Security Tips

Stay Secure Stay Informed

Stay Alert, Stay Safe

Never click on suspicious links or attachments in emails

Cyber Awareness

Essential tips and guidance for staying safe online.

Cybersecurity Guidance

Expert-recommended measures to protect your data and privacy.

Awareness Tips

Other Cyber Crime

National Cyber Crime & Security Tips Ideas

1 Do not close the browser window without logging out of the account.
2 Use 2-step verification such as one-time password (OTP) while using someone else’s computer.
3 Do not save your username and password in the web browser.
4 Register your mobile number with social networking sites to get alerts in the event of unauthorized access.
5 Permanently delete all documents downloaded on computers in cybercafé.
1 Never provide details or copy of identity proofs (e.g. PAN Card, Aadhaar Card, Voter Card, Driving License, Address Proof) to unknown person/organization.
2 Be careful while using identity proofs at suspicious places.
3 Do not share sensitive personal information (like Date of Birth, Birth Place, Family Details, Address, Phone Number) on public platforms.
4 Always strike out the photo copy of the identity proof; write the purpose of its usage overlapping the photo copy. This way, it becomes difficult to reuse the photo copy.
5 Do not leave your credit, debit or ATM card receipts behind, in places such as a bank/ATM or a store; never throw them away in public.
1 Always ensure that credit/debit card swipes at shopping malls, petrol pumps, etc. are done in your presence. Do not allow the sales person to take your card away to swipe for the transaction.
2 Look out for credit/debit card skimmers anywhere you swipe your card, especially at petrol pumps, ATMs etc.
3 If you notice a credit/debit card reader that protrudes outside the face of the rest of the machine, it may be a skimmer.
4 Never share your PIN with anybody, however close they might be.
1 Do not respond to messages from unknown source requesting personal or financial details even if it assures credit of money into your bank account.
2 Do not respond to suspicious e-mails or click on suspicious links.
3 Do not transfer money to any un-trusted unknown account.
4 Remember you can never win a lottery if you have not participated in it.
5 Always verify the correctness of the domain of the e-mail ID, for example, all government websites have “.gov.in” or “.nic.in” as part of their web address.
6 Have proper spam filters enabled in your e-mail account.
1 Do not get petrified if you receive a call stating that your card is blocked. Bank will never convey such information on call.
2 Do not share your PIN, password, card number, CVV number, OTP etc. with any stranger, even if he/she claims to be a bank employee. Bank will never ask for any vital information.
3 Keep your bank’s customer care number handy so that you can report any suspicious or un-authorized transactions on your account immediately.
1 Always search and apply for jobs posted on authentic job portals, newspapers etc.
2 Check if the domain of the e-mail is the same as the one you have applied with. For example, all government websites have “.gov.in” or “.nic.in” as domain.
3 If an e-mail has spelling, grammatical and punctuation errors, it could be a scam.
4 Beware of the fake calls/e-mails impersonating themselves as recruiters and requesting for personal information or money.
1 Restrict access to your profile. Social media sites offer privacy settings to manage who can view your posts, photos, and send you friend requests.
2 Ensure your personal information, photos, and videos are accessible only to your trusted contacts.
3 Be careful while uploading photos that reveal your location or places you frequently visit, as cyber stalkers may track your daily activities.
1 Make your children aware that cyber bullying is a punishable crime, so they neither indulge in it nor allow others to tease them.
2 Discuss safe internet practices with your friends and family regularly.
3 Monitor your kid’s activity on the internet/social media. Enable parental controls on computers and mobile devices.
4 Encourage children or students to help friends who are victims of cyber bullying and report the matter to parents or teachers immediately.
5 Do not delete offensive messages, as they can help the police in investigation.
1 Always install mobile applications from official application stores or trusted sources.
2 Scrutinize all permission requests thoroughly, especially those involving privileged access. For example, a photo app may not need microphone access.
3 Regularly update software and mobile applications to ensure there are no security gaps.
4 Beware of malicious apps or updates. Clear all data related to the malicious app and uninstall it immediately.
1 Never share your mobile unlocking PIN or passwords with anyone.
2 Register your personal phone number and e-mail with your bank and subscribe to notifications for transactions and login attempts.
3 Always review transaction alerts received on your registered mobile number and reconcile with your purchases.
4 Always set a maximum transaction limit for your bank account.
5 Secure your apps with strong passwords and 2-step verification (OTP), even for transactions below your maximum limit.
6 Uninstall any compromised or malicious application immediately.
1 Set your passwords to be at least 8 characters long.
2 Make the passwords stronger by combining letters, numbers and special characters.
3 Use a different password for each of your accounts and devices.
4 Use 2-step verification (such as OTP) whenever possible.
5 If one of your online accounts has been hacked, immediately change the password to a strong, unique password.
6 Do not share your passwords/PIN with anyone.
7 Do not save your usernames and passwords in the web browser.
1 Set your passwords to be at least 8 characters long.
2 Make the passwords stronger by combining letters, numbers and special characters.
3 Use a different password for each of your accounts and devices.
4 Use 2-step verification (such as OTP) whenever possible.
5 If one of your online accounts has been hacked, immediately change the password to a strong, unique password.
6 Do not share your passwords/PIN with anyone.
7 Do not save your usernames and passwords in the web browser.
1 Computers/Laptops should have a firewall and anti-virus installed, enabled and running the latest version.
2 Always scan external devices (e.g. USB) for viruses, while connecting to the computer.
3 Always keep the “Bluetooth” connection in an invisible mode, unless you need to access file transfers on your mobile phone or laptops.
4 Before disposing of computers or mobile devices, be sure they are wiped of any personal information. For mobile devices, this can be done by selecting the option for a secure reset/factory reset of the device.
1 Never download or install pirated software, applications etc. on your computer, laptops or hand-held devices. It is not only illegal but also increases your vulnerability to potential cyber threats.
2 Do not click on the URL/links provided in suspicious e-mails/SMS even if they look genuine as this may lead you to malicious websites. This may be an attempt to steal money or personal information.
3 Always check “https” appears in the website’s address bar before making an online transaction. The “s” stands for “secure” and indicates that the communication with the webpage is encrypted.
1 Always use genuine software and applications to avoid potential security lapses. Genuine software gets regular updates to protect your data from new cyber threats.
2 Never download or install pirated software, applications etc. on your computer, laptops or hand-held devices. It is not only illegal but also increases your vulnerability to potential cyber threats.
3 Always read the terms and conditions before installation of any application.
1 Always keep your system software and applications updated to prevent hackers from exploiting known vulnerabilities.
2 Never open suspicious attachments or click unknown links in emails/messages as they may contain malware used by hackers.
3 Use a strong and unique password for each account and enable 2-step verification to add an extra layer of security.
4 Regularly back up important data to a secure location to protect against data loss in case of hacking attempts or ransomware attacks.
Regular Cyber Crimes
Hacking: Jab koi unauthorized person kisi computer ya network ko access karta hai aur data churaata hai ya system ko damage karta hai.
Phishing: Fraudulent emails ya websites ke zariye sensitive information (jaise passwords, bank details) churaana.
Malware: Aise harmful software (viruses, worms, Trojans) jo aapke system ko damage karte hain ya control le lete hain.
Identity Theft: Kisi aur ki personal information churaakar uske naam par fraud ya illegal activity karna.
Cyber Stalking: Online platforms par kisi ko baar-baar harass karna ya usse dar aur pareshani ka samna karwana.
Spam: Unwanted emails ya messages bhejna, jo aksar advertisements ya scams hote hain.
Denial of Service (DoS): Kisi server ya network ko itna overload kar dena ki wo down ho jaaye aur genuine users ko access na mile.
Online Fraud: Fake schemes ya websites ke zariye logon ko dhokha dena aur unse paise churaana.
Ransomware: Malware jo kisi computer ya data ko lock kar leta hai aur ransom (paise) mangta hai data ko unlock karne ke liye.
Cryptojacking: Jab cybercriminals bina aapki permission ke aapke device ko cryptocurrency mine karne ke liye use karte hain.
Deepfake: AI ka use karke fake videos ya audios banaye jaate hain jisse aapki image ya reputation ko damage kiya ja sakta hai.
SIM Swapping: Jab hackers aapka mobile number hijack kar lete hain aur aapke accounts ya personal details ko access kar lete hain.
IoT Hacking: Internet-connected devices (smartphones, cameras, etc.) ko hack karna aur unse data churaana ya unko damage karna.
Social Engineering Attacks: Logon ko trick karna aur unse personal information ya sensitive data churaana, jaise fake phone calls ya emails ke through.
Business Email Compromise (BEC): Jab hackers aapke company ke emails ko hack karte hain aur employees se paise transfer karwane ki koshish karte hain.
NFT Scams: Fake NFTs banakar logon se paise churaana.
Metaverse Scams: Virtual worlds mein fraud karna, jaise fake investments ya transactions ke through logon ka paisa churaana.
Web3 & DeFi Attacks: Decentralized finance platforms ko hack karna aur logon se paisa churaana.
Flash Loan Attacks: DeFi platforms mein short-term loans ka misuse karke price manipulation ya unauthorized transactions karna.
AI-Powered Phishing: AI ka use karke phishing attacks ko smarter aur personalized banana, jisse log easily trap ho jaate hain.
Cloud Security Breaches: Cloud services ki vulnerabilities ko exploit karke sensitive data churaana.
Cyber Extortion (Doxxing & Swatting): Doxxing mein kisi ki personal information online post kar dena aur swatting mein fake emergency call karna taaki police ko victim ke ghar bheja ja sake.