• Secure endpoints and mobile devices (use MDM/EMM solutions).
• Restrict USB access where not needed.
• Monitor for physical intrusion attempts or tampering.
Best Cybersecurity Practices During Geopolitical Conflicts
0/6
Types of Suspicious Links to Watch For:
0/5
What to Do:
• Hover over any link before clicking; check the domain.
• Avoid .apk, .exe, .zip, .pdf, .mp4 downloads unless verified.
• Report suspicious sites to CERT-In: https://www.cert-in.org.in
0/10
