CYBER PROTECTION METHODS
- Avoid
Identity Theft
There are some things to be avoided when dealing
with personally identifiable data:
- Never share your Aadhar/PAN number (In
India) with anyone whom you do not know/trust.
- Never share your SSN (In US) with anyone
whom you do not know/trust.
- Do not post sensitive data on social
networking sites.
- Do not make all the personal information
on your social media accounts public.
- Please never share an Aadhar OTP received
on your phone with someone over a call.
- Make sure that you do not receive
unnecessary OTP SMS about Aadhar (if you do, your Aadhar number is
already in the wrong hands)
- Do not fill personal data on the website
that claim to offer benefits in return.
- Conduct cyber
security risk assessments
A structured risk assessment can help identify
and address significant security gaps that may be putting your data, digital
assets, and network at risk. A typical assessment involves defining the system,
identifying threats, determining the potential impact, analyzing the
environment, and finally calculating the associated security risk.
While risk
assessments can be undertaken in-house, there are multiple advantages to engaging
a specialized security partner. External vendors typically have extensive
experience in conducting assessments and are very familiar with the required
tools and processes. They can also provide an objective view of your
organization and are less liable to make assumptions about your environment.
- Upgrade
your network security infrastructure - firewall
Most legacy networks are ill-equipped to deal
with the growing sophistication and frequency of today’s cyber-attacks. A
logical place to begin is with the network firewall. While legacy firewalls do
provide basic packet filtering, inspection, and VPN capabilities, they no
longer provide adequate security to counter current threats.
Today’s Next
Generation Firewalls (NGFWs) provide comprehensive threat protection,
including application control, intrusion protection, antivirus, and deep packet
inspection.A best-of-breed NGFW will perform all of these functions
simultaneously with no performance degradation, and also offer integrated
security management while scaling to meet future requirements.
- Monitor
for intrusion
You can use intrusion detectors to monitor
system and unusual network activity. If a detection system suspects a potential
security breach, it can generate an alarm, such as an email alert, based upon
the type of activity it has identified.
- Use
Strong Passwords
Your password should be strong enough to be
practically unbreakable. A strong password is one that is 12+ characters long
and contains a diverse use of alphabets (both cases), numbers and symbols (and
spaces).
- Take
Regular Back-up
Every week, either backup your data to an
external hard drive or the cloud yourself, or schedule automated backups to
ensure that your information is stored safely.
- Anti-hacker
Insurance
An emerging trend is anti-hacker insurance,
or cyber-insurance. Its scope varies across providers, but typically
protects against security breaches and losses
- Secure
your Wi-Fi network
To protect your Wi-Fi network from breaches by
hackers, change the name of your wireless access point or router, also called
the Service Set Identifier (SSID).
- Install
Reliable Antivirus Software
A good, reliable antivirus program is a basic
must-have of any cyber security system. Apart from that, anti-malware software
is also an essential.
- Update
programs and systems regularly
Updates contain vital security upgrades that
help protect against known bugs and vulnerabilities.

Excellent
ReplyDeleteAmazing work
ReplyDeleteVery useful information
ReplyDeleteVery nice
ReplyDeleteExcellent work
ReplyDeleteNice work..
ReplyDeleteGood work
ReplyDeleteVery helpful
ReplyDeleteUesfulllll
ReplyDeleteFound Helpful !!
ReplyDeleteThese protection methods are the best
ReplyDeleteGood work
ReplyDeleteWell done
ReplyDelete