Page 23 - Craftcil Mar-Aor 2025
P. 23

seminars


                                                                       Phishing via QR codes,  Vishing - Phishing via video or voice
                                                                       calls; and USSD Exploits: Refrain from entering unfamiliar USSD
                                                                       codes, as these can activate call forwarding and compromise
                                                                       OTP-based security. Mr. Rakshit recommended avoiding
                                                                       storage of personal documents (e.g., Aadhaar, PAN) in phone
                                                                       galleries. Instead, use secure platforms like: DigiLocker: A
                                                                       government-backed app for safely storing digital documents
                                                                       with masking options.

                                                                       If your phone is stolen, immediately block your SIM card to
                                                                       prevent the misuse of OTPs or incoming calls. File an FIR at
                                                                       the nearest police station and reissue your SIM with the help
                                                                       of your telecom provider. Use Google’s Find My Device or
            Key Takeaways and Recommendations
                                                                   Apple’s iCloud to track and erase your phone remotely.  You should
            It is essential to keep all your devices—phones, laptops, and  also block the stolen device via the Sanchar Saathi porta. Any
            tablets—regularly updated, as updates often include critical  suspected fraud or cybercrime must be reported using official
            security patches. Use strong, unique passwords for each platform,  government portals or by calling the cybercrime helpline at 1930,
            ensuring they are complex and not based on easily guessed  he advised and added, when it comes to cybercrimes involving
            information like birthdays or anniversaries. Utilize tools such as  children, extra vigilance is essential, as minors are particularly
            HaveIBeenPwned.com to check if your credentials have been  vulnerable to online abuse and fraud. Prompt reporting through
            compromised in data breaches, and VirusTotal.com to scan  official channels is strongly advised. Mr. Rakshit issued a strict
            suspicious files or links for malware. Be cautious of scams and fake  warning against giving smartphones to children under the age of
            calls, especially from individuals impersonating government  13. He emphasized that a phone today holds sensitive information,
            authorities like TRAI or customs officers—always verify their identity  like a wallet, bank account, and investment portfolio and should
            before sharing any information. Stay alert to deepfake-based scam  never be handed to a child. He also highlighted global best practices,
            ads that use celebrity faces to promote fraudulent or illegal  applauding countries such as Australia and Norway for enforcing
            schemes. Finally, never download files with extensions like .apk or  strict regulations on teen access to social media. He suggested
            .iso from unknown sources, as these may contain malware.  that India should consider adopting similar protective measures.
                                                                   To conclude the seminar, Mr.  Rakshit provided a practical
            Emerging Cyber Threats
                                                                   demonstration of Multi-Factor Authentication (MFA), which
            Trusted Contact Attacks: Criminals pose as known contacts to  enhances digital security through one-time passwords (OTP),
            deceive victims; Advanced Phishing Techniques: Quishing -  physical security keys, authentication apps, or biometric verification.



                       Leveraging AI-Powered Software for Optimizing Export Operation


            • Export Challenges & Technical Compliance • Limitations of Traditional Software • AI’s Role in
              Modern ERP • DiracERP: AI-Powered Export Optimization • Real-World Benefits: Efficiency,
              Accuracy, Cost Savings • The Future of Export Operations

            18th April 2024:  Mr. Lakshman Das, Director, DiracERP elaborated  Export Management
            on the evolving landscape of export operations, addressing key
                                                                   In today’s global economy, export management is more complex
            topics such as export challenges and compliance, limitations of
                                                                   than ever, with evolving regulations, intricate documentation, and
            traditional software, AI's role in modern ERP, and real-world benefits
                                                                   unpredictable logistics. Exporters must work with speed, accuracy,
            of AI-powered solutions like DiracERP, including improved
                                                                   and efficiency while reducing errors, cutting costs, and meeting
            efficiency, accuracy, and cost savings.
                                                                   shifting global demands. Despite these growing demands, Many

                                                                                   CRAFTCIL • MARCH - APRIL 2025     23
   18   19   20   21   22   23   24   25   26   27   28