• Enforce Multi-Factor Authentication (MFA) for all accounts.
• Use strong, unique passwords and change them periodically.
• Disable unnecessary accounts and limit privileged access.
Best Cybersecurity Practices During Geopolitical Conflicts
0/6
Types of Suspicious Links to Watch For:
0/5
What to Do:
• Hover over any link before clicking; check the domain.
• Avoid .apk, .exe, .zip, .pdf, .mp4 downloads unless verified.
• Report suspicious sites to CERT-In: https://www.cert-in.org.in
0/10
