Page 23 - Craftcil Mar-Aor 2025
P. 23
seminars
Phishing via QR codes, Vishing - Phishing via video or voice
calls; and USSD Exploits: Refrain from entering unfamiliar USSD
codes, as these can activate call forwarding and compromise
OTP-based security. Mr. Rakshit recommended avoiding
storage of personal documents (e.g., Aadhaar, PAN) in phone
galleries. Instead, use secure platforms like: DigiLocker: A
government-backed app for safely storing digital documents
with masking options.
If your phone is stolen, immediately block your SIM card to
prevent the misuse of OTPs or incoming calls. File an FIR at
the nearest police station and reissue your SIM with the help
of your telecom provider. Use Google’s Find My Device or
Key Takeaways and Recommendations
Apple’s iCloud to track and erase your phone remotely. You should
It is essential to keep all your devices—phones, laptops, and also block the stolen device via the Sanchar Saathi porta. Any
tablets—regularly updated, as updates often include critical suspected fraud or cybercrime must be reported using official
security patches. Use strong, unique passwords for each platform, government portals or by calling the cybercrime helpline at 1930,
ensuring they are complex and not based on easily guessed he advised and added, when it comes to cybercrimes involving
information like birthdays or anniversaries. Utilize tools such as children, extra vigilance is essential, as minors are particularly
HaveIBeenPwned.com to check if your credentials have been vulnerable to online abuse and fraud. Prompt reporting through
compromised in data breaches, and VirusTotal.com to scan official channels is strongly advised. Mr. Rakshit issued a strict
suspicious files or links for malware. Be cautious of scams and fake warning against giving smartphones to children under the age of
calls, especially from individuals impersonating government 13. He emphasized that a phone today holds sensitive information,
authorities like TRAI or customs officers—always verify their identity like a wallet, bank account, and investment portfolio and should
before sharing any information. Stay alert to deepfake-based scam never be handed to a child. He also highlighted global best practices,
ads that use celebrity faces to promote fraudulent or illegal applauding countries such as Australia and Norway for enforcing
schemes. Finally, never download files with extensions like .apk or strict regulations on teen access to social media. He suggested
.iso from unknown sources, as these may contain malware. that India should consider adopting similar protective measures.
To conclude the seminar, Mr. Rakshit provided a practical
Emerging Cyber Threats
demonstration of Multi-Factor Authentication (MFA), which
Trusted Contact Attacks: Criminals pose as known contacts to enhances digital security through one-time passwords (OTP),
deceive victims; Advanced Phishing Techniques: Quishing - physical security keys, authentication apps, or biometric verification.
Leveraging AI-Powered Software for Optimizing Export Operation
• Export Challenges & Technical Compliance • Limitations of Traditional Software • AI’s Role in
Modern ERP • DiracERP: AI-Powered Export Optimization • Real-World Benefits: Efficiency,
Accuracy, Cost Savings • The Future of Export Operations
18th April 2024: Mr. Lakshman Das, Director, DiracERP elaborated Export Management
on the evolving landscape of export operations, addressing key
In today’s global economy, export management is more complex
topics such as export challenges and compliance, limitations of
than ever, with evolving regulations, intricate documentation, and
traditional software, AI's role in modern ERP, and real-world benefits
unpredictable logistics. Exporters must work with speed, accuracy,
of AI-powered solutions like DiracERP, including improved
and efficiency while reducing errors, cutting costs, and meeting
efficiency, accuracy, and cost savings.
shifting global demands. Despite these growing demands, Many
CRAFTCIL • MARCH - APRIL 2025 23