SlideShare a Scribd company logo
1 of 19
Are you safe in this cyber
world?
Security tips…..Read More
Do not share personal information
Security tip 1
Use strong passwords
• using a combination of capital and lower-case letters, numbers and
symbols
• making it between eight and 12 characters long
• avoiding the use of personal data
• changing it regularly
• never using it for multiple accounts
• using two factor authentication
Security tip 2
Control access
• control physical access to premises and computers network
• restrict access to unauthorised users
• limit access to data or services through application controls
• restrict what can be copied from the system and saved to storage
devices
• limit sending and receiving of certain types of email attachments
Security tip 3
Use a different password for each account
• you use the same password for sites like Gmail, Facebook and
Outlook and your password for Facebook gets revealed to someone.
That person can then access your Gmail and Outlook accounts as well
Security tip 4
Use sites with HTTPS
• Ensure the URL of the site contains HTTPS instead of HTTP
• HTTPS is a protocol for browsing internet that uses encryption
techniques and is more secure than HTTP.
Security tip 5
Update programs and systems regularly
• Important software like browser, payment wallet apps should be
updated regularly
Security tip 6
Use security software/ sites
• Avoid opening links of lotteries, prizes, gifts, discounts
• Download all software from authentic sources, avoid downloading
software (executable files) from torrent sites
• Use a good anti-virus software suite
• While using third party computers or mobiles for browsing use the
private/incognito mode
• Be careful while downloading any free software or screensaver etc.
Security tip 7
Put up a firewall
• Firewalls are effectively gatekeepers between your computer and the
internet, and one of the major barriers to prevent the spread of cyber
threats such as viruses and malware. Make sure that you set up your
firewall devices properly or they may not be fully effective.
• Install and use a firewall, pop-up blocker and spyware detector
Security tip 8
Update programs and systems regularly
• Updates contain vital security upgrades that help protect against
known bugs and vulnerabilities
• Ensure that your virus definitions are up to date and run antivirus and
spyware detectors/cleaners regularly
Security tip 9
Monitor for intrusion
• You can use intrusion detectors to monitor system and unusual
network activity. If a detection system suspects a potential security
breach, it can generate an alarm, such as an email alert, based upon
the type of activity it has identified
Security tip 10
Raise awareness
• Your employees have a responsibility to help keep your business
secure. Make sure that they understand their role and any relevant
policies and procedures, and provide them with regular cyber security
awareness and training.
• Your kids/ spouse/ relatives using computer/ mobile for online
transactions, make sure that they understand their usage and sites
they visit.
Security tip 11
Beware of Phishing
• Attackers sometimes create a fake login webpage similar to that of
standard websites and ask users to enter their login credentials.
However, when entered, the login username &
• password go to the attacker instead of the intended website. This
attack is known as phishing.
• While logging in to any site, check the URL (the one in the address
bar), it should be exactly the same as the site you want to log in to
• Always type in the website address yourself rather than clicking on a
link provided.
Security tip 12
Use password securely
• While using third party computers, use an on-screen keyboard while
entering important details
• Never give your password to anyone. Your ISP/banks will never, ever
ask you for your password while you are online or via email
• Create nicknames that do not reflect your own name or anything
personal
Security tip 13
Regular files backup
• Make Backups of Important Files and Folders to protect important
files and records on your computer
• Keep Important Files and Folders to protected with password
Security tip 14
Check E-Mail attachments securely
• Be cautious of unsolicited offers . Never purchase anything advertised
through an unsolicited email
• Open email attachment carefully
• Keep Antivirus Email security on
Security tip 15
Secure downloads
• Never accept any kind of freebies or free downloads of any
pictures/music files
• Download all software from authentic sources, avoid downloading
software (executable files) from torrent sites
• Be careful while downloading any free software or screensaver etc.
• Never accept any kind of freebies or free downloads of any
pictures/music files
Security tip 16
Secure online
• Always LOGOUT or SIGNOUT
• Do not store passwords in browser
• Do not accept cookies policy
• Do not upload personal information
• Be secure on social networking site. Do not accept friend request
from strangers
• Keep 2 ids, one id OFFICAL, 2nd id for social networking sites like
facebook , yahoo, gmail
• Always talk with your parents or a responsible adult about your online
activities
Security tip 17
Secure online transactions
• URL of the site contains HTTPS instead of HTTP
• Type URL, do not click on shared/ forwarded links
• Always enter password from online keyboard
• After transaction, logout the session from browser/ app
• Do not share OTP for any transaction with anyone
• Always keep banking n credit card companies phone numbers in your
mobile
• SMS-Alert facility: Banks & credit cards should send u a sms as soon
money is withdrawn from your account or any monetary transaction
happens in your account.
Security tip 18

More Related Content

What's hot

IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts Sophos
 
online and offline computer security
online and offline computer securityonline and offline computer security
online and offline computer securityAbhishek Pansuriya
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTsIT Tech
 
Itsa end user 2013
Itsa end user 2013Itsa end user 2013
Itsa end user 2013salleh1n
 
Internet security tutorial
Internet security tutorialInternet security tutorial
Internet security tutorialiuvmtech
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Tips to make it security robust against ransomware or malware
Tips to make it security robust against ransomware or malwareTips to make it security robust against ransomware or malware
Tips to make it security robust against ransomware or malwareMultiTech IT
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online NetiquetteZoro18
 
A survey of ethical hacking process and security
A survey of ethical hacking process and securityA survey of ethical hacking process and security
A survey of ethical hacking process and securityAhmad El Tawil
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)Vinayak Hegde
 
Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020Jay Nagar
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnumARUN REDDY M
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Networkthowell
 

What's hot (20)

IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
online and offline computer security
online and offline computer securityonline and offline computer security
online and offline computer security
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTs
 
Internet security
Internet securityInternet security
Internet security
 
Itsa end user 2013
Itsa end user 2013Itsa end user 2013
Itsa end user 2013
 
Internet security tutorial
Internet security tutorialInternet security tutorial
Internet security tutorial
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
IT Security DOs and DON'Ts
IT Security DOs and DON'TsIT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
Tips to make it security robust against ransomware or malware
Tips to make it security robust against ransomware or malwareTips to make it security robust against ransomware or malware
Tips to make it security robust against ransomware or malware
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online Netiquette
 
A survey of ethical hacking process and security
A survey of ethical hacking process and securityA survey of ethical hacking process and security
A survey of ethical hacking process and security
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)
 
Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
 

Similar to ACESnWS cyber security tips

Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNetLockSmith
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfVarinder K
 
Top 10 Cyber Crime Prevention Tips.pptx
Top 10 Cyber Crime Prevention Tips.pptxTop 10 Cyber Crime Prevention Tips.pptx
Top 10 Cyber Crime Prevention Tips.pptxSarimRyan
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsKevin Fream
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptxbinowe
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptxreagan sapul
 
Securityawareness
SecurityawarenessSecurityawareness
SecurityawarenessJayfErika
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Identity Theft - by LINKS Technology
Identity Theft - by LINKS TechnologyIdentity Theft - by LINKS Technology
Identity Theft - by LINKS TechnologyCoyleFinancial
 
Secure Communication
Secure CommunicationSecure Communication
Secure CommunicationKoen Van Impe
 

Similar to ACESnWS cyber security tips (20)

Secure End User
Secure End UserSecure End User
Secure End User
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdf
 
Top 10 Cyber Crime Prevention Tips.pptx
Top 10 Cyber Crime Prevention Tips.pptxTop 10 Cyber Crime Prevention Tips.pptx
Top 10 Cyber Crime Prevention Tips.pptx
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Internet
InternetInternet
Internet
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Identity Theft - by LINKS Technology
Identity Theft - by LINKS TechnologyIdentity Theft - by LINKS Technology
Identity Theft - by LINKS Technology
 
Secure Communication
Secure CommunicationSecure Communication
Secure Communication
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

ACESnWS cyber security tips

  • 1. Are you safe in this cyber world? Security tips…..Read More
  • 2. Do not share personal information Security tip 1
  • 3. Use strong passwords • using a combination of capital and lower-case letters, numbers and symbols • making it between eight and 12 characters long • avoiding the use of personal data • changing it regularly • never using it for multiple accounts • using two factor authentication Security tip 2
  • 4. Control access • control physical access to premises and computers network • restrict access to unauthorised users • limit access to data or services through application controls • restrict what can be copied from the system and saved to storage devices • limit sending and receiving of certain types of email attachments Security tip 3
  • 5. Use a different password for each account • you use the same password for sites like Gmail, Facebook and Outlook and your password for Facebook gets revealed to someone. That person can then access your Gmail and Outlook accounts as well Security tip 4
  • 6. Use sites with HTTPS • Ensure the URL of the site contains HTTPS instead of HTTP • HTTPS is a protocol for browsing internet that uses encryption techniques and is more secure than HTTP. Security tip 5
  • 7. Update programs and systems regularly • Important software like browser, payment wallet apps should be updated regularly Security tip 6
  • 8. Use security software/ sites • Avoid opening links of lotteries, prizes, gifts, discounts • Download all software from authentic sources, avoid downloading software (executable files) from torrent sites • Use a good anti-virus software suite • While using third party computers or mobiles for browsing use the private/incognito mode • Be careful while downloading any free software or screensaver etc. Security tip 7
  • 9. Put up a firewall • Firewalls are effectively gatekeepers between your computer and the internet, and one of the major barriers to prevent the spread of cyber threats such as viruses and malware. Make sure that you set up your firewall devices properly or they may not be fully effective. • Install and use a firewall, pop-up blocker and spyware detector Security tip 8
  • 10. Update programs and systems regularly • Updates contain vital security upgrades that help protect against known bugs and vulnerabilities • Ensure that your virus definitions are up to date and run antivirus and spyware detectors/cleaners regularly Security tip 9
  • 11. Monitor for intrusion • You can use intrusion detectors to monitor system and unusual network activity. If a detection system suspects a potential security breach, it can generate an alarm, such as an email alert, based upon the type of activity it has identified Security tip 10
  • 12. Raise awareness • Your employees have a responsibility to help keep your business secure. Make sure that they understand their role and any relevant policies and procedures, and provide them with regular cyber security awareness and training. • Your kids/ spouse/ relatives using computer/ mobile for online transactions, make sure that they understand their usage and sites they visit. Security tip 11
  • 13. Beware of Phishing • Attackers sometimes create a fake login webpage similar to that of standard websites and ask users to enter their login credentials. However, when entered, the login username & • password go to the attacker instead of the intended website. This attack is known as phishing. • While logging in to any site, check the URL (the one in the address bar), it should be exactly the same as the site you want to log in to • Always type in the website address yourself rather than clicking on a link provided. Security tip 12
  • 14. Use password securely • While using third party computers, use an on-screen keyboard while entering important details • Never give your password to anyone. Your ISP/banks will never, ever ask you for your password while you are online or via email • Create nicknames that do not reflect your own name or anything personal Security tip 13
  • 15. Regular files backup • Make Backups of Important Files and Folders to protect important files and records on your computer • Keep Important Files and Folders to protected with password Security tip 14
  • 16. Check E-Mail attachments securely • Be cautious of unsolicited offers . Never purchase anything advertised through an unsolicited email • Open email attachment carefully • Keep Antivirus Email security on Security tip 15
  • 17. Secure downloads • Never accept any kind of freebies or free downloads of any pictures/music files • Download all software from authentic sources, avoid downloading software (executable files) from torrent sites • Be careful while downloading any free software or screensaver etc. • Never accept any kind of freebies or free downloads of any pictures/music files Security tip 16
  • 18. Secure online • Always LOGOUT or SIGNOUT • Do not store passwords in browser • Do not accept cookies policy • Do not upload personal information • Be secure on social networking site. Do not accept friend request from strangers • Keep 2 ids, one id OFFICAL, 2nd id for social networking sites like facebook , yahoo, gmail • Always talk with your parents or a responsible adult about your online activities Security tip 17
  • 19. Secure online transactions • URL of the site contains HTTPS instead of HTTP • Type URL, do not click on shared/ forwarded links • Always enter password from online keyboard • After transaction, logout the session from browser/ app • Do not share OTP for any transaction with anyone • Always keep banking n credit card companies phone numbers in your mobile • SMS-Alert facility: Banks & credit cards should send u a sms as soon money is withdrawn from your account or any monetary transaction happens in your account. Security tip 18