• Use firewalls, intrusion detection/prevention systems (IDS/IPS), and EDR tools.
• Limit remote access using secure VPNs with strict authentication.
• Segment networks to contain breaches.
Best Cybersecurity Practices During Geopolitical Conflicts
0/6
Types of Suspicious Links to Watch For:
0/5
What to Do:
• Hover over any link before clicking; check the domain.
• Avoid .apk, .exe, .zip, .pdf, .mp4 downloads unless verified.
• Report suspicious sites to CERT-In: https://www.cert-in.org.in
0/10
