Today’s IT systems have become widespread and integral part of our daily life. Online transactions, Online banking, Online purchases, Debit cards, Credit cards and Household bills is an important part of modern life.
We are using computers for shopping, education, entertainment, business and many other purposes, so all kinds of details including our personal information, medical records, tax records, school and college records are stored in these computers.
Suggested Read Articles:
- Basics of VPN and Types of Cisco VPN Devices
- A to Z – Computer Security Terms and Definitions
- From Reconnaissance to Covering Tracks – 5 Phases of Ethical Hacking
- Top 10 Internet Security Threats
- A to Z – Network Security Related Abbreviations and Terms
- 100+ Computer and Network Security Abbreviations
- Protect Cisco Router with 8 Easy Steps
- A 10-Step Penetration Testing Methodology – A Detailed Guide
- A to Z – Cyber Security Tools Collection
- A to Z Infosec Awareness Titles and Mottos
Experts estimate that cyber attacks could cost the world $10.5 trillion annually by 2025. Businesses are particularly at risk because they are attractive targets for hackers and spammers who want to make money.
A data breach on your company can be devastating. Nearly 50% of small businesses fold within six months of being breached. Yet, most small businesses are not prepared for cyber attacks.
The only way to promote IT security in your organization is to create cyber security and information security awareness throughout the company. In today’s article, we outline 365 tips & quotes (365 days of information security) to raise information security awareness that are well worth the investment .
JAN 1 | Respect the privacy of others, just as you expect the same from them |
JAN 2 | Use Internet Ethically |
JAN 3 | Be polite and kind during your chat sessions |
JAN 4 | Ensure that you have policies regarding the use of e-mail Internet |
JAN 5 | Do not log on to any e-mail account other than yours even if requested to do so |
JAN 6 | Do not send e-mail message from another user mail box |
JAN 7 | Do not use computers to steal other’s information |
JAN 8 | Do not use computers to harm others |
JAN 9 | Do not use copyrighted software without the author’s permission |
JAN 10 | Consult your authorities if you are unsure about the use of a particular software product |
JAN 11 | Be aware of copyright issues |
JAN 12 | Do not use other user’s computer resources without taking their permission |
JAN 13 | Always respect copyright laws and policies |
JAN 14 | Keep an eye on children when they use the Internet |
JAN 15 | Passwords are like socks. Change regularly |
JAN 16 | Never use computers to modify other’s information such as password/documents etc. |
JAN 17 | Ensure that you are safe from Internet attacks |
JAN 18 | Do not disclose sensitive information to others unless they have a business need to know |
JAN 19 | Never give system or network information to strangers |
JAN 20 | Report any suspected/unauthorized access of computer systems to your Technical Support Person |
JAN 21 | Secure your Internet Connectivity with strong password |
JAN 22 | Encourage family members to use Internet safely |
JAN 23 | Never share personal information to anyone on Internet |
JAN 24 | Immediately report lost or stolen items like laptops, mobile, USB keys and ID cards to the competent authorities |
JAN 25 | Never respond to unknown persons in Internet |
JAN 26 | Never meet online friends in person without family authorization |
JAN 27 | Respect others and never misbehave over Internet Communication |
JAN 28 | Never download files through CHAT sessions from unknown persons |
JAN 29 | Always read carefully about “Terms & Conditions” before confirming anything over Internet |
JAN 30 | Never download anything from e-mail when the sender is unknown or the attachment has a doubtful name |
JAN 31 | New viruses creep upon a daily basis. It is important that we do back up our valuable data files regularly |
FEB 1 | Never open e-mails from unknown persons |
FEB 2 | Never send sensitive details like password or credit/ debit card numbers through e-mails |
FEB 3 | Always Filter your e-mails |
FEB 4 | Always download e-mail attachments after scanning with latest updated Anti-Virus |
FEB 5 | Report abuse like spam, harassment, stalking etc., to the concern authorities |
FEB 6 | Monitor your child’s online activities regularly |
FEB 7 | Follow the best practices in using Internet browsers |
FEB 8 | Follow good security practices while giving your e-mail address to others |
FEB 9 | Educate yourself on best practices, guidelines on Internet usage |
FEB 10 | Never forward online messages through e-mail to everyone you know |
FEB 11 | Never open e-mail attachments with the file extensions such as VBS, SHS, PIF etc., |
FEB 12 | Configure Operating System/Browser to always show file extensions |
FEB 13 | Don’t advertise that you are away from home |
FEB 14 | Never open attachments with double file extensions such as info.BMP.EXE or info.TXT.VBS |
FEB 15 | Never open porno related attachments with file names PORNO.exe, Pamela-nude.exe. |
FEB 16 | Never trust the icons in the e-mail attachment. The virus file may be shown as PDF file |
FEB 17 | Never open web-links in your e-mail. Always type links in Web browser |
FEB 18 | Report suspicious e-mails to concerned authorities |
FEB 19 | Always use e-mail transaction through secured e-mail sites |
FEB 20 | Change the default settings of your search engine |
FEB 21 | Never send your photograph through e-mail to unknown person |
FEB 22 | Never accept e-mail which do not contain/mention your name |
FEB 23 | Always be careful about fraudulent/phishing e-mails |
FEB 24 | Never open/reply/forward suspicious e-mail |
FEB 25 | Never click links in e-mail which starts with IP address |
FEB 26 | Always use spam filters in e-mail |
FEB 27 | The cyber world is open to all. Anyone can post data on Internet. Beware of false information |
FEB 28 | Be suspicious of any unexpected demands on the net for your personal information. No bonafide companies ask for this information without reason |
MAR 1 | Shred unwanted important information immediately |
MAR 2 | Check privacy policies when you are browsing |
MAR 3 | Always use secured web sites (https ://) |
MAR 4 | Make sure that your transactions are encrypted |
MAR 5 | Always check typed web address for legitimate website |
MAR 6 | Update the web browser before browsing Internet |
MAR 7 | Do not give your personal information over the Internet |
MAR 8 | Do not click on the web link that has come via e-mail. Instead go to main website by typing the address in the address bar |
MAR 9 | Block popup windows while browsing Internet on your web browser |
MAR 10 | Make sure you do not use remember password option in browser |
MAR 11 | Always clear history before you leave a system in Internet centres |
MAR 12 | Do not click on pop up window, while browsing Internet |
MAR 13 | Beware of software that are available for free |
MAR 14 | Do not pursue links that offer free Anti-Virus or Anti-Spyware software |
MAR 15 | Always check the authenticity of the person before you accept a request in Social Networking |
MAR 16 | Installing unauthorized software programs on your computer may harm your computer |
MAR 17 | Set your Anti-virus to check your online activity |
MAR 18 | Make sure you trust the website before downloading any software |
MAR 19 | Never download software received through e-mail attachment as most organizations don’t send them |
MAR 20 | Check the validity of the certificate and issuer of the certificate for a site before any downloads |
MAR 21 | Be cautious while downloading the applications through Bluetooth or on an MMS |
MAR 22 | Use content filters to prevent access to websites that are considered unsuitable |
MAR 23 | Be aware of personal information when you post in global address groups |
MAR 24 | Avoid subscription services on Internet unless there is a good business reason for subscribing them |
MAR 25 | Avoid using currency punctuation in text based e-mails. Use three-letter currency indicators instead (USD,INR) |
MAR 26 | Always use the maximum key size supported by access point for encryption |
MAR 27 | Always send-e-mails to individuals rather than groups for safer communication |
MAR 28 | Always check security certificates while using secured websites |
MAR 29 | Never reply to lottery e-mails |
MAR 30 | Always keep your passwords in safe places |
MAR 31 | Use different passwords for different services while browsing |
APR 1 | Be careful with credit card transaction for online shopping |
APR 2 | Read the privacy policy of the vendor in order to know how they treat your personal information |
APR 3 | Always insist shipments for the same address that is mentioned on the billing address, while ordering online |
APR 4 | Verify the security of website for online payment system |
APR 5 | Never do online business financial transactions through e-mail communication |
APR 6 | Read all disclosures for online shopping |
APR 7 | Always check for secured transactions while you go for online transaction |
APR 8 | Never keep your credit card and PIN at one place |
APR 9 | Always look for https:// for online transactions |
APR 10 | Always check for the padlock icon in the browser for secured transactions |
APR 11 | Check your bank statements regularly |
APR 12 | Always use separate credit card for online transactions to know the status of online activity |
APR 13 | Sign immediately in the signature panel of the bank card after receiving it and keep your pin separately safe |
APR 14 | Always properly logout after completion of online transactions |
APR 15 | Never click ‘X’ (cross mark) for closing the browser while you are in the middle of online transactions |
APR 16 | Destroy the statement carefully after checking the statement information at the ATM so that no other person will be decrypt your confidential information |
APR 17 | Do not respond to the mails which asks for your personal or account information even if they are convincing |
APR 18 | Destroy the magnetic strip on the bank card once it expires |
APR 19 | Project your personal computer from viruses and other malicious programs |
APR 20 | Do not use PIN numbers that match your personal information like date of birth, vehicle number, door number etc |
APR 21 | Inform immediately about credit card loss to the concerned authority |
APR 22 | Do not provide PIN or other account information through telephone unless you initiated the call |
APR 23 | Never send credit card number or other personal details through e-mail |
APR 24 | Cover the screen and the keyboard while making financial transactions to avoid shoulder surfing |
APR 25 | Cards are like cash, do not leave them unattended |
APR 26 | Ensure that you receive the Debit/Credit card back after completing the transaction |
APR 27 | For safer Internet banking, use virtual keyboards |
APR 28 | Never take assistance from strangers for Internet banking |
APR 29 | Don’t use unprotected PC’s cybercafe specially for Internet Banking |
APR 30 | Do not use same password that has been earlier |
MAY 1 | Always use the latest updated browsers for your Online transactions |
MAY 2 | You are responsible for safeguarding your ID and password. Never write your passwords on paper (or) anywhere else for referring |
MAY 3 | Always change your password at regular intervals |
MAY 4 | Never save your password in your computer or in e-mail accounts |
MAY 5 | When you suspect that someone knows your password change it immediately |
MAY 6 | Do not use a password which was used earlier |
MAY 7 | Be careful about shoulder surfing while entering your pin number at ATM |
MAY 8 | Your brain is the best place to store your passwords |
MAY 9 | Do not reveal your passwords to anyone. Not even to your system administrator |
MAY 10 | If you Store your passwords on your computer, store with the help of an encryption utility |
MAY 11 | Do not use your name, or family name, or birth place etc., as passwords |
MAY 12 | Never tell your password to anyone |
MAY 13 | Avoid using dictionary words as password |
MAY 14 | The stronger your password, the more secure is your information |
MAY 15 | Be sure that you don’t use personal identifiers in your password |
MAY 16 | Pick a passphrase for a strong password |
MAY 17 | Never reveal your password or account information to other |
MAY 18 | Monitor your account regularly for changes |
MAY 19 | Do not save your passwords in web browsers |
MAY 20 | Running a virus scan before launching any program on the disk will prevent virus from entering your computer |
MAY 21 | Use the password that is easy for you to remember and hard for others to guess |
MAY 22 | The password should be a minimum of eight characters in length |
MAY 23 | The password must be a combination of numbers,letters,and special characters |
MAY 24 | Never reveal password on questionnaires/ networking sites |
MAY 25 | Never talk about your password in front of others |
MAY 26 | Don’t write down your password and leave it near your computer |
MAY 27 | Use a password for your computer BIOS settings |
MAY 28 | Disable auto login facility in your computer |
MAY 29 | Never reuse your old password |
MAY 30 | Always clear the temporary files in your browser after their usage |
MAY 31 | Password is a key and it’s personal. So, protect it |
JUN 1 | Be alert for phishing e-mail scam |
JUN 2 | Always ensure that the website offers https based URL before you submit your personal information |
JUN 3 | Shred or tear up the documents with personally identifiable information before you throw them away |
JUN 4 | Never store your business data on your local drives. Always use your organization central storage |
JUN 5 | Use only known, trusted and secure websites when you enter sensitive or personal information Online |
JUN 6 | Don’t respond to calls requesting you to provide your confidential information |
JUN 7 | Avoid filling forms through e-mail links which ask for personal information |
JUN 8 | Do not click the web links that come through e-mails. Copy and paste the URL in the address bar |
JUN 9 | Handle e-mail attachments carefully |
JUN 10 | Configure e-mail client in a secured manner |
JUN 11 | Beware of the websites that may give your personal information to third parties |
JUN 12 | Be aware of the e-mail policies of the company with which we use for business or personal reasons |
JUN 13 | Watch out for phishing scams |
JUN 14 | Be suspicious of any e-mail with urgent requests for personal financial information |
JUN 15 | Never enter your personal information in a popup screen |
JUN 16 | Know that phishing can also happen by phone. So, never give personal information by phone |
JUN 17 | Be cautious about each and every communication that you |
JUN 18 | Its is always a good idea to ensure that your e-mail authentication process is encrypted |
JUN 19 | Don’t open/forward/reply to/ click on links/ attachments in unsolicited e-mails |
JUN 20 | Disable automatic display of PDF documents from the web browser |
JUN 21 | Beware of popups promising you gifts |
JUN 22 | Be careful at public Wi-Fi hotspots |
JUN 23 | Don’t access your e-mail from an unsecured network or potentially compromised computer |
JUN 24 | Clear all your private data from the cookies while leaving the PC |
JUN 25 | Keep your web browser set to its highest security level |
JUN 26 | Never click on alerts related to anti-virus |
JUN 27 | Never click on “Click here” “Agree” “Do not agree” “close the window” dialog boxes to avoid malware |
JUN 28 | Use different browsers to avoid browser based attacks |
JUN 29 | Don’t follow links in spam messages |
JUN 30 | Never recommend spam-based websites |
JUL 1 | Do not believe everything you read online |
JUL 2 | Check privacy policy of websites as they may share your information such as e-mail address or user preferences with other companies |
JUL 3 | Make a sure that your child knows the boundaries of what he is allowed to do on your computer, appropriate for his age and knowledge |
JUL 4 | Always use separate account and control the amount of access and privileges to your child |
JUL 5 | Don’t give out sensitive information while working on Internet at public places like cyber, cafes, hotels etc., |
JUL 6 | Always use the latest updated Anti-Spyware program |
JUL 7 | Always update antivirus software to protect your machine from viruses |
JUL 8 | Scan the files with anti-virus software after you download it from the Internet |
JUL 9 | While using MS Office documents, make sure that macro virus protection option is enabled |
JUL 10 | There are several ways a virus can enter your computer. Scan the system with Anti-Virus software daily before use |
JUL 11 | Always update Operating System with latest patches before using them |
JUL 12 | Some viruses start impacting your computer as soon as they appear on the Outlook Express preview panel (window). So, disable that option |
JUL 13 | Open the downloaded files after scanning with the latest updated antivirus software |
JUL 14 | Know the computer virus symptoms so that you can identify when your system is infected |
JUL 15 | Disconnect the infected machine immediately from your network |
JUL 16 | Enable desktop firewall to control unnecessary communications |
JUL 17 | Watch out for SPAM. (Spam Instant Messages) |
JUL 18 | Do not open attachments that have been sent by an unknown user |
JUL 19 | Always scan the USB pen drive,diskettes, and removable hard disks for viruses before using them |
JUL 20 | Switch off the Internet modem when not in use |
JUL 21 | Evaluate your security settings |
JUL 22 | Never get into online arguments of fights |
JUL 23 | Observe your system for any new software installed without your intervention |
JUL 24 | Manage cookies |
JUL 25 | Always use a nickname or alias name to sign into a chat |
JUL 26 | Never give away your images while doing Internet chatting |
JUL 27 | Avoid file transfers and following the links during chatting Online |
JUL 28 | If you receive strange messages during chatting, report to the concerned authority/ parents |
JUL 29 | Always record the online conversation for future reference |
JUL 30 | Never meet a stranger cyber pa(whom you know only online)in person |
JUL 31 | Never interput with others online works |
AUG 1 | Avoid providing other’s information without their consent while you are in chatting |
AUG 2 | Avoid chatting with unknown persons |
AUG 3 | In Whatsapp restrict access to your profile picture by enabling profile picture sharing only to contacts |
AUG 4 | Always logout when you use WhatsApp Web on your laptop or computer |
AUG 5 | Be careful while exchanging files between systems through disks or through network |
AUG 6 | Always take backup of your important files |
AUG 7 | Always maintain a backup of your critical data to restore to the original state in case something happens to your system |
AUG 8 | Use a continuous uninterruptible power supply (UPS) to prevent loss of unsaved data during power failures |
AUG 9 | Safeguard your data |
AUG 10 | Verify and validate your critical data at regular intervals |
AUG 11 | Check your personal address book regularly and remove unwanted and incorrect entries |
AUG 12 | Limit your printout to information that is not sensitive |
AUG 13 | Don’t use USB keys, CDs, or laptop drives for unencrypted |
AUG 14 | Do not keep sensitive information on portable devices unless they are properly protected |
AUG 15 | Keep multiple backups for your critical and sensitive data |
AUG 16 | Backup your files periodically using removable media (i.e. a copy CDRW or DVDRW) |
AUG 17 | Destroy or securely erase sensitive information before recycling or throwing it away |
AUG 18 | Limit your data that you put online |
AUG 19 | Delete or truncate sensitive data elements when they are not in use |
AUG 20 | Make a boot disk in case your computer is damaged or compromised |
AUG 21 | You should take a backup of your important data regularly. Importantly, make sure that the procedure for restoring the data is working properly |
AUG 22 | Disconnect your computer from the Internet when you aren’t using it |
AUG 23 | Beware of new fraud strategies such as keyboard loggers, Trojans etc., |
AUG 24 | Think before you click on any links in websites |
AUG 25 | Always use updated operating system with all the security patches |
AUG 26 | Set the operating system to display file extensions |
AUG 27 | Always keep the desktop firewall on |
AUG 28 | Turn off your computer when not using it |
AUG 29 | Though the software is downloaded from a trusted site, scan the downloaded part before using it |
AUG 30 | Remember, hackers are not only a threat to your computer but also they can harm other computers by using your computer |
AUG 31 | Think twice before posting pictures of you, or your family members, or your friends on the Internet |
SEP 1 | Read the license agreement carefully before installing the software onto your system |
SEP 2 | Use computer locks to prevent unauthorized users gaining access to the hardware of your PC |
SEP 3 | Use computer hard locks to prevent unauthorized users booting your system with their own CD or hardware |
SEP 4 | Set BIOS password to prevent unauthorized users from rebooting and manipulating your system |
SEP 5 | Place your systems in a locked room which is dust-free and has a good ventilation to avoid overheating of CPU |
SEP 6 | Always secure your PC/Laptop and do not leave them un-attended |
SEP 7 | Take care of shoulder surfing |
SEP 8 | If you find illegal communication or activities in Internet, complain about it to Internet Service Providers (ISP) |
SEP 9 | Never leave an e-mail account unattended if it is logged in, unless a password-protected screen saver is invoked |
SEP 10 | Keep the number of e-mails in your mailbox to a bare minimum |
SEP 11 | Configure your desktop firewalls effectively. Update your mobile regularly with new updates from Mobile manufacturer |
SEP 12 | Update your antivirus software with the latest available updates |
SEP 13 | Secure your system even if it doesn’t contain any valuable information. Secure your personal gadgets like Mobiles/Tablets etc,. |
SEP 14 | Check the processor or the programs running in your system when it slows down suddenly |
SEP 15 | Secure your wireless communication with additional network security such as SSH, or VPN, or SSL,tunneling and turn off the wireless devices when not in use |
SEP 16 | Make sure that your laptop or your laptop bag will have an identification sticker particularly when you hand them through the airport security in airports |
SEP 17 | Always maintain an updated version of PDF Reader |
SEP 18 | Delete temporary files regularly to avoid remembering personal information |
SEP 19 | Work smart and not just hard. Secure yourself,your system and your network |
SEP 20 | Share the latest important security tips with your Colleagues/Friends |
SEP 21 | Don’t install unknown or unsolicited softwares on your computer/laptop |
SEP 22 | Be extremely careful with online file sharing softwares |
SEP 23 | Delete all unsolicited e-mails after informing the concerned authorities |
SEP 24 | Always use secured PC in public places |
SEP 25 | Don’t leave your laptop unattended at the airport, library or cafeteria |
SEP 26 | Enable a pop-up blocker in your Internet browser |
SEP 27 | Take immediate action if you feel that your computer is infected with virus. To avoid automatic generation,remove the network connection |
SEP 28 | Be careful while doing online shopping, don’t buy seeing the offers. Buy at trusted e-commerce sites |
SEP 29 | When computers slow down, it means that they are old and should be replaced |
SEP 30 | If you are a victim of identity theft, report it immediately |
OCT 1 | Monitor your credit card account statement for suspicious/unauthorized activity |
OCT 2 | Running a virus scan before launching any program on the disk will prevent infection |
OCT 3 | Desktop firewall provides an effective defense against remote installation of spyware by hackers |
OCT 4 | Enable Bluetooth only when you need it |
OCT 5 | Retain your Bluetooth device in a non-discoverable mode or hidden mode |
OCT 6 | Use long and difficult to guess PIN when paring Bluetooth devices |
OCT 7 | Reject all unknown pairing requests for Bluetooth devices |
OCT 8 | Check the list of paired devices in your Bluetooth frequently to ensure that there are no unknown devices on the list |
OCT 9 | Update your mobile phone firmware to the latest version |
OCT 10 | Enable encryption when establishing Bluetooth connection with your PC |
OCT 11 | Make sure that all your Bluetooth connections are configured securely |
OCT 12 | Disable the automatic download of graphics HTML mail in your mobile devices |
OCT 13 | Disable the option of booting from external media in personal computers |
OCT 14 | Be aware of social engineering attacks on mobile and Bluetooth devices |
OCT 15 | When pairing Bluetooth for the first time, do so in private at home or in the office and avoid public places |
OCT 16 | Always use an alphanumeric PIN (personal identification number) of at least eight characters for wireless devices |
OCT 17 | Evaluate your security settings regularly in your Bluetooth devices |
OCT 18 | Charge your default administrator passwords and usernames for your mobile devices and Wi-Fi devices |
OCT 19 | All Wi-Fi equipment support some form of encryption. So, enable them |
OCT 20 | Access points and routers use a network name called the SSID. Change default SSID |
OCT 21 | Enable MAC address filtering on Wi-Fi devices |
OCT 22 | Disable SSID broadcasting in wireless access point |
OCT 23 | Never set auto-connect enabled access to open Wi-Fi networks in public places |
OCT 24 | Avoid dynamic IP address for home Wi-Fi rater use static IP addresses |
OCT 25 | Use encryption technology for sensitive data in wireless networks |
OCT 26 | Develop your own security policy and follow it to avoid security attacks on your PC |
OCT 27 | Turn off wireless networks when not in use |
OCT 28 | Use desktop firewalls when using wireless network |
OCT 29 | Always update your wireless devices with the latest patches |
OCT 30 | Use strong PINs and change your PIN (in your mobile devices) regularly |
OCT 31 | Always keep an eye on your handheld devices when you are in a public place |
NOV 1 | Keep the Bluetooth connection in an invisible mode unless you need some user to access your mobile phone or laptop |
NOV 2 | Delete the MMS (Multimedia Messaging Service) message received from an unknown user without opening it |
NOV 3 | Always take advantage of security features available with your pen drive |
NOV 4 | Maintain separate pen drives for office use and for personal use |
NOV 5 | Do not plug-in unknown USB drives into your computer |
NOV 6 | Always lock/logout while leaving your computer |
NOV 7 | Never walk away beyond the vicinity of your computer when your computer is logged in |
NOV 8 | Never leave your computer unattended for any period of time while browsing |
NOV 9 | Read your mobile phone’s operating instructions particularly security settings, pin code settings, Bluetooth settings, and infrared settings, etc. very carefully |
NOV 10 | Activate pin code request for your mobile phone access which is not easily predictable but something which you can remember easily |
NOV 11 | Use the call barring and restriction services provided by mobile operators to prevent unwanted applications |
NOV 12 | Don’t make your phone as your personal data store. This is dangerous, if it falls into the stranger’s hand |
NOV 13 | Note the International Mobile Equipment Identity (IMEI) number of your cell phone and keep it in a safe place. This helps to trace your mobile phone if it is stolen |
NOV 14 | Define your own trusted devices which you can connect to your mobile phone or your laptop through Bluetooth |
NOV 15 | Mobiles also need anti-virus software as needed in computers |
NOV 16 | Never open e-mail attachments in mobile devices from unknown persons |
NOV 17 | Always use pop-up and ad-blocking tools |
NOV 18 | Make sure to take a backup of your data before doing any hardware troubleshooting |
NOV 19 | Make sure that your family members know what to do when your computer is infected |
NOV 20 | Never share your mobile devices with strangers |
NOV 21 | Your password and PINs are valuable to you,only if you are able to remember them without nothing it somewhere or sharing |
NOV 22 | Disable auto download and auto open features in your PC mobile devices |
NOV 23 | Always use updated spam-blocking software |
NOV 24 | Never keep restricted or sensitive data on your portable devices |
NOV 25 | Never install unknown or unsolicited on your computer |
NOV 26 | Accessing sites with questionable content often results in spam or release of viruses |
NOV 27 | Secure your laptop and mobile computer with a lockdown cable |
NOV 28 | Avoid Plagiarism |
NOV 29 | Never keep any of your sensitive documents on your tabletop |
NOV 30 | Prevent illegal duplication of proprietary software |
DEC 1 | Ensure to close all open applications and browsers before performing online transactions |
DEC 2 | Always remember to logout/signout from e-mail accounts |
DEC 3 | Do not open any files attached to an e-mail if the subject line is questionable or unexpected |
DEC 4 | Delete chain e-mails and junk e-mail. Do not forward or reply to any of them |
DEC 5 | Do not download any files from strangers |
DEC 6 | Password is a key and its personal. So, protect it |
DEC 7 | Beware of Skimmers |
DEC 8 | Backup your files on regular basis |
DEC 9 | Whenever you are in doubt about any potential virus related situation, report it to the concerned authorities |
DEC 10 | You can prevent or minimize spam in two ways: Filtering out spam and minimizing the exposure of your e-mail addresses |
DEC 11 | Do not ever click on the ‘Remove link’, Spammers then add your e-mail to their list |
DEC 12 | Create an e-mail ID with a nickname and numbers so that the spammers cannot guess them |
DEC 13 | If you want the users of your website to contact you online, provide a form specially for that. But make sure that the ‘send to’ e-mail address is not in the page HTML, but is in the form processing script |
DEC 14 | Never reply to spam messages even when they entice you to reply to ‘remove’ you from their mailing lists |
DEC 15 | Remove your e-mail address from your website pages. Instead, provide a web-based contact form |
DEC 16 | Review server and firewall logs regularly so that you can prevent intrusion attempts or unauthorized accesses |
DEC 17 | Remember to remove the USB drive from your computer before you walk away |
DEC 18 | Keep the printed materials of your sensitive data in drawers or cabinets and lock them When you leave the desk |
DEC 19 | Use different passwords for your different business accounts |
DEC 20 | Disable any user unnecessary accounts (like guest account) |
DEC 21 | Do not leave your backup media in your PC |
DEC 22 | Schedule backups at regular intervals and store them in a secure facility away from the server or desktop |
DEC 23 | Never ever pass your password over the telephone to anyone not even to authorized users |
DEC 24 | To prevent identity theft, close your accounts those have been tampered through fraudulent methods |
DEC 25 | While browsing Internet, never do anything that could cost your family money |
DEC 26 | Always use secure communications for your financial transactions |
DEC 27 | Never participate in peer (P2P) networks if you are not aware |
DEC 28 | Ensure that your transaction is ended/completed at ATM machine before leaving |
DEC 29 | Beware of hardware and software keyloggers |
DEC 30 | Respect the IT laws which are applicable to you |
DEC 31 | Beware of external wires or devices connected to swiping machines |
Credit: infosecawareness.in
You may also like:- 10 Steps to Secure and Manage Your Passwords
- Gmail and Facebook Users Advised to Secure Their Accounts Immediately
- Pentagon’s Proactive Approach to Cybersecurity – Over 50,000 Vulnerability Reports Since 2016
- Windows Hardening – Key Points To Remember
- Top 10 Fundamental Questions for Network Security
- How to Remove x-powered-by in Apache/PHP for Enhanced Security
- 12 Point Checklist – PHP Security Best Practices
- Secure Programming Checklist – 2023 Compilation Guide
- The Ultimate Network Security Checklist – 2023 Complete Guide
- A Comprehensive Guide to Crafting Strong Passwords