• CERTIFICATE
    • Eminent VARs of India
    • Best OEM 2023
  • SYNDICATION
    • AMD
    • DELL TECHNOLOGIES
    • HITACHI
    • LOGMEIN
    • MICROSOFT
    • RIVERBED
    • STORAGECRAFT
    • THALES
  • EVENTS
  • GO DIGITAL
  • INFOGRAPHICS
  • PRESS
    • Press Release PR News Wire
    • Press Release Business Wire
    • GlobeNewsWire
  • SPECIAL
    • WHITE PAPER
    • TECHNOMANIA
    • SME
    • SMART CITY
    • SERVICES
    • EDITOR SPEAK
    • CSR INITIATIVES
    • CHANNEL GURU
    • CHANNEL CHIEF
    • CASE STUDY
  • TECHTREND
    • VAR PANCHAYAT
    • TELECOM
    • SOFTWARE
    • POWER
    • PERIPHERALS
    • NETWORKING
    • LTE
    • CHANNEL BUZZ
    • ASK AN EXPERT
  • SUBSCRIBE
  • Apps
  • Gaming
  • KDS
  • Security
  • Telecom
  • WFH
  • Subscriber to Newsletter
  • April Issue
  • Blogs
  • Vlogs
  • Faceoff AI
    

HOME
NEWS

Tips towards a safer and more secure cyberspace


By VARINDIA - 2019-02-14
Tips towards a safer and more secure cyberspace

The way India has moved towards the Digital world, it is facing not only the personal but also National Security challenges at every door. The increasing penetration of cyber-attacks and digital transactions has revolutionized the world; it has also spawned a series of cryptic threats - the menaces of digital piracy, cyber-crime & stalking and online infidelity.

 

In today’s time, hackers have been penetrating the computer networks of companies that operate banks, Government, personal and other professional data. When now it has reached in the personal space as well, I would like to highlight the below points to have the safe internet experience:

 

1) Avoid secured work such as accessing banking applications or online shopping on unsecured network connections such as public Wi-Fi or third party wired network.For example, one should not use these applications on an airport or a hotel Wi-Fi.

 

2) Set strong password for your home Wi-Fi router. In most cases, people use the default password that comes along with the devices.

 

3) Recycle your password regularly and follow basic password hygiene such as use of special characters. Practically it is difficult to remember many passwords for different applications leading to something called “password fatigue”. It is recommended the use of secured and trustworthy password vault applications.

 

4) Avoid phishing emails – never share your personal details on emails. This is in fact the largest volume of security breaches across the world.

 

5) It is not only about installing an anti – virus, but it all depends on whether we are updating the anti-virus regularly whenever there is an update available. This goes same with operating system – it is necessary to keep a tab on updating the OS as well as install patches. In many cases, people postpone the patch management and software update schedules.

 

6) Two Factor Authentication : This is extremely important. We need to always use devices, social media sites or applications, which enable two factor authentications. This enables immediate information to the user if there is any unnatural log INS from other devices or browsers that the user normally does not use.

 

7) When using online shopping or visiting sites, which require personal information always, make sure that they are secured sites. The browser bar shows a padlock and the site name starts with https:// rather than http://

 

8) Make it a practice to never save your credit card or banking details for faster check out even though the site may state that they do not save your CVV. It takes just a couple of seconds to fill the card data rather than exposing your financial details.

 

9) Make it a practice to always log out from banking sites or social media accounts after usage.

 

10) It is of utmost importance to review the security and privacy setting on social media platforms. Most of the times, we really do not bother about these setting. For example, Facebook has features that ask the user can be searched through email ID or phone number that he or she has provided. Another such feature is if the user allows search engines outside Facebook to link his or her profile. Users should be aware of the security and privacy and switch them on or off depending on the usage and amount of personal information that they feel could be non-risky.

 

Presently wrongful loss to yourself and gain to the other party must be established for action to be taken in cases of cyber hacking under the Information Technology Act, 2000. Section 43A of the IT Act provides for compensation in the event that a company fails to use reasonable security practices and procedures in order to protect sensitive personal data and such negligence results in a wrongful gain or loss. The Information Technology Ministry has appointed a panel of experts to study India’s data protection framework and suggest a draft data protection law that will be taken up for consideration by Parliament.

 

Pradipto Chakrabarty
Regional Director, CompTIA India

See What’s Next in Tech With the Fast Forward Newsletter

SECURITY
View All
Zscaler announces AI innovations to its Data Protection Platform
Technology

Zscaler announces AI innovations to its Data Protection Platform

by VARINDIA 2024-05-20
SHIELD to enhance Swiggy’s fraud prevention and detection capabilities
Technology

SHIELD to enhance Swiggy’s fraud prevention and detection capabilities

by VARINDIA 2024-05-20
Axis Communications announces its first thermometric camera designed for Zone/Division 2
Technology

Axis Communications announces its first thermometric camera designed for Zone/Division 2

by VARINDIA 2024-05-20
SOFTWARE
View All
Hitachi Vantara and Veeam announce Global Strategic Alliance
Technology

Hitachi Vantara and Veeam announce Global Strategic Alliance

by VARINDIA 2024-05-16
Adobe launches Acrobat AI Assistant for the Enterprise
Technology

Adobe launches Acrobat AI Assistant for the Enterprise

by VARINDIA 2024-05-11
Oracle Database 23ai offers the power of AI to Enterprise Data and Applications
Technology

Oracle Database 23ai offers the power of AI to Enterprise Data and Applications

by VARINDIA 2024-05-10
START - UP
View All
Data Subject Access Request is an integrated module within ID-REDACT®
Technology

Data Subject Access Request is an integrated module within ID-REDACT®

by VARINDIA 2024-04-30
SiMa.ai Secures $70M Funds from Maverick Capital
Technology

SiMa.ai Secures $70M Funds from Maverick Capital

by VARINDIA 2024-04-05
Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure
Technology

Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure

by VARINDIA 2024-02-08

Tweets From @varindiamag

Nothing to see here - yet

When they Tweet, their Tweets will show up here.

CIO - SPEAK
Automation has the potential to greatly improve efficiency and production

Automation has the potential to greatly improve efficiency and production

by VARINDIA
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

by VARINDIA
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

by VARINDIA
Start-Up and Unicorn Ecosystem
GoDaddy harnesses AI power for new domain name recommendations

GoDaddy harnesses AI power for new domain name recommendations

by VARINDIA
UAE’s du Telecom selects STL as a strategic fibre partner

UAE’s du Telecom selects STL as a strategic fibre partner

by VARINDIA
JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

by VARINDIA
Rapyder partners with AWS to accelerate Generative AI led innovation

Rapyder partners with AWS to accelerate Generative AI led innovation

by VARINDIA
ManageEngine integrates its SIEM solution with Constella Intelligence

ManageEngine integrates its SIEM solution with Constella Intelligence

by VARINDIA
Elastic replaces traditional SIEM game with AI-driven security analytics

Elastic replaces traditional SIEM game with AI-driven security analytics

by VARINDIA
Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

by VARINDIA
Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

by VARINDIA
Dassault Systèmes to accelerate EV charging infrastructure development in India

Dassault Systèmes to accelerate EV charging infrastructure development in India

by VARINDIA
Tech Mahindra and Atento to deliver GenAI powered business transformation services

Tech Mahindra and Atento to deliver GenAI powered business transformation services

by VARINDIA
×

Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.

  • Distributors & VADs
  • Industry Associations
  • Telco's in India
  • Indian Global Leaders
  • Edit Calendar
  • About Us
  • Advertise Us
  • Contact Us
  • Disclaimer
  • Privacy Statement
  • Sitemap

Copyright varindia.com @1999-2024 - All rights reserved.