CYBER PROTECTION METHODS













CYBER PROTECTION METHODS

  1. Avoid Identity Theft

There are some things to be avoided when dealing with personally identifiable data:

    1. Never share your Aadhar/PAN number (In India) with anyone whom you do not know/trust.
    2. Never share your SSN (In US) with anyone whom you do not know/trust.
    3. Do not post sensitive data on social networking sites.
    4. Do not make all the personal information on your social media accounts public.
    5. Please never share an Aadhar OTP received on your phone with someone over a call.
    6. Make sure that you do not receive unnecessary OTP SMS about Aadhar (if you do, your Aadhar number is already in the wrong hands)
    7. Do not fill personal data on the website that claim to offer benefits in return.

  1. Conduct cyber security risk assessments
A structured risk assessment can help identify and address significant security gaps that may be putting your data, digital assets, and network at risk. A typical assessment involves defining the system, identifying threats, determining the potential impact, analyzing the environment, and finally calculating the associated security risk. 

                    While risk assessments can be undertaken in-house, there are multiple advantages to engaging a specialized security partner. External vendors typically have extensive experience in conducting assessments and are very familiar with the required tools and processes. They can also provide an objective view of your organization and are less liable to make assumptions about your environment.

  1. Upgrade your network security infrastructure - firewall
Most legacy networks are ill-equipped to deal with the growing sophistication and frequency of today’s cyber-attacks. A logical place to begin is with the network firewall. While legacy firewalls do provide basic packet filtering, inspection, and VPN capabilities, they no longer provide adequate security to counter current threats. 
                    Today’s Next Generation Firewalls (NGFWs) provide comprehensive threat protection, including application control, intrusion protection, antivirus, and deep packet inspection.A best-of-breed NGFW will perform all of these functions simultaneously with no performance degradation, and also offer integrated security management while scaling to meet future requirements. 

  1. Monitor for intrusion
You can use intrusion detectors to monitor system and unusual network activity. If a detection system suspects a potential security breach, it can generate an alarm, such as an email alert, based upon the type of activity it has identified.

  1. Use Strong Passwords

Your password should be strong enough to be practically unbreakable. A strong password is one that is 12+ characters long and contains a diverse use of alphabets (both cases), numbers and symbols (and spaces).

  1. Take Regular Back-up
Every week, either backup your data to an external hard drive or the cloud yourself, or schedule automated backups to ensure that your information is stored safely.


  1. Anti-hacker Insurance
An emerging trend is anti-hacker insurance, or cyber-insurance. Its scope varies across providers, but typically protects against security breaches and losses

  1. Secure your Wi-Fi network
To protect your Wi-Fi network from breaches by hackers, change the name of your wireless access point or router, also called the Service Set Identifier (SSID).
  1. Install Reliable Antivirus Software
A good, reliable antivirus program is a basic must-have of any cyber security system. Apart from that, anti-malware software is also an essential.

  1. Update programs and systems regularly
Updates contain vital security upgrades that help protect against known bugs and vulnerabilities.








Comments

Post a Comment

Popular posts from this blog

TYPES OF CYBER THREATS AND CYBER ATTACKS

STEPS TO BE TAKEN BY A CYBER ATTACK VICTIM