Relacionar Columnas Cyber Hygiene Best PracticesVersión en línea Mapping the Appropriate Pairs por cybergamification esflabs 1 Employee Contribution to Cybersecurity 2 Preventing Phishing Attacks 3 Secure Mobile Devices 4 Creating Strong Passwords 5 Role of Two-Factor Authentication (2FA) 6 Reporting Cyber Incident at SIDBI 7 Importance of Regular Software Updates 8 Caution when downloading Mobile Apps 9 Accessing Public Wi-Fi 10 Protecting Personal Information on Social Media Limit sharing, adjust privacy settings, be cautious irdesk@sidbi.in Verify sender legitimacy, links and attachments Fix security vulnerabilities Attend security training, report incidents, follow policies Extra protection beyond passwords Long, Complex Words with Special Characters and Numbers Set strong PINs, Enable Biometrics & Anti Virus Use VPN Stick to official app stores