Cyber Security & Safety
In today's time, Internet has become one of the integral part of our life. It has transformed the way we communicate; make friends, share updates, play games, and shop. They are impacting most aspects of our day-to-day life.
Cyberspace connects us virtually with crores of online users across the globe. With increasing use of Cyberspace and Cyber-attacks becoming more complex and sophisticated, it's critical to be aware about Cyber security threats and how to mitigate them.
Some common ways used by Cyber Criminals are :
- Email Spoofing : Sending out e-mails to you that look like genuine and form a trusted e-mail ID but actually, they're not.
- Malware Attacks or Malicious Files Applications : Sending you malicious and bad applications and files through direct messaging, gaming, emails or websites etc.. in order to get access or cause damage to your smart device, personal data, computer network.
- Hacking : The act of compromising computer resources through unauthorized access to an account or computer system. It is accessing of a computer system without the express or implied permission of the owner of that computer system.
- Phishing : A phishing campaign is when spam emails, or other forms of communication, are sent with the intention of tricking recipients into doing something that undermines their security. Phishing campaign messages may contain infected attachments or links to malicious sites, or they may ask the receiver to respond with confidential information.
- Social Engineering : Social Engineering is a technique used by cyber-criminals to gain your confidence to get information from you. Depending on what you like to do most, a cybercriminal may try to interact with you to mine for information and/or commit some harm to you. Suppose you like to play an online game, an impersonator behaves like another child and invites you to talk to him and share information.
- Cyber Bullying : A form of bullying using Internet or Mobile technology to intentionally harass someone by sending rude, mean or hurtful messages, comments, images/videos. The Cyber bully can use text messages, emails, social media platform, web pages, chat, rooms, reviews, etc..to bully others.
- Cyber Grooming : This form is growing as major cyber threats faced by children and teenagers. It is a practice where someone builds an emotional bond with other person (victim) through social media or messaging platforms with an objective of gaining their trust for sexually abusing and exploiting them.
- Sextortion : A form of blackmail where an individual is coerced (forced) into providing sexual content or money by threatening to release compromising information or images if they do not meet the terms(comply).
- Matrimonial/Online Dating Scams : Scammers create fake profiles on dating or matrimonial sites to build relationship.
- Identity Theft : Deliberate use of someone's identity to gain financial advantage or obtain credit and other benefits in the other person's name/for counterparts disadvantage or loss.
- Job Frauds : Fraudulent representation or a deceptive activity on the part of an employee or a prospective employee toward an employer.
- Online Financial/Banking Frauds : Fraudulently obtaining money from depositors by posing as a bank or other financial institution or unauthorized access, use of computer systems with the intention to cause financial gain by cyber criminals or financial loss to the victims.
- Ransomware : Ransomware is a rapidly evolving form of Cybercrime, through which cyber criminals remotely compromise and encrypt computer systems and demand a ransom in return for restoring and/or for not exposing data. Ransomware attacks target individuals and Organizations.
General Cyber security tips :
- Use unique complex password of 10-12 characters with Alphabets (Uppercase + Lowercase), Numbers & Special Characters.
- Enable 2-Factor Authentication: This is type of MFA that requires two factors to verify a user's identity. Protect your Mobile phone, PC, Communication devices, Internet banking, Social media, etc. with a password along with PIN, pattern, or biometric information. Using multi-factor authentication confirms our identities when logging into our critical accounts or application.
- Beware of Software that are free but not open source.
- Always open/visit secure websites (https://)
- Always logout your account after use and do not save or write your passwords anywhere; your brain is the best places to store your password.
- Use virtual keyboard wherever possible. The virtual keyboard protects your password from Keyloggers, Malware & Malicious spyware and reduces the risk of password theft.
- Do not share your personal information (PIN or account details) over phone unless you initiated the call.
- Always take a backup of your important digital information/files.
- Keep your computer firewall ON.
- Think twice before posting pictures or videos of yourself or your family members or your friends on the Internet. Whatever you post on Internet generally remains forever and can be misused by fraudsters.
- Customer care contact details : Visit Company's official website instead of searching for them through Google search to get customer care contact details.
- Never open unknown email, links, files and attachments received from unknown person through email, messaging app or social media. Disable the automatic download of graphics HTML mail in your mobile devices.
- Never install unwanted software and applications received from unknown sources. Check it on other sources also to confirm the authenticity and install applications only from trusted sources.
- Application Review and Permissions : Read application/software review and description before installing & provide only necessary permissions in applications to protect your personal information/data. Regularly review the permissions granted.
- Avoid using Smartphone for taking sensitive personal photographs and videos.
- Be mindful of your appearance on video chat & video calls. Your video chats on social media sites can be recorded by the person on the other side.
- Location Services : Disable location services for social media sites, mobile devices and protect yourself from Cyber stalking.
- Beware of fake social media accounts. Not all the accounts are real and not all information provided on accounts are true.
- Be cautious with sensitive browsing : For browsing shopping or banking websites or apps always use trusted PC and network. Avoid using friend's phone, public computer, cyber cafe or free Wi-Fi.
- Be careful and remove your personal information while you give your mobile devices, PC's for servicing/repairing/selling.
- Report if you find content related to of Child Pornography(CP)/Child Sexual Abuse Material (CSAM) or sexually explicit material. You can also report it on National Cyber Crime Reporting Portal (www.cybercrime.gov.in). Talk to your family, friends, elders.
- Report suspicious activity or any form of Cyber crime immediately. Talk to your family, friends, elders.
- Anti-virus software & Application updates : Use Anti-Virus software with Internet security and keep your applications, software and operating system up-to-date with the latest security patches. Hackers target software vulnerabilities to access private information and putting you at risk.
- Set Secure browser settings : Always choose updated version of the browser and install safe browsing tools for protection yourself from hackers and malware.
- Chakshu - Report Suspected Fraud Communication : Report the suspected fraud communications with the intention of defrauding telecom service users for cyber-crime, financial frauds, non-bonafide purpose like impersonation or any other misuse through Call, SMS or WhatsApp. URL: https://sancharsaathi.gov.in/sfc/Home/sfc-complaint.jsp
- Chakshu - Report Suspected Fraud Communication : Report UCC or spam received through Voice Call or SMS which is not as per the consent given by recipient to sender. URL: https://sancharsaathi.gov.in/sfc/Home/ucc-complaint.jsp
- TAFCOP: Know the number of connections issued in your name by logging in using your mobile number. URL: https://tafcop.sancharsaathi.gov.in/telecomUser/
- Report Incoming International Call with Indian Number (RICWIN) URL: https://sancharsaathi.gov.in/InternationalCall/ReportIntCall.jsp
- Know Your Mobile :Through KYM, you can check the validity of your mobile device even before buying it. URL: https://ceir.sancharsaathi.gov.in/Device/SancharSaathiKym.jsp
- Report Cyber Fraud and Crime Incidents immediately by visiting the website: https://www.cybercrime.gov.in or call 1930
Cyber awareness and hygiene for parents :
- Talk to your children about the potential online threats such as grooming, bullying, and stalking, keep track of their online activities. Set clear guidelines for internet and online games usage.
- Notice indicators of change in behavior : If your child begins to spend more time online and starts being defensive or secretive about their online activities, it may be an indicator of cyber grooming. Talk to your child and engage him/ her in other activities.
- Protect your child from Cyber Grooming : Grooming is a practice where someone builds an emotional bond with a child through social media or chat window with an objective of gaining their trust for sexual exploitation.
- Privacy setting on social media : Children may remove privacy settings on social media to make more friends. Parents should discuss responsible use of social media. Also, they should educate and help them in selecting strong privacy settings.
- Screen Time and Content : Establish clear rules and set reasonable limits for children's use of digital media and the content accesses by children. Consider using authentic apps that control the screen time and content on devices used by children.
Tips to keep your Wireless(WiFi) Network secured :
- Change the default Router login credentials and disable remote administration.
- Keep strong WiFi password and change it often.
- Turn on Wireless Network Encryption-WPA2/WPA2-AES/WPA3.
- Use Firewalls, Enable MAC Address Filtering.
- Turn off Network name Broadcasting (SSID Broadcast) & monitor network activity/connected devices regularly.
- Enable user authentication and Internet access logs (If available).
- Keep your router software/firmware up to date.
- Place your router in a central location.
- Turn off your Wi-Fi Network when not at home.
Online material :- Awareness, Advisories & Tools
- https://ciet.ncert.gov.in/cyber-safety-security
- https://www.csk.gov.in/documents/CERT-In_Safe_Internet-Best_Practices_Booklet.pdf
- https://www.csk.gov.in/security-best-practices.html
- https://guidelines.india.gov.in/security-guidelines-and-attributes/
- https://www.mygov.in/staysafeonline
- https://www.csk.gov.in/security-tools.html
- https://www.ncpcr.gov.in/guidelines
- For Reporting Cyber Fraud & Crime: Visit website: https://www.cybercrime.gov.in OR Call : 1930