

BE AWARE OF ONLINE SHOPPING AND CHEATING
AVOID: Online shopping if you are not a consistent user of online shopping
ALWAYS: Perform online shopping from secured websites
NEVER: To phishing e-mails/links as they may collect vital information about the credit/debit cards and transfer the amount fraudulently online.
TIPS FOR SAFE ONLINE SHOPPING:
MAKE SURE: Your PC is secured with all core protections like an antivirus,anti-spyware, and firewall,
RESEARCH: About the website before you buy things online
CHECK: The reviews of consumers and media of that particular website or merchants
CHECK: The credit card statements as soon as you finish the transaction
CLEAR: All the web browser cookies after finishing your online shopping
TURN OFF: Your PC since spammers and phishers will be looking for the system connected to the internet and try to send spam e-Mails and try to install malicious software that may collect your personal information
Three Important Ways To Protect Yourself From Phishing

Cyber Safety Tips For Women:
- One should refrain from publishing personal sensitive information on any social media or otherwise.
- Content which is private should be secured using complex passwords.
- Printers, wifi, webcams and computers, should be shut down and not kept continuously open when not in use.
- Wifi should always be protected by a secure password.
- Do not access the links to which an email can direct you and then ask you for personal information.
- While using net banking do not adopt google search or other search and instead typing the correct address of your bank yourself in the address bar.
- Before online shopping check if the site address shows it is https or carries an image of a lock.
- Keep complex Passwords and change them regularly. Use a two step OTP verification process to access your e-mail accounts.
- Install anti spyware and antivirus and keep them updated.
- Refrain from answering calls from strangers, visiting popup windows or unwarranted verification message that may ask you to confirm your personal information.
- While downloading plug ins to any software, screen it prior to downloading using an antivirus.
- Maintain complete backup of your system/mobile data periodically.
- Avoid checking your email accounts at cyber café, and remember to sign off from your online account when you no longer want to access an account.
- Register for Mobile SMS, Email Transaction Alerts if one pays online or uses netbanking.
- Visit banks website by typing the URL in the address bar.otherwise it could be a fake website in a search result.
- Make use of the virtual keyboard wherever possible for better security.
- If you change a mobile number, inform the bank. If you lose your phone, don’t forget to deactivate all banking services linked to that number.
- Avoid exchanging old mobile phones with new ones as data within it can be misused to harass the phone owner or others and commit other crimes including phishing.
- Donot leave your mobile phone/laptop unattended or without a password protection with anyone.
- Deactivate a web service such as Whatsapp on your old phone before you activate it on your new cellphone.
Effective Strategies to Safely Back Up Your Data
- Use an External Hard Drive
- Use a USB Flash Drive
- Use Optical Media
- Use Cloud Storage
- Use an Online Backup Service
- Invest in a Network Attached Storage (NAS) Device
Why You Should Back Up Your Data
- Backups Protect You From Data Loss
- Backups Guard You Against Malware and Ransomware
- Recover From Data Loss More Quickly
- Data Gives You Peace of Mind
- Remote Access
Tips for Creating a Successful Data Backup Plan:
- Identify what data needs to be backed up
- Choose the right backup method
- Store backups in a safe location
- Test your backups regularly
- Keep your backup plan up to date
What is Clean Desk Policy?
Clean Desk Policy is a set of rules and guidelines that require employees to maintain an organized, clean, and clutter-free workspace. This policy is intended to promote good workplace habits, as well as to protect sensitive information and reduce the risk of unauthorized access. It typically includes rules such as keeping desktops clear of any confidential documents, keeping drawers locked when not in use, and ensuring all electronic devices are locked and secure when not in use.
Importance of Clean Desk Policy
A clean desk policy is important for many reasons. It helps to reduce the risk of unauthorized access to sensitive information and materials, as well as helping to promote a more productive work environment. It also helps to ensure that all employees are following standard protocols for handling and storing confidential data and documents. Clean desk policies also help to reduce the risk of physical items being stolen or misplaced, and can help to reduce the need for expensive repairs or replacements of items that have gone missing.
Tips for Clean Desk Policy
- Store personal items, such as purses and backpacks, in a secure location.
- Use a desk organizer to keep paperwork and supplies neatly stored.
- Use sticky notes to keep track of reminders and tasks, rather than paper notes.
- Make sure all electronic devices are stored securely when not in use.
- Keep files and documents organized and locked away when not in use.
- Use a password-protected screen saver when leaving a workstation unattended.
Different Controls for Clean Desk Policy
Companies may implement a variety of different controls to help ensure compliance with their clean desk policy. These can include:
- Requiring employees to keep their workspace free of clutter, personal items, and confidential documents.
- Establishing a regular schedule for cleaning and organizing workspaces.
- Requiring all confidential documents to be stored in locked drawers or cabinets.
- Establishing a policy that all electronic devices, such as laptops and phones, must be locked and secured when not in use.
- Conducting regular inspections of employee workspaces to ensure compliance.
- Implementing a system for reporting lost or stolen items.
A clean desk policy is an important part of any organization’s security protocol. It helps to ensure that confidential documents, materials, and other items are kept secure and out of reach of unauthorized individuals. As such, it is important for organizations to implement a clean desk policy, as well as other security measures, to help protect sensitive information and materials.
Cyber Security 100 Tips
- Keep your software up-to-date.
- Use strong passwords and store them securely.
- Use a two-factor authentication when available.
- Use anti-malware and antivirus software.
- Use a VPN when on public Wi-Fi.
- Don’t open suspicious emails or attachments.
- Don’t click on links from unknown sources.
- Monitor your online accounts for suspicious activity
- Use a firewall for network protection.
- Backup your data regularly.
- Don’t give out personal information online.
- Use secure networks when available.
- Avoid public Wi-Fi networks.
- Use encryption for data sent over the internet.
- Be aware of social engineering attacks.
- Use secure protocols such as HTTPS and SSH.
- Use the principle of least privilege.
- Don’t use default usernames and passwords.
- Regularly check your system’s security settings.
- Securely store confidential documents.
- Regularly review your access rights.
- Use a password manager.
- Consider using a virtual private network (VPN).
- Secure your home network.
- Use a secure web browser.
- Log out of accounts after use.
- Securely store physical documents.
- Use secure file sharing services.
- Securely delete digital data.
- Secure your mobile devices.
- Use two-factor authentication for accounts.
- Regularly review your access logs.
- Be aware of phishing and other scams.
- Use a biometric authentication when available.
- Don’t use public computers for sensitive activities.
- Use strong passwords and change them regularly.
- Regularly check for online accounts you no longer use.
- Use a secure email provider.
- Consider using a password manager.
- Keep your software and browser up-to-date.
- Securely store your passwords.
- Use a secure cloud storage service.
- Don’t use the same password for different accounts.
- Use an encrypted file system.
- Use a secure web browser.
- Don’t download software from untrusted sources.
- Use two-factor authentication when available.
- Monitor your credit and identity.
- Don’t use public computers for sensitive activities.
- Use anti-virus software and scan regularly.
- Use a secure email provider.
- Use secure protocols such as HTTPS and SSH.
- Regularly review your access logs.
- Use strong passwords and change them regularly.
- Use a password manager for multiple accounts.
- Avoid revealing personal information online.
- Be aware of phishing and other scams.
- Disable auto-fill and autocomplete features.
- Use two-factor authentication for accounts.
- Use a firewall for network protection.
- Regularly check for online accounts you no longer use.
- Avoid using public Wi-Fi networks.
- Securely store confidential documents.
- Use secure file sharing services.
- Securely delete digital data.
- Securely store your passwords.
- Use a secure cloud storage service.
- Use encryption for data sent over the internet.
- Use the principle of least privilege.
- Use a biometric authentication when available.
- Don’t give out personal information online.
- Use anti-malware and antivirus software.
- Regularly review your access rights.
- Use a VPN when on public Wi-Fi.
- Don’t open suspicious emails or attachments.
- Don’t click on links from unknown sources.
- Monitor your online accounts for suspicious activity.
- Use a virtual private network (VPN).
- Secure your home network.
- Secure your mobile devices.
- Backup your data regularly.
- Monitor your credit and identity.
- Use secure networks when available.
- Disable auto-fill and autocomplete features.
- Don’t use default usernames and passwords.
- Don’t use the same password for different accounts.
- Use an encrypted file system.
- Regularly check your system’s security settings.
- Consider using a password manager.
- Use two-factor authentication when available.
- Use the principle of least privilege.
- Don’t give out personal information online.
- Monitor your online accounts for suspicious activity.
- Log out of accounts after use.
- Use secure protocols such as HTTPS and SSH.
- Use a secure web browser.
- Use a VPN when on public Wi-Fi.
- Use anti-malware and antivirus software.
- Regularly review your access logs.
- Use encryption for data sent over the internet.