In today's digital world, cybersecurity and Information security has become an essential concern for every organization. Irrespective of the size and strength of an organization, a minor cyber attack can cost millions to recover. This informative blog includes the Dos and Don'ts of Internet security that help understand the best cybersecurity practices.
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
A Guide to Cyber Etiquette.pdf
1. uide to Cyber Etiquette
www.infosectrain.com | sales@infosectra
2. ectrain.com | sales@infosectrain.com
y's digital world, cybersecurity and Information security has become an
al concern for every organization. Irrespective of the size and strength of an
ation, a minor cyber attack can cost millions to recover. This informative
cludes the Dos and Don'ts of Internet security that help understand the best
ecurity practices.
and Information security has become an
al concern for every organization. Irrespective of the size and strength of an
ation, a minor cyber attack can cost millions to recover. This informative
cludes the Dos and Don'ts of Internet security that help understand the best
3. Slide 2
b1 bhavika.official@outlook.com, 3/8/2021
b2 Please add more slides for -
1.-Course content as we did in InfosecTrain PPT Template
2-Summary slides
3-Questions Slides
4-Thank you slide
bhavika.official@outlook.com, 3/8/2021
4. s Cyber Etiquette?
etiquette is a code of conduct or behavior required to follow while using the
t to perform various tasks. It is also referred to as Cyber Netiquette. It consists
ptable norms and rules to ensure secure communication over the Internet.
ules help to get aware of cyber threats associated with the Internet and
t wrongdoings.
's of Internet Security
of HTTPS sites
urfing for banking and shopping websites or paying the bills online, check
er the website's URL begins with 'HTTPS.' Also, check for the padlock icon,
ndicates a secure connection between the website and the server.
osectrain.com | sales@infosectrain.com
ndicates a secure connection between the website and the server.
of strong password
use unique and hard-to-guess passwords. Create a password with special
ers, symbols, numbers, uppercase, and lowercase letters. Do not use the same
ords for all online accounts.
t Logout of accounts
g into an online account creates a session with you and your website. If this
remains active, it might allow attackers to exploit your session, leading to a
hijacking. Ensure you log out of all your online accounts when you are done,
ally when using a public computer.
etiquette is a code of conduct or behavior required to follow while using the
t to perform various tasks. It is also referred to as Cyber Netiquette. It consists
ptable norms and rules to ensure secure communication over the Internet.
ules help to get aware of cyber threats associated with the Internet and
urfing for banking and shopping websites or paying the bills online, check
er the website's URL begins with 'HTTPS.' Also, check for the padlock icon,
ndicates a secure connection between the website and the server.
ndicates a secure connection between the website and the server.
guess passwords. Create a password with special
ers, symbols, numbers, uppercase, and lowercase letters. Do not use the same
g into an online account creates a session with you and your website. If this
remains active, it might allow attackers to exploit your session, leading to a
hijacking. Ensure you log out of all your online accounts when you are done,
5. Slide 3
b1 bhavika.official@outlook.com, 3/8/2021
b2 Please add more slides for -
1.-Course content as we did in InfosecTrain PPT Template
2-Summary slides
3-Questions Slides
4-Thank you slide
bhavika.official@outlook.com, 3/8/2021
6. e verified software or websites
k whether the software or website is secured and verified before
loading them into your system.
ter the URL of the banking website manually
ss your bank's website manually by typing its URL in the search bar. Never
he links in your email or text message, which can lead to malware attacks.
cure Backup regularly
regular backup of all your essential files. Having backup files on a hard drive
ng trusted cloud-based backup services is necessary, and it helps to recover
ata quickly.
osectrain.com | sales@infosectrain.com
ata quickly.
Don'ts of Internet Security
ver enable 'Keep me logged In' and 'Remember me' checkboxes
enabling 'Keep me logged in' or 'Remember me' checkboxes on public
uters. It can save and manage your credentials in the system leading to
attacks.
oid responding to pop-up messages
r respond to pop-up ads, as it can redirect you to an illegitimate website
makes you enter your credentials, leading to malware attacks. Close all kinds
p-up screens using the task manager.
k whether the software or website is secured and verified before
ss your bank's website manually by typing its URL in the search bar. Never
he links in your email or text message, which can lead to malware attacks.
regular backup of all your essential files. Having backup files on a hard drive
based backup services is necessary, and it helps to recover
ver enable 'Keep me logged In' and 'Remember me' checkboxes
enabling 'Keep me logged in' or 'Remember me' checkboxes on public
uters. It can save and manage your credentials in the system leading to
up ads, as it can redirect you to an illegitimate website
makes you enter your credentials, leading to malware attacks. Close all kinds
7. Slide 4
b24 bhavika.official@outlook.com, 3/8/2021
b25 Please add more slides for -
1.-Course content as we did in InfosecTrain PPT Template
2-Summary slides
3-Questions Slides
4-Thank you slide
bhavika.official@outlook.com, 3/8/2021
8. er use free and public Internet sources
using free, unsecured Wi-Fi, especially for shopping or banking on the
et. Do not log into your social media profiles, as it can reveal your
nt credentials, and the attacker can hack your social media profile.
not share your confidential information.
share your personal/bank details over a phone, email, or SMS, even if
ller/sender seems genuine, and it can lead to a Vishing
nal Identifiable Information (PII), such as an Aadhar card number or SSN,
ique number that connects with all your Bank, Health, and other
es. If it is required to share your Aadhaar card details or SSN details,
the masked Aadhaar number or SSN to avoid cyber attacks.
osectrain.com | sales@infosectrain.com
the masked Aadhaar number or SSN to avoid cyber attacks.
not use unsecured websites.
use or visit unsecured websites which are not protected and verified.
websites allow entering even if it is not secure using the Advanced
, and they might be legitimate or illegitimate websites. So do not enter
uch unsecure websites.
cTrain is one of the best training and consultancy services that offers
ctor-led training on a wide range of Cybersecurity, Information security,
oud security domains. Our training program helps you to enhance your
sional career to the next level. Check out our courses, choose your best
le training program, and enroll now.
Fi, especially for shopping or banking on the
et. Do not log into your social media profiles, as it can reveal your
nt credentials, and the attacker can hack your social media profile.
share your personal/bank details over a phone, email, or SMS, even if
attack.
card number or SSN,
ique number that connects with all your Bank, Health, and other
card details or SSN details,
number or SSN to avoid cyber attacks.
number or SSN to avoid cyber attacks.
use or visit unsecured websites which are not protected and verified.
websites allow entering even if it is not secure using the Advanced
, and they might be legitimate or illegitimate websites. So do not enter
is one of the best training and consultancy services that offers
, Information security,
oud security domains. Our training program helps you to enhance your
sional career to the next level. Check out our courses, choose your best
9. Slide 5
b1 bhavika.official@outlook.com, 3/8/2021
b2 Please add more slides for -
1.-Course content as we did in InfosecTrain PPT Template
2-Summary slides
3-Questions Slides
4-Thank you slide
bhavika.official@outlook.com, 3/8/2021
10. bout InfosecTrain
tablished in 2016, we are one of the finest
curity and Technology Training and
onsulting company
de range of professional training programs,
rtifications & consulting services in the IT
rtifications & consulting services in the IT
nd Cyber Security domain
gh-quality technical services, certifications
customized training programs curated with
ofessionals of over 15 years of combined
perience in the domain
nfosectrain.com | sales@infosectrain.com
de range of professional training programs,
quality technical services, certifications
customized training programs curated with
12. hy InfosecTrain
Flexible modes
of Training
fied and
rienced Instructors
Access to the
recorded
sessions
Tailor Made
Training
training
pletion
nfosectrain.com | sales@infosectrain.com
Global Learning Par
Access to the
recorded
sessions