Secure your data against cyber threats

The vulnerability to data theft can be significantly reduced by protecting data with passwords and using anti-virus software.

November 23, 2010 05:20 pm | Updated 05:20 pm IST

We had mentioned the vulnerability of those who use the Internet, that has become an indispensable tool for professional or personal work. You have to adopt adequate precautions against cyber threats. What are the possible steps for ensuring security?

Choosing a password

You should show extreme caution in selecting a password. It is the golden key that gives full access to the entire gamut of your information. Very often people choose a password that they can easily remember.

The name of your mother coupled with your date of birth can be remembered most easily. The last digits of your phone number, your car registration number, club membership number, or your house number may be convenient for you. But a hacker can make intelligent guesses and arrive at these numbers in his effort to crack your password.

A clever combination of random numbers, special characters, and letters in capital and small letters may be a hard nut to crack. Using the same password for all your sites may be very convenient; but a hacker who succeeds in cracking one will get easy access to all your sites and accounts.

There are new trends such as the use of ‘two-factor authentication' that employs a password along with another piece of secret information for entering a secured area.

You may, if necessary, use methods of encryption to protect passwords. You should not write out the passwords in a diary kept near the computer or in a file with the name ‘passwords' or something similar in your computer. Even a person who has access to your computer should not be able to know your passwords. If you happen to use a computer that does not belong to you as in a cyber café for surfing or email, do not forget to ‘log out' at the end of your session.

If you are in the habit of carrying a laptop or a palmtop computer (PDA: Personal Digital Assistant) or USB drive, keep it securely at all times. Do keep it locked with a password lest anyone who may get access to it should steal vital information stored in it.

Encrypt your sensitive files. You should certainly have a backup, of all the information saved in the portable device, back home. If you allow a USB drive from others to be inserted in your computer, do it only after scanning and ensuring that it is free from viruses.

Anti-virus software

If your computer gets linked to the Internet, it is imperative that you regularly use some kind of anti-virus software. By scanning the computer, anti-virus software can detect the presence of viruses and help to neutralize them or delete the infected files. Further, certain software will prevent the entry of any virus into your computer through email or from dangerous web sites.

The software may automatically delete infected incoming mail, or alert you and ask your permission before downloading infected mail. Even if these facilities are used regularly, it is a good idea to scan your computer in full periodically to check the presence of any virus and adopt appropriate measures to prevent possible damage. Certain software would scan the computer automatically at pre-determined intervals and give you scan reports for corrective action.

Just installing anti-virus software is no guarantee for permanent protection. Each day attackers write new viruses; they may enter your computer unless your software has the capacity to detect and deal with them.

So you have to regularly update your anti-virus software. The software should have the power to handle even new viruses; it has to be bought from authentic sources for reliable protection of your computer.

Even if you do not surf the net, your computer may get infected if you insert unknown pen-drives or floppies. As a rule, you may first scan any such source before introducing it to your computer.

There are firewalls that can provide protection against outside attackers.

They block unauthorised access by shielding the computer or network from malicious traffic. Authorised communication is however permitted to enter your system.

If children, who are not aware of the value of precious data stored, are allowed to use your computer, they should follow specific discipline limiting their activities to predetermined operations. Otherwise, they may inadvertently delete files of importance to you,

The use of software for checking viruses and malware is an integral part of ensuring cyber security. In spite of your best efforts to protect your computer from infection, your machine may still get infected.

You should have regular backups made to prevent total loss of your vital information in the event of a computer crash.

There is nothing like totally foolproof protection. This does not imply that you can ignore good security habits. It is not advisable to permit strangers to use your computer.

If you have to share your computer with others as in an office, do keep separate user accounts, with individual passwords.

You need not always keep your computer connected to the net, even though you have the broadband connection that asks for no extra charge for continuous connection.

Through the appropriate selection of your Internet options, you can limit pop-up windows and browser cookies.

In order to ensure authenticity and correctness of important business correspondence through email, you can use digital signatures.

Beware of tricksters

Do not follow the instructions found in chain letters; they may carry viruses.

Attackers may give false alarms about impending arrival of harmful viruses to you by email, and ask you to circulate the message to your friends who should also follow their instructions. Free trial offers of software and services may be a ruse to send you viruses and exploit you.

Yet another pitfall before netizens is the habit of falling prey to tempting offers on the net.

They may be in the form of promises of fabulous prizes, honorary degrees, and so on. There may be danger lurking behind them in the form of malicious viruses. You should shun such temptations.

Tricksters may request sums for charity or send requests as if from your friends who got stranded in a strange land where they lost all their money and credit cards.

You may be requested to rescue them by rushing money online to an account. You have to check and confirm the truth through a phone conversation before sending money based on such alerts. Never send any money to people whom you have known only through the net. A chat room friend who wins your heart through sweet conversation may be a scheming impostor.

0 / 0
Sign in to unlock member-only benefits!
  • Access 10 free stories every month
  • Save stories to read later
  • Access to comment on every story
  • Sign-up/manage your newsletter subscriptions with a single click
  • Get notified by email for early access to discounts & offers on our products
Sign in

Comments

Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.

We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.