Page 12 - Jignyasa-June 2020
P. 12

11.  Invest in a laptop lock (e.g. anchor  20.  Never  post  personal  info  (e.g.
                  lock  or  laptop  cable  lock)                     mobile number, home address, age,
                                                                     location,  name  of  your  college  etc.)
            12.  Install  laptop  tracking  software  (e.g.          on a social media site. This category
                  Lojak).
                                                                     includes photos that could identify
            13.  Encrypt  your  laptop  and  do  not  keep           your location (e.g. college, home,
                  personal info (UID, PAN, passwords,                vacation address, etc.) or too many
                  etc.)  stored in  files. Encryption                of  your  interests.
                  software  like  BitLocker  (for  Windows     21.  Check the security settings in your
                  10)  and  FileVault  (for  Mac  OS  X              social  media  account  –  make  them  a
                  Lion) provides added security for                  high  priority.
                  your  files.
                                                               22.  Do  not  accept  random  friends  on
            14.  Backup  your  files  on  a  remote  hard            social media, if you already  have
                  drive  and  a  trusted  Cloud  provider            random  friends,  monitor  them  now.
                  so  you  have  the  option  to  erase  your
                  laptop  remotely.                            23.  Do  not  advertise  when  you  are  going
                                                                     to  be  away  from  home.
            15.  Phone screen-lock should have at
                  least  a  6  digit  pin  and  enable  “find  24.  Disable  microphone  and  location
                  my  phone”  if  it is stolen.                      services  access  where  not  needed.
                                                                     In fact, it’s a good practice to reset
            16.  Never  store  private  info  under                  all  permissions  every once  in a while
                  Contacts  (e.g.  security  codes,  bank            and let all the applications you use
                  pins, financial account numbers,                   ask  for  the  permissions  afresh.
                  passwords,  etc.).
                                                               25.  Remember  that  everything  on  social
            17.  Movies, music, games, cracked                       media  has  the  capacity  to  be  shared.
                  softwares  and  copied  eBooks  are
                  prime  digital  bait  for  hackers.  26.  Do  not  click  on  suspicious  links  in
                  Sorry,  you  don’t  visit  torrent sites           text  messages.  Always a good  idea
                  if  you  want  to keep  your  personal             to access (copy & paste) the link
                  and financial info safe. Let’s not                 from  a  browser.
                  forget  copyright  violation,  which
                  is  a  separate  crime  in  itself.  (Ref.   27.  Always  make  sure  your  computer
                                                                     &  mobile  software  is  fully  up  to
                  since you are students of law and
                  commerce, it would be great  to just               date. Enable automatic updates or
                  look up various copyright violations               go  to  the  software  vendor’s  website
                  and  their  consequences  that  are                directly.
                  applicable  when  dealing  with  movies,  28.  Shut  down  and  restart  your  computer
                  music,  games,  cracked  softwares,                at  least  once  a  week  (i.e.  Do  not  put
                  copied  eBooks,  etc.)                             it in sleep mode all the time because

            18.  DON’T be tricked into giving away                   it’s  convenient)  to  check  for  security
                  confidential  information.  DON’T                  updates.
                  respond  to  phone  calls  or  emails  29.  Beware  of  malware  and  ransomware
                  requesting  confidential  data.                    “updates”  that  pretend  to  be
                                                                     legitimate.  Do  not  install  updates
            19.  DON’T leave WiFi or Bluetooth turned
                  on when not in use. Only do so                     from  untrusted  sources.
                  when planning to use and only in a  30.  Invest  in  strong  virus  &  spyware
                  safe  environment.                                 protection,  even  if  you  own  a  Mac.




                                                             12               Learning  Today  …  Leading  Tomorrow
   7   8   9   10   11   12   13   14   15   16   17