masuraksha
Toll Free: 1800 123 624276
Cyber Security Awareness to Customers

Cyber Security is the state or process of protecting and recovering computer systems, networks, devices, and programs from any type of cyber-attack. Cyber security measures are designed to combat threats against networked Systems and applications, whether those threats originate from inside or outside of an organization.

Importance of Cyber Security in Business / Organizations

The importance of Cyber Security for businesses and organizations can be seen in the case of the target data breach. In this case, hackers were able to gain access to the target's customer data, including credit and debit card information. It led to target having to pay out millions of dollars in damages and losing customer trust. Target's data breach is just one example of how cyber security is important for businesses and organizations.

Goals of Cyber Security

To ensure CIA by keeping out unwanted intruders while providing authorized access.

  • Confidentiality

    Ensuring that information is accessible only to those authorized to have access, confidentiality is breached when an unauthorized person can view, take, and/or change your files.

  • Integrity

    safeguarding the accuracy and completeness of information and processing methods. When securing any information system, integrity is one function that you’re trying to protect. You don’t want bad actors or human error to, on purpose or accidentally, ruin the integrity of your computer systems and their results.

  • Availability

    Ensuring that authorized users have access to information and associated assets when required. Availability is a large issue in security because it can be attacked. An attack on your availability could limit user access to some or all your services, leaving your scrambling to clean up the mess and limit the downtime.

Attackers usually target
  • Hardware
  • Software
  • Data
  • Internet/Network
  • Disruption of services

Password

Do's Don'ts

letters, lowercase letters, numbers, and special characters

Don’t share passwords with others or write them down, Don’t use a password that was used earlier.

Do change password at regular intervals.

Do not use the name of things located around you as passwords for your.

Do use different passwords for different accounts.

Don’t use the words from dictionary. They can be cracked easily.

Do keep your passwords or passphrases confidential

Do change password immediately if it is suspected to have been disclosed / compromised and a security incident shall be reported to the competent authority.

Computer/Laptop

Do's Don'ts

Do lock your computer and laptop when not in use.

Don’t install unauthorized programs on your work computer / laptop.

If a device is lost or stolen, report it immediately to competent authority.

Don’t leave devices unattended.

Antivirus software should be installed on computer and it should be kept updated.

Email

Do's Don'ts

Enable two-factor authentication wherever possible.

Don’t respond to emails received from strangers

Do check the URL before clicking any link sent via email.

Don’t click on links from an unknown or untrusted source

Don’t send any personal or sensitive information, such as credit card numbers, passwords or other private information, through email.

Mobile

Do's Don'ts

Do lock your mobile phone when not in use.

Don’t respond to phone calls requesting confidential data.

Do keep mobile devices, IP phones etc. physically secured.

Don’t leave mobile unattended

Personal information should be guarded properly. Requests for personal or account information over the mobile should be avoided.

If a device is lost or stolen, report it immediately to competent authority.

Always check what permissions are asked by mobile app which you want to install.

Advisable to check the reputation of the application before installing it.

Be cautious about using geo-location services. Stalkers can easily access one’s location.

Wireless Connectivity

Do's Don'ts

Do remember that wireless is inherently insecure. Avoid using public Wi-Fi hotspots.

Don’t leave wireless or Bluetooth turned on when not in use.

When you must to use Wi-Fi, use VPN to protect the data and the device.

Don’t access your personal or financial information through Public WIFI.

Internet Usage

Do's Don'ts

Do use latest version of Internet browser.

Don’t enable “save password” and auto-complete features of the browser.

Do log-out from web based services, like web mail, before closing the browser session.

Don’t download or distribute malicious software and tools.

Cookies should be allowed from the trusted web sites only.

Don’t violate any copyright or license agreement by downloading and distributing protected material.

Don’t forget to turn off all JavaScript or ActiveX support in your web browser before you visit any unknown websites.

Social Networking

Do's Don'ts

Do use privacy settings on social media sites to restrict access to your personal information.

Don’t tolerate being uncomfortabl.

Only add people you know offline.

Don’t post any private or sensitive information, such as credit card numbers, passwords or other private information, on public sites, including social media sites

Even if social network is set to private, it doesn’t guarantee that information is completely private. It should be remembered that friends’ friends might be able to see posts and updates even if they are no.t friends with them. So be careful

Don’t over share the information. Sensitive information like birth date, mother’s maiden name, pet’s name or any other identifying information should not be shared on social-media platforms such as Facebook, LinkedIn or Twitter. Social media has made cyber stalking much easier. A stalker can easily locate and track their target’s every move. Personal titbits collected over time can give them a whole picture of who you are, where you work, live and socialize.