Essentials of Cyber Security

Raji Rai
5 min readOct 16, 2019
Cyber Security

Earlier cyber security was not of much concern. In the age of desktops and laptops, anti-virus software and firewall were the most commonly used tools to protect computers from virus attacks. However, now in the era of smartphones and tablets, cyber security is not limited to just anti-virus software. Let’s explore some of the key aspects related to mobile device security.

Mobile phones have become inseparable to humans. Earlier they were only used to make calls but now they hold the key to all our daily activities. From buying grocery, to booking cabs, to ordering food, everything is done via mobile devices. That’s the impact of internet and 4G network. Mobile applications are ruling and why not? They are making life easy. With the tap of a button we have everything at our doorstep. Most finance transactions are also carried out in phones. With so much riding on mobile devices, security of mobile data has become very crucial. Our mobile devices store all personal data such as photos, videos, access to some of the important applications such as Amazon and PayTm.

Mobile devices are easily prone to thefts. Hence, one of the most important point to remember is to take frequent backup of all the required data. Mobile phones are susceptible to virus attack too. Attachments and downloads are some of the common carriers of viruses. Since mobile devices use Wi-Fi, malware i.e malicious software can hack the device whilst using uncertain Wi-Fi networks. Here are some key aspects to remain cyber safe that is applicable to PC and mobile devices:

Strong Password: Setup strong passwords that is a combination of alphabets, numbers, and special characters. Since mobile devices can be accessed via patterns, setup difficult patterns that cannot be easily impersonated. Frequently, say once in 6 months change passwords. Keep different passwords for different applications. This will prove a savior if one of your account is hacked, as the hacker may try to use the same password to break into your other accounts.

Licensed Software: Install always licensed software in all your devices. This will help in providing timely updates and protect your system from unsolicited cyber attack. Keep your Operating System up-to-date. In mobile devices always download applications from reliable resources such as the Apple’s iOS app store and Google’s play store if you have android phone.

Secure Wi-Fi: Always verify the network you access in public. Do not blindly log into free Wi-Fi specially those that do not require password. Never do financial transactions in your mobile devices and access sensitive information while connected to public network. Do not create hotspot in public areas without having a strong password. Cyber criminals can easily hack your device through untrusted networks. Log out of all applications including email accounts when accessing from public networks and public systems.

VPN: Virtual Private Network (VPN) acts as a barrier between browser and server. VPN encrypts your data, masks your IP address and hides your online activity. However, it does not protect from virus and malware attack. The VPN service provider has to be a trusted source. VPNs are not just restricted to companies. Individuals also can install VPN in their PC or mobile devices. It will provide enhanced security when connected to public Wi-Fi.

Anti-virus and Firewall: Anti-virus removes corrupt files through detection by isolating or deleting them whereas a Firewall protects malicious information from entering the system. Both are very important for protecting your system from harmful malware and hackers. Always keep the firewall enabled so that traffic from various sources are constantly monitored. Use latest version of anti-virus software as it will keep the system safe from any malicious attacks. There are good anti-virus software available for mobile devices as well.

HTTPS: Hyper Text Transfer Protocol Secure (HTTPS), is a protocol for securing the communication between browser and the web server. Check always to see if the web address begins with https: whenever you sign in online. This means the connection between the browser (client) and server is secure and encrypted. This is particularly important when users transmit sensitive data, such as by logging into a bank account or email service. HTTPS increases the data transfer speed and prevents hackers from unsolicited access to your data. It makes internet safe for users.

Browser and Application Security: A secure browser protects your privacy and keeps your data safe. Ensure to always logout of all accounts and do not store passwords in the browsers. Set up suitable security and privacy settings within the browser. Block advertisements that appear in most websites. Ads function as advanced tracking and data collection tools for advertising networks. Do not download any applications from sources, which are not reliable. A macro virus is a computer virus written in the same macro language used for software programs such as Microsoft Excel and Word. Macro virus infects software applications. Hence, it is essential to disable macros to avoid malicious code from affecting your files.

Apart from these, few other pointers to keep in mind for safe browsing are:

· Always select forget network option after using public Wi-Fi.

· Turn off automatic connection for connecting to Wi-Fi network.

· Use your phone as a hotspot rather than connecting to free public network.

· Setup remote tracking and wiping in your mobile device.

· Do not save auto-fill information such as name, address and phone number in browsers.

· Never leave your computer or mobile devices without locking it.

· Always format/scan the removable devices.

· Never keep sensitive information on disks.

· Scan internet downloads and attachments.

· Do not share current/live locations in social media.

· Secure your personal profile details, photos, and videos in social media with high privacy settings.

Social Media

In this digital age cyber security is critical. Being aware of the risks involved in the world wide web that will infringe your privacy, and rob your peace of mind will help you in taking necessary precautions to remain cyber safe. About 90% of security safeguards rely on the computer user i.e YOU to adhere to good computing practices and remaining 10% is based on technical glitches.

--

--