Skip to content
Cybersathhi
Menu
Home
About Us
Citizen Safety
Citizen Manual
Cyber Safety Tips
Cyber Awareness
Resources
Blogs
News
FAQs
Learning Corner
Advisories
Public Place Precautions
Training Resources
Get Help
Guides
Contact Us
Menu
Home
About Us
Citizen Safety
Citizen Manual
Cyber Safety Tips
Cyber Awareness
Resources
Blogs
News
FAQs
Learning Corner
Advisories
Public Place Precautions
Training Resources
Get Help
Guides
Contact Us
Advisories
Phishing Assaults
Dodge clicking on suspicious joins in emails or messages.
Continuously confirm the sender’s personality some time recently sharing individual data.
Utilize multi-factor confirmation (MFA) for included security.
Ransomware Dangers
Routinely back up imperative information to an outside drive or cloud capacity.
Don’t download program or connections from untrusted sources.
Keep your working framework and security computer program upgraded.
Online Extortion & Tricks
Be cautious of bargains that appear as well great to be genuine.
Never share OTPs, passwords, or keeping money subtle elements with anybody.
Confirm trade authenticity some time recently making online exchanges.
Social Media Security
Set solid, special passwords for all accounts.
Be careful of what you share online; cybercriminals may utilize it to target you.
Empower security settings to restrain profile perceivability.
Personality Burglary Anticipation
Screen your money related articulations and credit reports routinely.
Utilize secure installment strategies whereas shopping online.
Dodge sparing passwords or delicate information on shared/public gadgets.
Cyberbullying & Badgering
Report and square online bullies or harassers.
Never lock in in or react to cyberbullying messages.
Teach children and teenagers on secure online behavior.
IoT & Keen Gadget Security
Alter default passwords on IoT gadgets (keen cameras, speakers, etc.).
Cripple inaccessible get to in case not required.
Keep firmware and computer program overhauled frequently.
Corporate Cyber Security Best Hones
Conduct normal cybersecurity mindfulness preparing for representatives.
Actualize solid get to controls and confine touchy information get to.
Utilize endpoint security arrangements to ensure company systems.
To get more information please go to
cybercrime.gov.in