Tue Jul 17 2018

Precaution from cyber attacks

Precaution from cyber attacks

A cyber attack is any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices. A cyber attack could be employed by nation-states, individuals, groups, society or organizations. A cyber attack may originate from an anonymous source. A cyber attack may steal, alter, or destroy a specified target by hacking into a susceptible system. It can steal or gain unauthorized access to or make unauthorized use of an Asset. The cyber attacker has to be technically stronger and more informed than the victim. So the best tip to prevent cyber attacks is to keep acquiring knowledge and staying informed about the different cyber threats. That's why, to more awareness about cyber attacks, we share the knowledge of cyber security with you and helping you to stay safe from cyber attacks.

So, let's check out the best practices -

Always use a good antivirus software suite

Choose a good antivirus software (free or paid) that provides protection against viruses, malware, worms and internet threats. Each time a USB stick is inserted into the PC, make sure to scan it before using it. Turn on the safe browsing feature of antivirus, to avoid accidentally visiting malicious websites.

While logging in to any website, check the URL first

Attackers sometimes create a fake login web page similar to that of standard websites and ask users to enter their login credentials. However, when entered, the login username and password go to the attacker instead of the intended website. This attack is known as phishing. To identify fake web pages, check the URL (website address) of the webpage. Fake web pages have a different URL than that of the site you intend to visit.

Ensure HTTPS instead of HTTP

HTTPS is a protocol for browsing the internet that uses encryption techniques and is more secure than HTTP. So, ensure that important sites like those for email and financial payments contain “https://' rather than “http://”.

For Gmail

Most of us use Gmail accounts. Gmail provides something known as Two Factor Authentication method. When this option is enabled, each time you log in to Gmail, it sends a One Time Password (OTP) to your registered mobile. In this way, even if your password is revealed, your account cannot be accessed.

Review your banking statements at least once in a week

One suggestion that may seem obvious is to carefully review your credit card statements as soon as you get them.  But once a month means it might be 29 days before you notice fraudulent behavior. Set a specific day once a week to review your statement.  When you review your bill, if anything stands out as being questionable or suspect, investigate immediately to determine if it was one of your authorized purchases.

Don’t reveal your sensitive information online

Unfortunately, there is a constant threat to your personal data whether you are on the go (cell phone, wallet, laptop) or at home (PC, home phone). Take extra precaution in giving information to unsolicited callers. The more you communicate, the more they learn. Many con artists make calls to unwitting consumers and are able to smoothly trick the listener into thinking that they are an authorized vendor.  A simple rule: do not provide your passwords or personal information to unsolicited callers. When searching new websites, to ensure its security, make sure there is a closed lock symbol at the bottom right of the screen. Web addresses that begin with “https” are generally secure, and if you click on the lock symbol on the bottom right, it will display the same “https” address.

If possible change passwords routinely and make them strong

Creating strong passwords is important.  Coming up with obvious passwords such as your birthdate or initials do not pass muster.  Studies have shown that more than fifty percent of Internet users use weak passwords. If you create passwords using your address, birthday or Social Security number, and this information is acquired via cyber theft, all of your personal data becomes vulnerable.  Be creative and make your passwords strong by using a random combination of letters, number, and symbols that have no connection to you or your family.

Use a different password for each account

Suppose you use the same password for sites like Gmail, Facebook, and Outlook and your password for Facebook gets revealed to someone. That person can then access your Gmail and Outlook accounts as well. To avoid this, use different passwords at least for all important sites like email, social networking, and online payment accounts. Prefer random text over meaningful words as the password.

Don't open links to lotteries, prizes, gifts, discounts

It is rightly said, “If you are not paying for the product, then you are the product.” Next time you get an email telling you have won a huge amount in the lottery (even though you did not purchase any lottery ticket), or telling you that you have won an iPhone, do not open any link from the email and report the email as spam.

Update software regularly

Browsers may contain some vulnerability which attackers can exploit to steal information. The developers of the software keep repairing such flaws thorough updates to this software. So it is important to update the software regularly.

Use the private/incognito mode

The browser’s private/incognito mode does not store browsing history and user credentials. So prefer it when using third-party computers.

Use system default virtual keyboard while entering important details

There is software known as keyloggers which capture all the data entered by the user using the physical keyboard. It is possible that third-party computers might have these keyloggers installed and might steal data like passwords you enter using the keyboard. Using an on-screen keyboard bypasses these keyloggers.

Log-off your accounts properly

One of the simplest ways for a cyber-criminal to access your proprietary information is from your computer or mobile device when you forget to log off.  Think about how many times you leave your computer or mobile device unattended while you’re still logged-on. A cyber-criminal can easily and quickly access account information, logins, even financial information.  So before you leave your computer or devices unattended for more than a few minutes, take a few seconds to log-off to protect your information.

Enable two-step authentication

Many services, including Google, offer two-factor authentication for logging into your account. Instead of simply entering a username and password to log in, the website will prompt you to enter a code sent to your smartphone to verify your identity.

Regular backups.

Even when you do everything right, there is still a risk of becoming the victim of a cyber-attack.  Make backup copies of all important data such as financial information, word documents, electronic copies of legal documents, databases, and customer account information.  If possible, set your systems to back-up automatically, and if not, make it a process to do it at least once a week.

Learn about Scams

Education is the best vaccine. The best way to protect yourself from compromise is to learn what kinds of tricks and techniques to retrieve data are out there, and what you can do to avoid and prevent them. Reading the news to stay current will keep you in the loop about what attackers and social engineers are doing. Phone and email scams continue to be the most common and effective methods social engineers use to get at your data. Be conscientious of the types of phone messages that are typical social engineering schemes. Understand how to make sure links and attachments in emails are safe before you open them. Developing a strong knowledge base around hacking trends is a crucial way for you to not fall victim to attacks.

So, check out our other article the types of cyber attack to get knowledge about the tricks and techniques of cyber attack to protect yourself betterly.


Hope, your personal information or data will never be obtained by cyber thieves. It is important to note that even the most secure computer networks are susceptible to attack. Consider the above steps to be proactive and secured. Thank you!

We use cookies to improve your experience on our site and to show you personalised advertising. Please read our cookie policy and privacy policy.