs in just one year! The rampant increase in cybercrime can be estimated from the number of complaints received by police this year alone, which is around 7.5 million vs 1.5 million complaints last year.*
Cybercriminals catch up and match with the advancement in technology at a rapid pace. On one end we feel upbeat about the internet penetration in rural areas as it brings progress and development, on the other hand, some people are exploiting it for a shorter route to wealth.?
Below are the screenshots of live data on the cyberattacks happening worldwide (https://threatmap.checkpoint.com/). These are enough to percolate the gravity of the situation -?
The paradigm of ‘‘jaan maal ki suraksha’ (safety of life and belongings) has changed and taken a different form with the advent of cybercrime. Along with the material things now the safety of your unseen yet tangible wealth; ‘our identity’ is a crucial aspect that makes you, ‘YOU’. Someone steals a digital identity and wipes out a person’s bank account, can commit fraud by impostoring an innocent, can steal critical data, and blackmail; the list is endless of financially and psychologically devastating crimes.?
Understanding how these crimes transpire and the vulnerabilities of our devices will help in bringing a mind-shift. In the era of easy-to-use and adaptive technology, the means of crime are also easily available. Criminals like anyone else have access to free open-source platforms, no programming knowledge or deep technical know-how is needed to perform these malicious acts. Simple commands to create a clone website, to start the probe for hacking the open ports, or for any other such malicious activity, are available on open-source platforms.
Looking at the modalities of these crimes, it is evident that cybercriminals do a lot of preparation before the actual attack. Personal information like your address, age, family details, lifestyle, immediate plans, etc are collected to choose the target and plan the crime. All this information is available explicitly (if shared it on social media) or implicitly on personal devices. Therefore, it is crucial to increase awareness about the modalities of such crimes. Awareness will bring the responsibility for practicing safe measures while using the internet and digital devices.
The purpose of this article is to provide some insights and share a few practical tips one can adopt to stay cyber-safe. The given points must be considered as basic hygiene practices and not mere optional precautionary measures:?
1. Device hygiene-?
2. Password hygiene-?
Passwords are like strong locks that we put on the entrance door of the home or the safety vault. Below are three basic safe password practices one must follow:?
I) Password strength - A strong password cannot be hacked easily. You can check the strength of your current password on the website? www.passwordmonster.com. If the result shocks you, here are some of the best practices for a strong password -?
Note - It would be interesting to know what was your password strength and what it is now if you used any of the above tips. Do share it in the comments box.?
ii) Securing passwords -?
iii) Use double door lock feature - Wherever available use two-factor authentication (2FA) to access the site. The one where an OTP is generated and messaged you or sent to your email.?
领英推荐
3. Browsing hygiene -?
Most browsers indicate the authenticity if the website by giving the information in the padlock. Click on the icon (padlock) appearing at the left corner, as shown in the pic below. You can check if the website belongs to the authentic source that you intend to visit by checking the about page and the security certificate.
Alternatly you can use the https://transparencyreport.google.com/safe-browsing/ to check the website. There are few other such tools available for use.
Other safety rules to follow -?
There are cases where spammers use certain schemes of words to psychologically hack your brain and then the person on the receiving end just follows their instructions. There are many more dangerous ways to hack the brain digitally*. It is scary though, but precaution through awareness is the only solution at the individual level.?
Safety at ATMs -?
Above mentioned measures may not be the complete list, but the idea is to create sensitivity toward our vulnerability. It may sound like paranoia but we cannot close our eyes and live with ostrich effect. We cannot even give up using digital means either, these are part and parcel of our day-to-day lives.?
Conclusion
In conclusion, we can say the digital world safety lies in the hands of the user. It is important to continue dialogue about cyber safety with children and elders at home.? Schools and colleges can play an important role. They must invite experts and organize awareness sessions. Organizations must run awareness campaigns from time to time to sensitize their employees. I suggest short courses on cyber security should be made compulsory at schools and workplaces. Knowing the pitfalls can keep us alert against any type of cybercrime. Lastly, in case a person becomes the target of cybercrime/ cyberbullying they must immediately disclose it to friends and family without fear of being judged and report the crime to a cyber security cell.?
Stay cyber-safe stay healthy and happy! must be the new slogan now.
*If you are interested in knowing more about brain hacking you can read this article;
Strategic Business Developer & Virtual Executive Assistant I
8 个月Thanks for sharing Cybersecurity awareness is indeed vital, especially in our increasingly digital world. Great article! For those looking to delve deeper into cyber risk quantification and management, CyberSecure Corp offers comprehensive tools and resources that might be helpful. They have excellent tips and solutions for safeguarding against cyber threats. Let's all do our part to stay cybersafe!"
Senior Software Engineer at DST Worldwide Services India Pvt. Ltd.
8 个月Very helpful!
IICA Certified Independent Director, Independent Consultant (Freelance) & Facilitator | Leading Transformations | Neurodiversity Champion | Ex AVP National Stock Exchange of India Ltd.
9 个月Based on suggestions received from readers, I have updated the article with information about how to check fake websites. Thanks for your input and support!
Certified Independent Director | Board Member | Strategic Marketer | Corporate Governance | Innovation and Growth | P&L Management | Global Business Expansion | Corporate Acquisition | New Business Development |
9 个月Smrati ji, you are right cybersecurity is major problem nowadays.
IICA Certified Independent Director, Independent Consultant (Freelance) & Facilitator | Leading Transformations | Neurodiversity Champion | Ex AVP National Stock Exchange of India Ltd.
9 个月Thanks Vishal Jadhav for reposting this important information.