365 Days of Information Security Quotes

information security 365 days

Today’s IT systems have become widespread and integral part of our daily life. Online transactions, Online banking, Online purchases, Debit cards, Credit cards and Household bills is an important part of modern life.

We are using computers for shopping, education, entertainment, business and many other purposes, so all kinds of details including our personal information, medical records, tax records, school and college records are stored in these computers.

Suggested Read Articles:

Experts estimate that cyber attacks could cost the world $10.5 trillion annually by 2025. Businesses are particularly at risk because they are attractive targets for hackers and spammers who want to make money.

A data breach on your company can be devastating. Nearly 50% of small businesses fold within six months of being breached. Yet, most small businesses are not prepared for cyber attacks.

The only way to promote IT security in your organization is to create cyber security and information security awareness throughout the company. In today’s article, we outline 365 tips & quotes (365 days of information security) to raise information security awareness that are well worth the investment .

JAN 1 Respect the privacy of others, just as you expect the same from them
JAN 2 Use Internet Ethically
JAN 3 Be polite and kind during your chat sessions
JAN 4 Ensure that you have policies regarding the use of e-mail Internet
JAN 5 Do not log on to any e-mail account other than yours even if requested to do so
JAN 6 Do not send e-mail message from another user mail box
JAN 7 Do not use computers to steal other’s information
JAN 8 Do not use computers to harm others
JAN 9 Do not use copyrighted software without the author’s permission
JAN 10 Consult your authorities if you are unsure about the use of a particular software product
JAN 11 Be aware of copyright issues
JAN 12 Do not use other user’s computer resources without taking their permission
JAN 13 Always respect copyright laws and policies
JAN 14 Keep an eye on children when they use the Internet
JAN 15 Passwords are like socks. Change regularly
JAN 16 Never use computers to modify other’s information such as password/documents etc.
JAN 17 Ensure that you are safe from Internet attacks
JAN 18 Do not disclose sensitive information to others unless they have a business need to know
JAN 19 Never give system or network information to strangers
JAN 20 Report any suspected/unauthorized access of computer systems to your Technical Support Person
JAN 21 Secure your Internet Connectivity with strong password
JAN 22 Encourage family members to use Internet safely
JAN 23 Never share personal information to anyone on Internet
JAN 24 Immediately report lost or stolen items like laptops, mobile, USB keys and ID cards to the competent authorities
JAN 25 Never respond to unknown persons in Internet
JAN 26 Never meet online friends in person without family authorization
JAN 27 Respect others and never misbehave over Internet Communication
JAN 28 Never download files through CHAT sessions from unknown persons
JAN 29 Always read carefully about “Terms & Conditions” before confirming anything over Internet
JAN 30 Never download anything from e-mail when the sender is unknown or the attachment has a doubtful name
JAN 31 New viruses creep upon a daily basis. It is important that we do back up our valuable data files regularly
FEB 1 Never open e-mails from unknown persons
FEB 2 Never send sensitive details like password or credit/ debit card numbers through e-mails
FEB 3 Always Filter your e-mails
FEB 4 Always download e-mail attachments after scanning with latest updated Anti-Virus
FEB 5 Report abuse like spam, harassment, stalking etc., to the concern authorities
FEB 6 Monitor your child’s online activities regularly
FEB 7 Follow the best practices in using Internet browsers
FEB 8 Follow good security practices while giving your e-mail address to others
FEB 9 Educate yourself on best practices, guidelines on Internet usage
FEB 10 Never forward online messages through e-mail to everyone you know
FEB 11 Never open e-mail attachments with the file extensions such as VBS, SHS, PIF etc.,
FEB 12 Configure Operating System/Browser to always show file extensions
FEB 13 Don’t advertise that you are away from home
FEB 14 Never open attachments with double file extensions such as info.BMP.EXE or info.TXT.VBS
FEB 15 Never open porno related attachments with file names PORNO.exe, Pamela-nude.exe.
FEB 16 Never trust the icons in the e-mail attachment. The virus file may be shown as PDF file
FEB 17 Never open web-links in your e-mail. Always type links in Web browser
FEB 18 Report suspicious e-mails to concerned authorities
FEB 19 Always use e-mail transaction through secured e-mail sites
FEB 20 Change the default settings of your search engine
FEB 21 Never send your photograph through e-mail to unknown person
FEB 22 Never accept e-mail which do not contain/mention your name
FEB 23 Always be careful about fraudulent/phishing e-mails
FEB 24 Never open/reply/forward suspicious e-mail
FEB 25 Never click links in e-mail which starts with IP address
FEB 26 Always use spam filters in e-mail
FEB 27 The cyber world is open to all. Anyone can post data on Internet. Beware of false information
FEB 28 Be suspicious of any unexpected demands on the net for your personal information. No bonafide companies ask for this information without reason
MAR 1 Shred unwanted important information immediately
MAR 2 Check privacy policies when you are browsing
MAR 3 Always use secured web sites (https ://)
MAR 4 Make sure that your transactions are encrypted
MAR 5 Always check typed web address for legitimate website
MAR 6 Update the web browser before browsing Internet
MAR 7 Do not give your personal information over the Internet
MAR 8 Do not click on the web link that has come via e-mail. Instead go to main website by typing the address in the address bar
MAR 9 Block popup windows while browsing Internet on your web browser
MAR 10 Make sure you do not use remember password option in browser
MAR 11 Always clear history before you leave a system in Internet centres
MAR 12 Do not click on pop up window, while browsing Internet
MAR 13 Beware of software that are available for free
MAR 14 Do not pursue links that offer free Anti-Virus or Anti-Spyware software
MAR 15 Always check the authenticity of the person before you accept a request in Social Networking
MAR 16 Installing unauthorized software programs on your computer may harm your computer
MAR 17 Set your Anti-virus to check your online activity
MAR 18 Make sure you trust the website before downloading any software
MAR 19 Never download software received through e-mail attachment as most organizations don’t send them
MAR 20 Check the validity of the certificate and issuer of the certificate for a site before any downloads
MAR 21 Be cautious while downloading the applications through Bluetooth or on an MMS
MAR 22 Use content filters to prevent access to websites that are considered unsuitable
MAR 23 Be aware of personal information when you post in global address groups
MAR 24 Avoid subscription services on Internet unless there is a good business reason for subscribing them
MAR 25 Avoid using currency punctuation in text based e-mails. Use three-letter currency indicators instead (USD,INR)
MAR 26 Always use the maximum key size supported by access point for encryption
MAR 27 Always send-e-mails to individuals rather than groups for safer communication
MAR 28 Always check security certificates while using secured websites
MAR 29 Never reply to lottery e-mails
MAR 30 Always keep your passwords in safe places
MAR 31 Use different passwords for different services while browsing
APR 1 Be careful with credit card transaction for online shopping
APR 2 Read the privacy policy of the vendor in order to know how they treat your personal information
APR 3 Always insist shipments for the same address that is mentioned on the billing address, while ordering online
APR 4 Verify the security of website for online payment system
APR 5 Never do online business financial transactions through e-mail communication
APR 6 Read all disclosures for online shopping
APR 7 Always check for secured transactions while you go for online transaction
APR 8 Never keep your credit card and PIN at one place
APR 9 Always look for https:// for online transactions
APR 10 Always check for the padlock icon in the browser for secured transactions
APR 11 Check your bank statements regularly
APR 12 Always use separate credit card for online transactions to know the status of online activity
APR 13 Sign immediately in the signature panel of the bank card after receiving it and keep your pin separately safe
APR 14 Always properly logout after completion of online transactions
APR 15 Never click ‘X’ (cross mark) for closing the browser while you are in the middle of online transactions
APR 16 Destroy the statement carefully after checking the statement information at the ATM so that no other person will be decrypt your confidential information
APR 17 Do not respond to the mails which asks for your personal or account information even if they are convincing
APR 18 Destroy the magnetic strip on the bank card once it expires
APR 19 Project your personal computer from viruses and other malicious programs
APR 20 Do not use PIN numbers that match your personal information like date of birth, vehicle number, door number etc
APR 21 Inform immediately about credit card loss to the concerned authority
APR 22 Do not provide PIN or other account information through telephone unless you initiated the call
APR 23 Never send credit card number or other personal details through e-mail
APR 24 Cover the screen and the keyboard while making financial transactions to avoid shoulder surfing
APR 25 Cards are like cash, do not leave them unattended
APR 26 Ensure that you receive the Debit/Credit card back after completing the transaction
APR 27 For safer Internet banking, use virtual keyboards
APR 28 Never take assistance from strangers for Internet banking
APR 29 Don’t use unprotected PC’s cybercafe specially for Internet Banking
APR 30 Do not use same password that has been earlier
MAY 1 Always use the latest updated browsers for your Online transactions
MAY 2 You are responsible for safeguarding your ID and password. Never write your passwords on paper (or) anywhere else for referring
MAY 3 Always change your password at regular intervals
MAY 4 Never save your password in your computer or in e-mail accounts
MAY 5 When you suspect that someone knows your password change it immediately
MAY 6 Do not use a password which was used earlier
MAY 7 Be careful about shoulder surfing while entering your pin number at ATM
MAY 8 Your brain is the best place to store your passwords
MAY 9 Do not reveal your passwords to anyone. Not even to your system administrator
MAY 10 If you Store your passwords on your computer, store with the help of an encryption utility
MAY 11 Do not use your name, or family name, or birth place etc., as passwords
MAY 12 Never tell your password to anyone
MAY 13 Avoid using dictionary words as password
MAY 14 The stronger your password, the more secure is your information
MAY 15 Be sure that you don’t use personal identifiers in your password
MAY 16 Pick a passphrase for a strong password
MAY 17 Never reveal your password or account information to other
MAY 18 Monitor your account regularly for changes
MAY 19 Do not save your passwords in web browsers
MAY 20 Running a virus scan before launching any program on the disk will prevent virus from entering your computer
MAY 21 Use the password that is easy for you to remember and hard for others to guess
MAY 22 The password should be a minimum of eight characters in length
MAY 23 The password must be a combination of numbers,letters,and special characters
MAY 24 Never reveal password on questionnaires/ networking sites
MAY 25 Never talk about your password in front of others
MAY 26 Don’t write down your password and leave it near your computer
MAY 27 Use a password for your computer BIOS settings
MAY 28 Disable auto login facility in your computer
MAY 29 Never reuse your old password
MAY 30 Always clear the temporary files in your browser after their usage
MAY 31 Password is a key and it’s personal. So, protect it
JUN 1 Be alert for phishing e-mail scam
JUN 2 Always ensure that the website offers https based URL before you submit your personal information
JUN 3 Shred or tear up the documents with personally identifiable information before you throw them away
JUN 4 Never store your business data on your local drives. Always use your organization central storage
JUN 5 Use only known, trusted and secure websites when you enter sensitive or personal information Online
JUN 6 Don’t respond to calls requesting you to provide your confidential information
JUN 7 Avoid filling forms through e-mail links which ask for personal information
JUN 8 Do not click the web links that come through e-mails. Copy and paste the URL in the address bar
JUN 9 Handle e-mail attachments carefully
JUN 10 Configure e-mail client in a secured manner
JUN 11 Beware of the websites that may give your personal information to third parties
JUN 12 Be aware of the e-mail policies of the company with which we use for business or personal reasons
JUN 13 Watch out for phishing scams
JUN 14 Be suspicious of any e-mail with urgent requests for personal financial information
JUN 15 Never enter your personal information in a popup screen
JUN 16 Know that phishing can also happen by phone. So, never give personal information by phone
JUN 17 Be cautious about each and every communication that you
JUN 18 Its is always a good idea to ensure that your e-mail authentication process is encrypted
JUN 19 Don’t open/forward/reply to/ click on links/ attachments in unsolicited e-mails
JUN 20 Disable automatic display of PDF documents from the web browser
JUN 21 Beware of popups promising you gifts
JUN 22 Be careful at public Wi-Fi hotspots
JUN 23 Don’t access your e-mail from an unsecured network or potentially compromised computer
JUN 24 Clear all your private data from the cookies while leaving the PC
JUN 25 Keep your web browser set to its highest security level
JUN 26 Never click on alerts related to anti-virus
JUN 27 Never click on “Click here” “Agree” “Do not agree” “close the window” dialog boxes to avoid malware
JUN 28 Use different browsers to avoid browser based attacks
JUN 29 Don’t follow links in spam messages
JUN 30 Never recommend spam-based websites
JUL 1 Do not believe everything you read online
JUL 2 Check privacy policy of websites as they may share your information such as e-mail address or user preferences with other companies
JUL 3 Make a sure that your child knows the boundaries of what he is allowed to do on your computer, appropriate for his age and knowledge
JUL 4 Always use separate account and control the amount of access and privileges to your child
JUL 5 Don’t give out sensitive information while working on Internet at public places like cyber, cafes, hotels etc.,
JUL 6 Always use the latest updated Anti-Spyware program
JUL 7 Always update antivirus software to protect your machine from viruses
JUL 8 Scan the files with anti-virus software after you download it from the Internet
JUL 9 While using MS Office documents, make sure that macro virus protection option is enabled
JUL 10 There are several ways a virus can enter your computer. Scan the system with Anti-Virus software daily before use
JUL 11 Always update Operating System with latest patches before using them
JUL 12 Some viruses start impacting your computer as soon as they appear on the Outlook Express preview panel (window). So, disable that option
JUL 13 Open the downloaded files after scanning with the latest updated antivirus software
JUL 14 Know the computer virus symptoms so that you can identify when your system is infected
JUL 15 Disconnect the infected machine immediately from your network
JUL 16 Enable desktop firewall to control unnecessary communications
JUL 17 Watch out for SPAM. (Spam Instant Messages)
JUL 18 Do not open attachments that have been sent by an unknown user
JUL 19 Always scan the USB pen drive,diskettes, and removable hard disks for viruses before using them
JUL 20 Switch off the Internet modem when not in use
JUL 21 Evaluate your security settings
JUL 22 Never get into online arguments of fights
JUL 23 Observe your system for any new software installed without your intervention
JUL 24 Manage cookies
JUL 25 Always use a nickname or alias name to sign into a chat
JUL 26 Never give away your images while doing Internet chatting
JUL 27 Avoid file transfers and following the links during chatting Online
JUL 28 If you receive strange messages during chatting, report to the concerned authority/ parents
JUL 29 Always record the online conversation for future reference
JUL 30 Never meet a stranger cyber pa(whom you know only online)in person
JUL 31 Never interput with others online works
AUG 1 Avoid providing other’s information without their consent while you are in chatting
AUG 2 Avoid chatting with unknown persons
AUG 3 In Whatsapp restrict access to your profile picture by enabling profile picture sharing only to contacts
AUG 4 Always logout when you use WhatsApp Web on your laptop or computer
AUG 5 Be careful while exchanging files between systems through disks or through network
AUG 6 Always take backup of your important files
AUG 7 Always maintain a backup of your critical data to restore to the original state in case something happens to your system
AUG 8 Use a continuous uninterruptible power supply (UPS) to prevent loss of unsaved data during power failures
AUG 9 Safeguard your data
AUG 10 Verify and validate your critical data at regular intervals
AUG 11 Check your personal address book regularly and remove unwanted and incorrect entries
AUG 12 Limit your printout to information that is not sensitive
AUG 13 Don’t use USB keys, CDs, or laptop drives for unencrypted
AUG 14 Do not keep sensitive information on portable devices unless they are properly protected
AUG 15 Keep multiple backups for your critical and sensitive data
AUG 16 Backup your files periodically using removable media (i.e. a copy CDRW or DVDRW)
AUG 17 Destroy or securely erase sensitive information before recycling or throwing it away
AUG 18 Limit your data that you put online
AUG 19 Delete or truncate sensitive data elements when they are not in use
AUG 20 Make a boot disk in case your computer is damaged or compromised
AUG 21 You should take a backup of your important data regularly. Importantly, make sure that the procedure for restoring the data is working properly
AUG 22 Disconnect your computer from the Internet when you aren’t using it
AUG 23 Beware of new fraud strategies such as keyboard loggers, Trojans etc.,
AUG 24 Think before you click on any links in websites
AUG 25 Always use updated operating system with all the security patches
AUG 26 Set the operating system to display file extensions
AUG 27 Always keep the desktop firewall on
AUG 28 Turn off your computer when not using it
AUG 29 Though the software is downloaded from a trusted site, scan the downloaded part before using it
AUG 30 Remember, hackers are not only a threat to your computer but also they can harm other computers by using your computer
AUG 31 Think twice before posting pictures of you, or your family members, or your friends on the Internet
SEP 1 Read the license agreement carefully before installing the software onto your system
SEP 2 Use computer locks to prevent unauthorized users gaining access to the hardware of your PC
SEP 3 Use computer hard locks to prevent unauthorized users booting your system with their own CD or hardware
SEP 4 Set BIOS password to prevent unauthorized users from rebooting and manipulating your system
SEP 5 Place your systems in a locked room which is dust-free and has a good ventilation to avoid overheating of CPU
SEP 6 Always secure your PC/Laptop and do not leave them un-attended
SEP 7 Take care of shoulder surfing
SEP 8 If you find illegal communication or activities in Internet, complain about it to Internet Service Providers (ISP)
SEP 9 Never leave an e-mail account unattended if it is logged in, unless a password-protected screen saver is invoked
SEP 10 Keep the number of e-mails in your mailbox to a bare minimum
SEP 11 Configure your desktop firewalls effectively. Update your mobile regularly with new updates from Mobile manufacturer
SEP 12 Update your antivirus software with the latest available updates
SEP 13 Secure your system even if it doesn’t contain any valuable information. Secure your personal gadgets like Mobiles/Tablets etc,.
SEP 14 Check the processor or the programs running in your system when it slows down suddenly
SEP 15 Secure your wireless communication with additional network security such as SSH, or VPN, or SSL,tunneling and turn off the wireless devices when not in use
SEP 16 Make sure that your laptop or your laptop bag will have an identification sticker particularly when you hand them through the airport security in airports
SEP 17 Always maintain an updated version of PDF Reader
SEP 18 Delete temporary files regularly to avoid remembering personal information
SEP 19 Work smart and not just hard. Secure yourself,your system and your network
SEP 20 Share the latest important security tips with your Colleagues/Friends
SEP 21 Don’t install unknown or unsolicited softwares on your computer/laptop
SEP 22 Be extremely careful with online file sharing softwares
SEP 23 Delete all unsolicited e-mails after informing the concerned authorities
SEP 24 Always use secured PC in public places
SEP 25 Don’t leave your laptop unattended at the airport, library or cafeteria
SEP 26 Enable a pop-up blocker in your Internet browser
SEP 27 Take immediate action if you feel that your computer is infected with virus. To avoid automatic generation,remove the network connection
SEP 28 Be careful while doing online shopping, don’t buy seeing the offers. Buy at trusted e-commerce sites
SEP 29 When computers slow down, it means that they are old and should be replaced
SEP 30 If you are a victim of identity theft, report it immediately
OCT 1 Monitor your credit card account statement for suspicious/unauthorized activity
OCT 2 Running a virus scan before launching any program on the disk will prevent infection
OCT 3 Desktop firewall provides an effective defense against remote installation of spyware by hackers
OCT 4 Enable Bluetooth only when you need it
OCT 5 Retain your Bluetooth device in a non-discoverable mode or hidden mode
OCT 6 Use long and difficult to guess PIN when paring Bluetooth devices
OCT 7 Reject all unknown pairing requests for Bluetooth devices
OCT 8 Check the list of paired devices in your Bluetooth frequently to ensure that there are no unknown devices on the list
OCT 9 Update your mobile phone firmware to the latest version
OCT 10 Enable encryption when establishing Bluetooth connection with your PC
OCT 11 Make sure that all your Bluetooth connections are configured securely
OCT 12 Disable the automatic download of graphics HTML mail in your mobile devices
OCT 13 Disable the option of booting from external media in personal computers
OCT 14 Be aware of social engineering attacks on mobile and Bluetooth devices
OCT 15 When pairing Bluetooth for the first time, do so in private at home or in the office and avoid public places
OCT 16 Always use an alphanumeric PIN (personal identification number) of at least eight characters for wireless devices
OCT 17 Evaluate your security settings regularly in your Bluetooth devices
OCT 18 Charge your default administrator passwords and usernames for your mobile devices and Wi-Fi devices
OCT 19 All Wi-Fi equipment support some form of encryption. So, enable them
OCT 20 Access points and routers use a network name called the SSID. Change default SSID
OCT 21 Enable MAC address filtering on Wi-Fi devices
OCT 22 Disable SSID broadcasting in wireless access point
OCT 23 Never set auto-connect enabled access to open Wi-Fi networks in public places
OCT 24 Avoid dynamic IP address for home Wi-Fi rater use static IP addresses
OCT 25 Use encryption technology for sensitive data in wireless networks
OCT 26 Develop your own security policy and follow it to avoid security attacks on your PC
OCT 27 Turn off wireless networks when not in use
OCT 28 Use desktop firewalls when using wireless network
OCT 29 Always update your wireless devices with the latest patches
OCT 30 Use strong PINs and change your PIN (in your mobile devices) regularly
OCT 31 Always keep an eye on your handheld devices when you are in a public place
NOV 1 Keep the Bluetooth connection in an invisible mode unless you need some user to access your mobile phone or laptop
NOV 2 Delete the MMS (Multimedia Messaging Service) message received from an unknown user without opening it
NOV 3 Always take advantage of security features available with your pen drive
NOV 4 Maintain separate pen drives for office use and for personal use
NOV 5 Do not plug-in unknown USB drives into your computer
NOV 6 Always lock/logout while leaving your computer
NOV 7 Never walk away beyond the vicinity of your computer when your computer is logged in
NOV 8 Never leave your computer unattended for any period of time while browsing
NOV 9 Read your mobile phone’s operating instructions particularly security settings, pin code settings, Bluetooth settings, and infrared settings, etc. very carefully
NOV 10 Activate pin code request for your mobile phone access which is not easily predictable but something which you can remember easily
NOV 11 Use the call barring and restriction services provided by mobile operators to prevent unwanted applications
NOV 12 Don’t make your phone as your personal data store. This is dangerous, if it falls into the stranger’s hand
NOV 13 Note the International Mobile Equipment Identity (IMEI) number of your cell phone and keep it in a safe place. This helps to trace your mobile phone if it is stolen
NOV 14 Define your own trusted devices which you can connect to your mobile phone or your laptop through Bluetooth
NOV 15 Mobiles also need anti-virus software as needed in computers
NOV 16 Never open e-mail attachments in mobile devices from unknown persons
NOV 17 Always use pop-up and ad-blocking tools
NOV 18 Make sure to take a backup of your data before doing any hardware troubleshooting
NOV 19 Make sure that your family members know what to do when your computer is infected
NOV 20 Never share your mobile devices with strangers
NOV 21 Your password and PINs are valuable to you,only if you are able to remember them without nothing it somewhere or sharing
NOV 22 Disable auto download and auto open features in your PC mobile devices
NOV 23 Always use updated spam-blocking software
NOV 24 Never keep restricted or sensitive data on your portable devices
NOV 25 Never install unknown or unsolicited on your computer
NOV 26 Accessing sites with questionable content often results in spam or release of viruses
NOV 27 Secure your laptop and mobile computer with a lockdown cable
NOV 28 Avoid Plagiarism
NOV 29 Never keep any of your sensitive documents on your tabletop
NOV 30 Prevent illegal duplication of proprietary software
DEC 1 Ensure to close all open applications and browsers before performing online transactions
DEC 2 Always remember to logout/signout from e-mail accounts
DEC 3 Do not open any files attached to an e-mail if the subject line is questionable or unexpected
DEC 4 Delete chain e-mails and junk e-mail. Do not forward or reply to any of them
DEC 5 Do not download any files from strangers
DEC 6 Password is a key and its personal. So, protect it
DEC 7 Beware of Skimmers
DEC 8 Backup your files on regular basis
DEC 9 Whenever you are in doubt about any potential virus related situation, report it to the concerned authorities
DEC 10 You can prevent or minimize spam in two ways: Filtering out spam and minimizing the exposure of your e-mail addresses
DEC 11 Do not ever click on the ‘Remove link’, Spammers then add your e-mail to their list
DEC 12 Create an e-mail ID with a nickname and numbers so that the spammers cannot guess them
DEC 13 If you want the users of your website to contact you online, provide a form specially for that. But make sure that the ‘send to’ e-mail address is not in the page HTML, but is in the form processing script
DEC 14 Never reply to spam messages even when they entice you to reply to ‘remove’ you from their mailing lists
DEC 15 Remove your e-mail address from your website pages. Instead, provide a web-based contact form
DEC 16 Review server and firewall logs regularly so that you can prevent intrusion attempts or unauthorized accesses
DEC 17 Remember to remove the USB drive from your computer before you walk away
DEC 18 Keep the printed materials of your sensitive data in drawers or cabinets and lock them When you leave the desk
DEC 19 Use different passwords for your different business accounts
DEC 20 Disable any user unnecessary accounts (like guest account)
DEC 21 Do not leave your backup media in your PC
DEC 22 Schedule backups at regular intervals and store them in a secure facility away from the server or desktop
DEC 23 Never ever pass your password over the telephone to anyone not even to authorized users
DEC 24 To prevent identity theft, close your accounts those have been tampered through fraudulent methods
DEC 25 While browsing Internet, never do anything that could cost your family money
DEC 26 Always use secure communications for your financial transactions
DEC 27 Never participate in peer (P2P) networks if you are not aware
DEC 28 Ensure that your transaction is ended/completed at ATM machine before leaving
DEC 29 Beware of hardware and software keyloggers
DEC 30 Respect the IT laws which are applicable to you
DEC 31 Beware of external wires or devices connected to swiping machines

Credit: infosecawareness.in

You may also like:

Related Posts

Leave a Reply