Install and use a firewall, pop-up blocker and spyware detector.
Ensure that your virus definitions are up to date and run anti-virus and spyware detectors/cleaners regularly.
Make Backups of Important Files and Folders to protect important files and records on your computer if your computer malfunctions or is destroyed by a successful attacker?
Use strong passwords - Easy to remember and difficult to guess type password. Use alphanumeric and special characters in your password. The length of password should be aslong as possible (More than 8 characters).
Assignment of computer to a particular person with password protection in offices.
Install the firewall and maintain the logs of firewall.
Preservation of evidence (logs/received emails in question etc).
Disconnect from internet when not in use.
Habitually download security protection update patches & Keep your browser and operating system up to date.
Never share photographs in compromise positions.
Make the wireless network invisible by disabling identifier broadcasting .
Encrypt the network traffic.
Change administrator's password from the default password.
If the wireless network does not have a default password, create one and use it to protect the network.
Disable file sharing on computers.
Turn off the network during extended periods of non-use, etc.
Avoid online banking, shopping, entering credit card details, etc if the network is not properly secured.
Check your online account frequently and make sure all listed transactions are valid.
Use a variety of passwords, not same for al of your account.
Be extremely wary of spam legitimate looking email asking for confidential information.
Never ever click on the link given in the spam email.
Be wary of websites that require your card details up front before you actually place an order .
Not to believe everything you read online.
Take your time - do not rush into things.
Always delete spam emails immediately and empty the trash box to prevent accidental clicking on the same link.
Avoid posting your cell phone number online.
Never respond to text messages from someone you don't know.
Never let someone you don't know use your cell phone.
Open email attachment carefully.
Be careful while downloading any free software or screensaver etc.
Not delete email in question, save the email and take out the full header of such email and report the crime.
Be cautious when dealing with individuals outside of your own country.
Be cautious of unsolicited offers. Never purchase anything advertised through an unsolicited email.
Beware of promises to make fast profits.
Be cautious of exaggerated claims of possible earnings or profits.
Beware of lotteries that charge a fee prior to delivery of your prize.
Contact the actual business that supposedly sent the email to verify if the email is genuine.
Beware of references given by the promoter.
Ensure you understand all terms and conditions of any agreement.
Be leery when the job posting claims "no experience necessary".
Always type the website address yourself rather than clicking on a link provided.
SOURCE: CYBER CRIME INVESTIGATION CELL, CRIME BRANCH, CID, MUMBAI.
No comments:
Post a Comment