Relacionar Columnas Cyber Hygiene Best PracticesVersión en línea Mapping the Appropriate Pairs por cybergamification esflabs 1 Role of Two-Factor Authentication (2FA) 2 Employee Contribution to Cybersecurity 3 Accessing Public Wi-Fi 4 Caution when downloading Mobile Apps 5 Protecting Personal Information on Social Media 6 Importance of Regular Software Updates 7 Creating Strong Passwords 8 Secure Mobile Devices 9 Reporting Cyber Incident at SIDBI 10 Preventing Phishing Attacks Limit sharing, adjust privacy settings, be cautious Stick to official app stores Long, Complex Words with Special Characters and Numbers Attend security training, report incidents, follow policies irdesk@sidbi.in Extra protection beyond passwords Verify sender legitimacy, links and attachments Set strong PINs, Enable Biometrics & Anti Virus Use VPN Fix security vulnerabilities