Page 30 - 2619_PlusGPT V2.1_C-8
P. 30

·  Avoid using something about yourself that is publicly known to others.
                  ·  Avoid keeping names of loved ones, relatives, friends, etc., as passwords.
                  Examples of strong password: aniKR@87@18, Esd{@37 X!}.

                  Having a strong password is important to safeguard oneself from the following negative impacts:
                  ·  Downloading and stealing of personal files and documents by others.
                  ·  Transmitting of messages without our knowledge from our e-mail or social media account to others.

                  ·  Modification of personal details by someone with an intention to slander our image.
                  ·  Purchase of things in our name.
                  ·  Transfer or appropriation of fund from our bank account without our knowledge.

                  We should keep changing passwords frequently. Using long passwords can lower the risk of a security
                  breach. Most websites rate the effectiveness of password with a password meter that displays the
                  strength of a password.


                       Use Two-Factor or Multi-Factor Authentication

                  Two-factor or multi-factor authentication is a service that inserts additional layers of security such as
                  OTP, fingerprint, etc., other than the standard username & password method of online identification.






                             Let’s BaCk-uP


                     ·   Cyber threat is a possibility of a malicious attempt or an offensive action to steal, damage
                        or disrupt a computer information systems, infrastructures, computer networks or personal
                        computer devices, using various computer programs.
                     ·   ‘Identity Protection’ refers to safety practices to prevent the theft of personal information
                        such as social media profiles, bank details, address, credit card, passports, driving licenses,
                        etc., by other person.
                     ·    Spam refers to an unwanted and unsolicited message which is received in the inbox of a
                        person’s e-mail account or in newsgroups.
                     ·    Spoofing is the act of disguising communication from an unknown source as being from a
                        known and trusted source.
                     ·    Phishing attacks are the social-engineering practice of sending fraudulent communications
                        that appear to come from an authentic source.
                     ·    A password can be termed as a key of codes that protects our valuable contents, documents
                        or files.














                  28    Premium Edition-VIII
   25   26   27   28   29   30   31   32   33   34   35