Image: Bryant PC Solutions

Recently, the government of Nepal has mandated the compulsory use of email in all the government workstation. The rule came up under a government directive entitled “Government entities email management directives 2075”. As there have been massive changes in the world of information communication and technology, this initiation by the government can play a significant role for all the service seekers.

Since it is very confident of the government, it can face some challenges and threats in the future. Emails are very sensitive as it includes lots of official data and information. The essential thing for email is protection and privacy. Hackers have grown immensely, who knows if the government email ID’s are their next target.

To avoid different kinds of challenges and threats we have prepared an essential security guide which might teach them of secure computer and online usage practices.

Create a secure and strong password
Creating a stable and robust password always lies at the top of the list. It is essential to put a strong password. While creating pass do not include only numbers or alphabets on it. Try to create a password that is composed of different alphabet numbers and symbols.   Passwords should always be involved and unguessable.

Record your password safely
You should never save or store your password in a place where there is easy access to other people. Do not turn on the password saving feature. If you find it difficult to remember your password you can use a password manager. Some of the highly recommended password managers are LastPass, KeePass, 1password and among others.

Be careful while logging in to your email from other’s computer
As much as possible do not use others computer for signing in your email address. Sometimes it can be urgent or necessary to use different computers, at that time you can exercise individual windows or incognito mode to log in to your email.

Use shortcut “ctrl+shift+p” to open private browsing mode in Mozilla Firefox, Microsoft Edge and Internet Explorer, and use “ctrl+shift+n” to open incognito mode in Google Chrome. In these modes, none of your data is stored by the browser. At last the most important thing do not forget to log out.

Be away of the spoofed emails
It is easy to spoof Email addresses that mean attackers can employ actual email addresses to send emails to steal information and data. So, immediately report the emails to the authorized IT administrator if it claims to be official and asks for sensitive information, access to your computer or for your password.

Verify the authenticity of any email that seems valid before giving away any information by contacting the relevant department. Attackers can also use social engineering tricks like making official appearing calls in an attempt to steal information so you must also be wary of such requests.

The points as mentioned earlier are taken as a reference from ThreatNix.

Previous article ThreatNix Appends IS Audit Service
Next articleDrupal Team Acknowledges Serious Vulnerability In CMS Drupal 
Mina Aryal is a Nepali tech journalist and media expert. She is currently the chief editor of ICT Frame, a leading online tech media outlet in Nepal that covers topics such as technology, business, and entrepreneurship. Aryal has been involved in the field of tech journalism for over a decade and has covered various topics such as internet governance, cybersecurity, e-commerce, and startup ecosystems. She has also been involved in organizing and promoting tech events in Nepal to bring together tech enthusiasts, entrepreneurs, and investors to discuss and collaborate on various topics related to the tech industry. Aryal is considered one of the most influential tech journalists in Nepal and has been recognized for her contributions to the field.

LEAVE A REPLY

Please enter your comment!
Please enter your name here