Protect your valuable data
December 8, 2025
  • Read Ecopy
  • Circulation
  • Advertise
  • Careers
  • About Us
  • Contact Us
Android AppiPhone AppArattai
Organiser
  • ‌
  • Bharat
    • Assam
    • Bihar
    • Chhattisgarh
    • Jharkhand
    • Maharashtra
    • View All States
  • World
    • Asia
    • Europe
    • North America
    • South America
    • Africa
    • Australia
  • Editorial
  • International
  • Opinion
  • RSS @ 100
  • More
    • Op Sindoor
    • Analysis
    • Sports
    • Defence
    • Politics
    • Business
    • Economy
    • Culture
    • Special Report
    • Sci & Tech
    • Entertainment
    • G20
    • Azadi Ka Amrit Mahotsav
    • Vocal4Local
    • Web Stories
    • Education
    • Employment
    • Books
    • Interviews
    • Travel
    • Law
    • Health
    • Obituary
  • Subscribe
    • Subscribe Print Edition
    • Subscribe Ecopy
    • Read Ecopy
  • ‌
  • Bharat
    • Assam
    • Bihar
    • Chhattisgarh
    • Jharkhand
    • Maharashtra
    • View All States
  • World
    • Asia
    • Europe
    • North America
    • South America
    • Africa
    • Australia
  • Editorial
  • International
  • Opinion
  • RSS @ 100
  • More
    • Op Sindoor
    • Analysis
    • Sports
    • Defence
    • Politics
    • Business
    • Economy
    • Culture
    • Special Report
    • Sci & Tech
    • Entertainment
    • G20
    • Azadi Ka Amrit Mahotsav
    • Vocal4Local
    • Web Stories
    • Education
    • Employment
    • Books
    • Interviews
    • Travel
    • Law
    • Health
    • Obituary
  • Subscribe
    • Subscribe Print Edition
    • Subscribe Ecopy
    • Read Ecopy
Organiser
  • Home
  • Bharat
  • World
  • Operation Sindoor
  • Editorial
  • Analysis
  • Opinion
  • Culture
  • Defence
  • International Edition
  • RSS @ 100
  • Magazine
  • Read Ecopy
Home General

Protect your valuable data

Archive ManagerArchive Manager
Jul 15, 2012, 12:00 am IST
in General
Follow on Google News
FacebookTwitterWhatsAppTelegramEmail

Anoop Verma

Losing your smartphone or pen drive not only raises the sceptre of having to spend your earned money in buying a new device, it can also entail loss of valuable data. A smartphone or a pen drive is typically the repository of all kinds of valuable data, including your contacts, your schedule, your to-do lists, your passwords, important files and much else. Even if you have backed up your data in the cloud space, you are not completely safe. Hackers are increasingly targeting the data being digitally stored in servers around the world. You could fall prey to identity theft, leading to depletion of your bank accounts and credit cards.

Here are some tips to ensure safety from hackers and scammers:

Encrypt Your Data

There is lot of talk about encryption, but hardly anyone goes to the extent of actually doing it. You can find good data encryption software, for systems running Windows 7/Vista/XP, Mac OS X, and Linux, from True Crypt (http://www.truecrypt.org). The system out here can be used to encrypt an entire partition or storage device such as USB flash drive or portable hard drive. Encrypting your data ensures that if someone gets hold of your pen drive or external drive, he won’t be able to simply plug and play. 

Take care of your smartphone

The first thing you need to do is place a screen-lock password on your smartphone. If you are using an iPhone, you should ensure that it is not jailbroken. Once you Jailbreak the device, you throw away your security advantage. While installing new apps in iOS or in Android, you should ensure that you are picking up apps from verified publishers, and you should avoid providing unnecessary permissions for access to your personal data. You can also invest in mobile security software, such as Trend Micro Mobile Security.

Two Factor Authentication

Even if you have encrypted your files, you can still fall prey to hackers if someone is able to sniff out the password while it is being sent over the Internet. This usually happens when you are surfing on insecure wireless networks in places like coffee shops. As soon as you log into a website that is not using “https” in the address bar, you expose yourself to a hacker, who might be sniffing around on the WiFi network. So you should avoid doing any work with sensitive data at insecure networks. Or you can go in for the system of two-step verification. No one can access your data, as your account can only be accessed through a 6-digit code that is generated every 30 seconds and can only be seen on your smartphone.

Anti-virus Software

Keep your computer systems updated with latest anti-virus software. For Windows users Microsoft Security Essentials is a good option. The anti-virus can be downloaded for free and it does a very good job of detecting spyware, viruses and malaware.

Hide data in image files

For really crucial data, you could start using the system of hiding the data in image files. Online utilities like http://www.zamzar.com/ give us an easy way of transforming files into different formats. Zamzar automatically converts each page into it’s own PNG picture file.

Secure your network

You need to take into account the security of the network that you are using for communication with the outside world. Is it using WEP or WPA or WPA2? The Wireless Protected Access (WPA) protocol and more recent WPA2 have supplanted the older and less-secure Wireless Encryption Protocol (WEP). As encryption key, you should use a strong password, preferably a combination of numbers and digits.

Backup your data early and often

You have to recognise the fact that even the best measures that you undertake might not be enough to safeguard your data. The risk is not only from hackers; you could also lose data due to accidental loss or breakage of device or due to system crash. So it is necessary to have back up. The number of times that you take a backup should depend on the quantum of data that you can afford to lose if your system crashes completely.

ShareTweetSendShareSend
✮ Subscribe Organiser YouTube Channel. ✮
✮ Join Organiser's WhatsApp channel for Nationalist views beyond the news. ✮
Previous News

Exploring climate patterns in Asia Pacific

Next News

Protect Nature to Protect Humans

Related News

Representative Image

A Song that Stirred Freedom—Why is Vande Mataram questioned today?

Madhya Pradesh: 10 Maoists including KB division’s most wanted commander Kabir surrender in Balaghat

Representative Image

150 Years of Vande Mataram: Know all about the ban imposed by Nizam’s ban, students’ revolt

Representative Image

Pakistan slipping into authoritarian rule, lawyers of the country warn

Representative Image

China-Japan face-off escalates across Indo-Pacific: An emerging threat to the peace & security of the maritime domain

Defence Minister Rajnath Singh(File Photo)

Defence Minister unveils Galwan War Memorial; Hails border connectivity as key to success in Operation Sindoor

Load More

Comments

The comments posted here/below/in the given space are not on behalf of Organiser. The person posting the comment will be in sole ownership of its responsibility. According to the central government's IT rules, obscene or offensive statement made against a person, religion, community or nation is a punishable offense, and legal action would be taken against people who indulge in such activities.

Latest News

Representative Image

A Song that Stirred Freedom—Why is Vande Mataram questioned today?

Madhya Pradesh: 10 Maoists including KB division’s most wanted commander Kabir surrender in Balaghat

Representative Image

150 Years of Vande Mataram: Know all about the ban imposed by Nizam’s ban, students’ revolt

Representative Image

Pakistan slipping into authoritarian rule, lawyers of the country warn

Representative Image

China-Japan face-off escalates across Indo-Pacific: An emerging threat to the peace & security of the maritime domain

Defence Minister Rajnath Singh(File Photo)

Defence Minister unveils Galwan War Memorial; Hails border connectivity as key to success in Operation Sindoor

UMEED Portal

UMEED Portal deadline ends: Logs 5.17 lakh Waqf properties, with 2.16 lakh approved, 2.13 lakh pending, 10,869 rejected

R. Sreelekha IPS (Retd.)

Kerala: Interview with R. Sreelekha IPS (Retd.) — BJP’s Thiruvananthapuram Municipal Corporation Candidate

How Nehru Torpedoed Vande Mataram: The Untold Story

Bangladeshi army officer and senior BNP leader Col Abdul Haque

A former Bangladeshi army officer & BNP leader urges youth to get army training to sever Northeast from India

Load More
  • Privacy
  • Terms
  • Cookie Policy
  • Refund and Cancellation
  • Delivery and Shipping

© Bharat Prakashan (Delhi) Limited.
Tech-enabled by Ananthapuri Technologies

  • Home
  • Search Organiser
  • Bharat
    • Assam
    • Bihar
    • Chhattisgarh
    • Jharkhand
    • Maharashtra
    • View All States
  • World
    • Asia
    • Africa
    • North America
    • South America
    • Europe
    • Australia
  • Editorial
  • Operation Sindoor
  • Opinion
  • Analysis
  • Defence
  • Culture
  • Sports
  • Business
  • RSS @ 100
  • Entertainment
  • More ..
    • Sci & Tech
    • Vocal4Local
    • Special Report
    • Education
    • Employment
    • Books
    • Interviews
    • Travel
    • Health
    • Politics
    • Law
    • Economy
    • Obituary
  • Subscribe Magazine
  • Read Ecopy
  • Advertise
  • Circulation
  • Careers
  • About Us
  • Contact Us
  • Policies & Terms
    • Privacy Policy
    • Cookie Policy
    • Refund and Cancellation
    • Terms of Use

© Bharat Prakashan (Delhi) Limited.
Tech-enabled by Ananthapuri Technologies