Protect yourself from cybercriminals

Cybercriminals target both individuals and businesses. Knowing a few cybersecurity tips and putting them into place will help protect you and your business and reduce the risk of a cyberattack. Teach your staff how to avoid phishing scams and keep them informed about common ways fraudsters can infect computers and devices with malware. Include tips for identifying and protecting against cyberattacks in your training and regular communications with your employees.

Cybersecurity approach for individuals

* Software update: Set your Windows and installed applications to automatic software update and they will notify you when they are available, protecting you from vulnerabilities.

Hyderabad News

click here for more Hyderabad news

* Use multi-factor authentication: It is an authentication method that requires the user to provide two or more verification factors to access an application or online account, such as a temporary code on a smartphone or a key inserted into a computer .

* Backup: Back up all important files offline to an external hard drive or secure cloud service.

* Require passwords: Do not leave these devices unattended in public places. Always use complex passwords for all laptops, tablets and smartphones to log in.

* Encrypt: Encrypt devices (i.e. laptops, smartphones, removable drives and cloud storage solutions) and other documents containing sensitive personal information.

* Secure your router: Change the default name and password and make sure to disable the remote management feature and remember to log out of the router. It is recommended to configure the router with WPA2 or WPA3 encryption.

* Use licensed software: Use legitimate/licensed software and use anti-virus and anti-malware protection apps on your electronic devices.

* Loss of personal information: Personally identifiable information may be lost when you disclose phone numbers and emails on social media or shopping platforms where data brokers will steal this information to mine for financial gain.

Cybersecurity approach for organizations

* Identify: (a) IT should establish a list of assets and create a cybersecurity policy that defines the roles and responsibilities of employees and vendors who all have access to corporate data.

(b) Measures to be taken to protect against a cyberattack and limit the damage if there is one

* Protect : (a) A person responsible for who logs into your network and uses your electronic gadgets.

(b) Use security software to protect data.

(c) Encrypt sensitive data (both in transit and at rest.

(d) Regular data backups to be performed.

(e) Set the software to auto-update.

(f) Have a published policy on how to safely dispose of old data and old devices.

* Detect: (a) Train all employees who use your computers and devices on how to protect themselves.

(b) Monitor unauthorized personnel access to the network and devices.

(c) Analyze any unusual activity identified on your network or by your member staff.

* To respond: (a) Notify anyone in the office whose data may be at risk.

(b) Report the attack to law enforcement authorities responsible for cybercrime.

(c) Analyze and update your approach to cybersecurity and lessons learned.

* Recover: Repair and restore the affected network and systems to normal.

Most Common Cybersecurity Threats

(a) Phishing: Phishing is a method of attempting to gather personal/sensitive information through phone calls, text messages, emails, blogs and deceptive websites and then stealing data or information. money to the victims.

(b) Ransomware: If you click on a short link asking for organizations survey or comment or online advertisements that contain malicious code or infected website, they can also automatically download malware etc. They will install ransomware and spread to the entire corporate network. The attackers ask for cryptocurrency, but even if we are willing to pay, we are not sure that they will give us the data as is.

(c) Fraudulent Emails: A scammer sets up an email address that appears to be from your company. The email looks legit with a tip asking you to transfer funds to an account urgently, not knowing the spoofed email and SMS, you can transfer the amounts to the fraudsters account. It is suggested that companies enable email authentication technology which makes it difficult for a scammer to send fraudulent emails.

Filing a complaint against a cyberattack

Register at You will need to register via OTP from a valid Indian number. select the category “Report a crime related to women or children” (a) Download screenshots of the conversation from social networks and messaging platforms.

(b) Copy social media channel URLs.

(c) Screenshots/Records of Financial Transactions.

About Marion Browning

Check Also

Cross-platform messaging scam makes a comeback on social media ::

By Donna Natosi, WRAL Editor-in-Chief What’s old is new again in a resurgent social media …