{"id":141,"date":"2018-03-30T09:10:28","date_gmt":"2018-03-30T09:10:28","guid":{"rendered":"http:\/\/www.techandtrain.in\/blog\/?p=141"},"modified":"2025-10-22T14:55:34","modified_gmt":"2025-10-22T09:25:34","slug":"information-security-tips-while-working-with-digital-sources-and-internet","status":"publish","type":"post","link":"https:\/\/www.techandtrain.com\/blog\/2018\/03\/information-security-tips-while-working-with-digital-sources-and-internet\/","title":{"rendered":"Information security tips while working with digital sources and internet"},"content":{"rendered":"<ul>\n<li>Setup OTP and recovery emails for all your accounts<\/li>\n<li>Check permissions that various apps have on your phone<\/li>\n<li>When you get an option &#8211; TRUST THIS DEVICE in Gmail or similar accounts, only select this option on your personal devices not public devices<\/li>\n<li>Keep your desktop, laptop &amp; mobiles password protected &amp; encrypted if possible<\/li>\n<li>Use standard Anti-Virus like McAfee, Windows Defender, Symantec, Norton, etc. Note: Android phones also have anti-virus<\/li>\n<li>Explore and use a good VPN service<\/li>\n<li>Go to your ACCOUNT settings regularly in Linkedin, Facebook, Gmail, etc. and see the logged in sessions (Who is using your account) and check which apps are integrated with your account, what information they are taking out \u2013 typically they take your friend\u2019s list \/ relatives, age, email, phone number, etc.<\/li>\n<li>Learn to backup your data in Cloud or external Hard Disk or both<\/li>\n<li>Setup locate your phone, remote wipe, virus scan, link check, capture pic on wrong password attempts, etc. especially on Android via Anti-Virus or other means.<\/li>\n<li>Update your devices across laptop, desktop and mobiles regularly using the official update process<\/li>\n<li>Do not root your mobile devices<\/li>\n<li>In Android don\u2019t switch on the feature to TRUST UNKNOWN APPS to install APKs. Always install APPs from Android Play Store and Apple App Store only<\/li>\n<li>Keep Bluetooth, WIFI, NFC off when not in use<\/li>\n<li>When you leave your home switch off your WIFI<\/li>\n<li>Change your passwords of WIFI, emails, accounts once in 6 months at-least. Your WIFI at home via router should be on encrypted network not non-encrypted, check the ADMIN page. Change the ADMIN password of your router at home, mostly many don\u2019t change the username\/password from admin\/admin which is an easy entry point for wrong use. Update your router software also regularly via the official update option<\/li>\n<li>For storing your passwords either use a diary \/ notebook OR there are encrypted software like password managers \/ wallets which store your passwords safely as an APP in your mobile \u2013 use them. See their ratings in PLAY STORE \/ APP STORE and then install or use. Don\u2019t store passwords in plain text on computer or mobile.<\/li>\n<li>Don\u2019t keep same passwords across all your accounts \u2013 if you do so and one gets compromised all others get compromised<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Setup OTP and recovery emails for all your accounts Check permissions that various apps have on your phone When you [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":194,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[40,39],"tags":[],"class_list":["post-141","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-software-security"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/03\/Security.png?fit=991%2C720&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7do02-2h","jetpack-related-posts":[{"id":297,"url":"https:\/\/www.techandtrain.com\/blog\/2018\/06\/facebook-privacy-security-tips\/","url_meta":{"origin":141,"position":0},"title":"Facebook Privacy &#038; Security tips","author":"Neil Harwani","date":"June 24, 2018","format":false,"excerpt":"Many of us use Facebook for various reasons like socializing on the internet, managing and participating in groups, creating and managing company pages, keeping in touch with friends and colleagues, sharing our updates & pictures, etc. But many don't pay attention to privacy and security aspects of using Facebook. Here\u2026","rel":"","context":"In &quot;Social Media&quot;","block_context":{"text":"Social Media","link":"https:\/\/www.techandtrain.com\/blog\/category\/social-media\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/06\/Facebook.jpg?fit=1200%2C797&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/06\/Facebook.jpg?fit=1200%2C797&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/06\/Facebook.jpg?fit=1200%2C797&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/06\/Facebook.jpg?fit=1200%2C797&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/06\/Facebook.jpg?fit=1200%2C797&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":950,"url":"https:\/\/www.techandtrain.com\/blog\/2022\/08\/cyber-security-keywords-concepts-part-1\/","url_meta":{"origin":141,"position":1},"title":"Cyber Security Keywords &#038; Concepts &#8211; Part 1","author":"Neil Harwani","date":"August 28, 2022","format":false,"excerpt":"Here is a list of keywords & concepts in Cyber Security that technology professionals should be aware of. This is part 1 of the series. CSPXSSISO 27001OWASPEncoding \/ decodingEncryption and it's typesCSRFCORSHashingAuthenticationAuthorizationIAMSSOSAMLOAuthTokensHTTPS \/ SSLDOS \/ DDOSBackdoorMalwareSecure codingThreats, Vulnerabilities, Controls & MitigationVAPTSocial EngineeringSpoofingProxy serversPhishingSQL injectionBuffer overflowViruses, Worms, Keyloggers, SpywaresIdentity theftRootKitsZero DayVPN\u2026","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-security\/"},"img":{"alt_text":"Credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":622,"url":"https:\/\/www.techandtrain.com\/blog\/2020\/07\/best-practices-for-low-code-development\/","url_meta":{"origin":141,"position":2},"title":"Best practices for low code development","author":"Neil Harwani","date":"July 2, 2020","format":false,"excerpt":"Best practices for low code development: Finalize the domain \/ entity model earlyCheck the capabilities of platform before writing code for any featureLearn XPathTry to have daily builds, daily demos, daily development goals with short sprints - comes from agile worldLearn to use the CI\/CD and Code management tools of\u2026","rel":"","context":"In &quot;Low Code&quot;","block_context":{"text":"Low Code","link":"https:\/\/www.techandtrain.com\/blog\/category\/low-code\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2020\/07\/Code.jpg?fit=960%2C540&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2020\/07\/Code.jpg?fit=960%2C540&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2020\/07\/Code.jpg?fit=960%2C540&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2020\/07\/Code.jpg?fit=960%2C540&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":458,"url":"https:\/\/www.techandtrain.com\/blog\/2019\/06\/my-journey-on-social-media-internet\/","url_meta":{"origin":141,"position":3},"title":"My journey on Social Media &#038; Internet","author":"Neil Harwani","date":"June 6, 2019","format":false,"excerpt":"Internet is the greatest enabler of work and education in human history as per me and the opportunities it opens up in terms of what we can study, learn and work on are amazing. My suggestion to all youngsters in school, college and who recently have started their career in\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/www.techandtrain.com\/blog\/category\/internet\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2019\/06\/Human-Observer-1.jpg?fit=960%2C503&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2019\/06\/Human-Observer-1.jpg?fit=960%2C503&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2019\/06\/Human-Observer-1.jpg?fit=960%2C503&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2019\/06\/Human-Observer-1.jpg?fit=960%2C503&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":271,"url":"https:\/\/www.techandtrain.com\/blog\/2018\/06\/security-tips-for-google-drive-android\/","url_meta":{"origin":141,"position":4},"title":"Security tips for Google Drive &#038; Android","author":"Neil Harwani","date":"June 16, 2018","format":false,"excerpt":"Google Drive: Open Google Drive on web based browser like Chrome On each of the folders if you see a person symbol it's shared, if you don't see the symbol its not shared For each folder -> click SHARE -> Advanced -> Check which user has view rights and which\u2026","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/06\/Data-Sharing.jpg?fit=1200%2C878&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/06\/Data-Sharing.jpg?fit=1200%2C878&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/06\/Data-Sharing.jpg?fit=1200%2C878&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/06\/Data-Sharing.jpg?fit=1200%2C878&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/06\/Data-Sharing.jpg?fit=1200%2C878&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":64,"url":"https:\/\/www.techandtrain.com\/blog\/2016\/01\/reasonably-right-decisions-humanoid-framework-for-ai\/","url_meta":{"origin":141,"position":5},"title":"Reasonably right decisions &#8211; Humanoid framework for AI","author":"Neil Harwani","date":"January 24, 2016","format":false,"excerpt":"I have a perplexing philosophical question. Currently by using our intelligence and common sense we are able to reach reasonable security.\u00a0Buy authentic, check promoters\/owners, check architecture, feedback, surf, read, sites, notes, work, code, etc, this gets us to a reasonably right decision. But technology is exploding. Beyond a point of\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2016\/01\/Human.jpg?fit=1200%2C900&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2016\/01\/Human.jpg?fit=1200%2C900&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2016\/01\/Human.jpg?fit=1200%2C900&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2016\/01\/Human.jpg?fit=1200%2C900&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2016\/01\/Human.jpg?fit=1200%2C900&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":2,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/141\/revisions"}],"predecessor-version":[{"id":305,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/141\/revisions\/305"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media\/194"}],"wp:attachment":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media?parent=141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/categories?post=141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/tags?post=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}