Skip to main content

Cyber Security Best Practice for daily use

Image result for best practices security

Below are some of observations and Cyber security best practices for daily use. If you are secure,  safe and healthy so you can make others as well. What we practice everyday it becomes our habit.  if you follow some basic and standard practice which may avoid some possible damage or loss.
  • Email ID and Mobile Number:
Image result for email id iconImage result for mobile number icon 
    • Manage separate Email-Id and mobile number for your banking and such important activities, avoid sharing this Email-Id with anyone.
    • Login to such email id in separate browser or use incognito mode. 
    • Opt for second factor authentication for your personal email id, banking to add extra layer of security. 
    • Use of basic phone for banking mobile number (SIM card). 
  • Banking:
  • Image result for bank security  icon
      • Avoid sharing banking, bank account details. 
      • Avoid storing card pin, card number, CVV number, banking details or banking cerdentials on insecure file or storage. 
      • Make a habit of changing banking password more frequently. 
      • Deactivate unused or inactive credit card, Debit Card. 
      • Avail fasility to disable international usage of card. 
      • Set Online Banking Limits: 
        • Domestic Limit
        • International Enabled with Limits:
        • Online Shopping Limit
        • Cash Withdraw limit.  
      • Add or update your latest email id, mobile number and address with bank.  
      • Monitor banking transactions time to time. 
      • Use single bank account ( Debit Card and Online Banking) for all your online shopping, hotels, retail shops, movies, purchase, Cab and for swiping at any place.  
  • Passwords:
Image result for password icon
    • Avid using same password for your social media, banking, email services, online services and office work. 
    • Enable two factor authentication wherever possible e.g SMS, Smartphone tap, Fingerprint, Email. 
    • Avoid storing passwords, sensitive information in notepad, notes, sticky notes, diary or insecure storage divide. 
    • Before entering your credentials anywhere verify authenticity of the service provide. 
    • Avoid using easy, guessable and dictionary words in password. Create password which is unique to you, with combination of numbers, special characters and upper-lower case.
  • Social Media:
Image result for social media icon
    • Try Searching your self on web and observe the details visible in your public profile. 
    • Plan your personal and public profile. Avoid sharing your personal details unnecessary.
    • On Social media, avoid accepting request from unknown user. 
    • Do not discuss or share any personal or financial details over social media.  
    • Check privacy policy for all your social media account and see what you are sharing with your friends and other users. 
    • Avoid sharing photos which can share additional details along with it.  
  • Smartphone / Personal Devices: 
  • Image result for device security

    • Avoid downloading applications from untrusted sources or websites. 
    • Uninstall apps you do not use. 
    • Enable data storage encryption on your smartphone.  
    • Update latest patches for mobile OS and application.  
    • Beware of the each app's permissions or access on your device, revoke suspicions permission or access. 
    • Use fingerprint or strong pattern or strong passcode to unlock device. 
    • Make a practice of changing your device password regularly. 
    • Enable remote wipe on your device. 
    • Do not pair with untrusted device if you are not sure.
    • Avoid leaving device unlocked or with other person. 
  • WiFi:
Image result for wireless icon
    • Be careful of using public wifi or someone's wifi hotspot for your personal financial and important transactions. 
    • Avoid sharing or storing Wifi password unnecessary. 
    • Practice of changing WiFi or Wifi hotspot password regularly. 
    • Turn off Wifi in case not in use. Specially at sleep time. 
    • Use wired connection whenever feasible. 
  • Camera:
Image result for hacking camera icon
    • Physically cover all your personal devices camera with sticker or camera caps.
    • Disable location tagging in camera settings if not required.
    • Be careful to perform any sensitive transaction on your laptop, smartphone screen when you are around with untrusted CCTV Cameras or Security Cameras. 
    • Beware of people around you who may capture in pic or video. 
  • Device Backup:
Image result for security backup
    • Take regular backup of your all important devices e.g Smartphone, Laptop, Desktop computer.
    • Enable data encryptions on your backup device, avoid storing backup on untrusted and insecure location. 
  • At Work/Office: 
Work PNG Transparent Image | PNG Mart
    • Avoid the situation for Tailgating or handing over your access card to others. 
    • Avoid talking/discussing sensitive matter in public place or around unknown people. 
    • Do not store work related documents/files on your personal storage or devices. 
    • Never share your work credentials with anyone. 
    • Beware of phishing mail or call, do not share any information with unknown person. 
    • In case you come across any cyber security attack reach out to your SOC(Security Operation Centre)
    • Practice of locking your machine or devices before you be away. 
    • Do not download untrusted software or applications, follow company software policy. 
    • Dispose printed document safely. 
    • Avoid sharing project or work related details over social media or in your profile document or CV. 

Comments

Popular posts from this blog

Product/Application/ Software Security Testing

Product/Application/ Software Security Testing Application Security testing is the process to find security issues or security vulnerability in the application using automated and manual security scanner tools and share the identified issues or risk with development or application team. Process will remain mostly same in all the different types of application security scan. Before initiating security scan, its always good to identify the boundary and scope of your security testing.  Below are the few example of which we can consider as Application or software. ( Scope for Application Security Testing) Web Application, Portal. Web API. Desktop Software / Thick Client. Mobile Application. Web Services.  Plug in, Add-On The goal of application security is to secure the application and prevent the unwanted damaged. The process of performing security scan or audit is know as ASA (Application Security Assessment). Generally there are three types of ASA, SAST, DAST and PT. 

Password Protected File Validation for(.doc/.docx/.xls/.xlsx/.pdf) file types

Password Protected File Validation for(.doc/.docx/.xls/.xlsx/.pdf) file types protected void btnUpload_Click( object sender, EventArgs e)         {             //Check if File Upload control has file or not             if (FileUpload1.HasFile)             {                 //Get Uploaded file bytes                 var bytes = FileUpload1.FileBytes;                 //Get Uploaded File Extension                 FileInfo objFileInfo = new FileInfo (FileUpload1.FileName);                 string StrFileExt = objFileInfo.Extension.ToUpper();                                 //Based on the File extension call appropriate user defined method.                 //For PDF file type                 if (StrFileExt == ".PDF" )                 {                     //Upload and save file in server temp folder                     var newfilename = DateTime .Now.GetHashCode() + FileUpload1.FileName;                     FileUpload1.SaveAs(Syst