4. Home network: - Deepstash
4. Home network:

4. Home network:

Virtual Private Networks (VPN) creates an encrypted tunnel between the user and the remote server, making data secure from prying eyes. Several VPN service providers offer their service for monthly or annual fees.

2

STASHED IN:

3

MORE IDEAS FROM How to be Safe from Cyber Attacks

5 Remedial measures:

So, what can you do if, despite taking necessary precautions, you fall prey to a cyberattack? If your office-provided system has been hit, immediately let your human resource contact know. For Individuals, a complaint can be filed with National Cyber Crime Reporting Portal. Other temporary measures include resetting passwords and re-formatting your data.

1

STASHED IN:

3

1. Passwords:

The most common passwords of vulnerable users are '123456' and 'password', according to a survey by security firm ImmuniWeb. Experts recommend 4 basic requirements for a strong password - an uppercase letter, a symbol, a numeral, and a minimum of 10 characters. Having a unique password for different accounts ensures hackers don't get easy access. Password management applications like Dashlane and Password Boss can help keep passwords locked down, security firm Norton says

3

STASHED IN:

5

3. Social media exposure:

Restricting personal information on social media sites allows minimal access to cybercriminals. For instance, if you post your pet’s name or reveal your mother’s maiden name, you might expose the answers to two common security questions. So, staying cautious on social media platforms will be of great help to you.

2

STASHED IN:

3

2. Internet security suite:

This is a collection of software utilities that protect a user's computer from malware. Combined with anti-virus software and a firewall, the suite can help protect against identity theft. Computers are 5.5 times more likely to be infected by malware without an anti-virus system, according to a report by Microsoft.

1

STASHED IN:

3

6. For an organisation:

Recognizing and addressing the possibility of vulnerabilities can be the first step in increasing security. Organizations can inform their employees about the various forms of threats like phishing and trojan attacks. This will help conduct timely action, especially with children and elderly consumers.

1

STASHED IN:

3

Deepstash helps you become inspired, wiser and productive, through bite-sized ideas from the best articles, books and videos out there.

GET THE APP:

RELATED IDEA

1. Keep up to date – and don’t open up holes yourself:

When it comes to protecting yourself against hackers, step one is always to install software updates as soon as they become available: that’s as true on smartphones as it is on computers. Yes, updating can be a tiresome and intrusive process, and it sometimes brings annoying changes to the interface that you’re used to. All the same, a huge proportion of successful hacks exploit vulnerabilities that have already been patched; exposing yourself unnecessarily is just daft. I’d also strongly

11

STASHED IN:

39

1. Too Much Fast Battery Draining:

If your phone battery is draining too faster or suddenly then there might be chances that your device got hacked or been used remotely. because if tasks are running in the background then the battery starts Draining.

4

STASHED IN:

15

1. Security on Public Wi-Fi

Public Wi-Fi is convenient but comes at the expense of security. When you’re answering emails at a local coffee shop or absent-mindedly scrolling through social media at the airport, someone may be tracking your online activity.

Using a VPN protects your data while you are on other networks, hiding your browsing history, banking information, account passwords and more from ill-intentioned internet strangers

STASHED IN:

7