• last year
How secure are you and your organization from Cyber threats? Are your mobile devices really as protected, as you would like them to be? A breach can compromise your company data, erode confidence in your brand and result in lost productivity and financial loss. Decoding Cybersecurity Myths with Delhi Police

#Internet #DelhiPolice #Mythbusters
~HT.96~GR.124~

Category

🗞
News
Transcript
00:00 Public Wi-Fi networks are secure and safe to use
00:07 Public Wi-Fi networks are often unsecured, making it easier for hackers to intercept
00:12 data transmitted over these networks.
00:15 It's best to avoid accessing sensitive information, such as online banking or social media accounts,
00:21 when connected to public Wi-Fi.
00:24 Using a virtual private network, that is VPN, and ensuring websites are encrypted can add
00:29 an extra layer of security.
00:31 If I delete something from my device, it's gone forever.
00:35 Deleting something from your device does not necessarily mean it's gone forever.
00:39 Data can often be recovered using specialized software.
00:42 To ensure data privacy, use secure deletion methods or encryption tools when disposing
00:49 of devices or deleting sensitive information.
00:52 I don't have anything worth stealing, so I'm not a target.
00:56 Cyber criminals target everyone, personal information, financial data, or even using
01:02 your device in an attack on others can make you a target.
01:06 Cyber security threats only come from outside sources.
01:09 Cyber threats do not always come from outside.
01:13 On the contrary, they are mostly built on conquering the castles from within.
01:17 Of course, external threats should be carefully monitored and controlled.
01:22 But denying the existence of external threats is one of the biggest mistakes made.
01:26 We would recognize an attack.
01:28 Attacks are becoming more sophisticated and stealthy, making them difficult to identify.
01:36 Your system could be compromised for months before you realize it.
01:41 Scams and phishing are glaringly obvious.
01:44 Phishing schemes and scams are getting more and more intelligent and convincing nowadays.
01:49 Some pretend to withhold your sensitive information via webcam and threaten to release it.
01:57 Mainstream websites are safe to visit.
01:59 All of the big websites employ cookies to track your internet trajectory.
02:05 Despite the on-site safety, these companies that own the sites possess your data.
02:11 If any of these companies are hacked, your data is breached too.
02:16 Consequently, your data is not as safe with big websites either.
02:21 We will learn immediately if these systems are compromised.
02:25 Cyber attacks are better hidden.
02:28 It could be months or years until one finds out the computer is infected and breached.
02:34 Malware and other safety menaces are even more challenging to detect.
02:39 As cyber criminals evolve, the guarding shield must evolve to keep an eye on anything suspicious.
02:46 Hackers do not target small businesses.
02:49 Media coverage is mostly targeted at big organizations like Yahoo, Uber and Marriott.
02:56 This is a myth.
02:57 The mainstream news and facts show that hackers can probably make more money than these businesses.
03:07 But the Federation of Small Businesses has said that small businesses in Britain are targeted by more than 10,000 cyber attacks a day.
03:15 This report also highlights the weak security processes in small businesses.
03:22 These include a lack of medical password policies,
03:25 not installing updates and not using security software.
03:30 A basic anti-virus software will be sufficient to protect my business.
03:36 The days have passed when your MacAfe or Avast anti-virus software was sufficient to protect your business.
03:45 Now, there are tools available to fight ransomware.
03:51 A secure viewpoint for security, where all your tools communicate with each other, is generally considered the strongest.
04:01 Your endpoint, fireball, network connection, email and many more should be included in your security toolkit.
04:10 In addition, backup and backup-recoverable tools are recommended to reduce any possible incident.
04:19 We just need protection from hackers.
04:21 While hackers pose a big threat to your business,
04:26 you cannot ignore the possibility of malicious internal sources or even the incidents of employees.
04:35 One of the most popular attacks was the USB stick with sensitive data of a staff member of the ITRO airport.
04:45 Fortunately, the person who found it, handed it over to him without using it in a malicious way.
04:53 However, the company was fined £1,20,000 for serious failures in data security.
05:03 Zero balance in an account cannot be a fraud.
05:07 Let me tell you.
05:09 This year, a similar incident happened.
05:11 A woman had zero balance in her account.
05:15 Despite that, she was fined a lakh.
05:17 A woman booked a ticket from her account.
05:22 After that, she had to cancel the ticket for some reason.
05:25 When she checked her account, the money did not come back.
05:30 The woman took Google's help and made a phone call on a number.
05:36 This is where she made a big mistake.
05:39 She was sent a link and clicked on it.
05:43 As soon as she clicked on the link, her phone got cloned.
05:49 After that, she was fined around ₹3,00,000 from her other account.
05:53 Moreover, the credit card was taken out and a loan of lakhs was taken.
05:58 Now, it has become expensive to give information about an empty account to a woman.
06:04 My friends on social media won't hurt me.
06:07 Say, they send you a private message saying they found a funny new video or a cool new site you should check out.
06:15 Since the link is coming from a familiar place, your guard may be down.
06:20 After all, you are aware of phishing scams when you get a message from someone you never heard of.
06:26 But you don't have that on your mind when you hear from a friend.
06:31 Cyber security is essential in today's digital age to protect your personal and business information from various threats.
06:39 One of the most frequent reasons of cyber crime is when people unintentionally provide private information to a third party while using their personal devices for work-related tasks.
06:50 That's why you should always make a strong password.
06:53 Use the internet through secure Wi-Fi links.
06:56 Never click on unknown links.
06:59 Always keep your anti-virus and anti-malware software up to date.
07:03 Cyber security is an ongoing process.
07:05 So stay vigilant, stay proactive.
07:08 It is important that we keep ourselves aware of new threats technology.
07:13 Finally, we would like to thank Daily Hunt and One India for supporting us in this initiative to combat one of the growing threats to our personal security.
07:23 Jai Hind!
07:25 [MUSIC PLAYING]
07:28 you

Recommended