Matching Pairs Cyber Hygiene Best PracticesOnline version Mapping the Appropriate Pairs by cybergamification esflabs 1 Role of Two-Factor Authentication (2FA) 2 Employee Contribution to Cybersecurity 3 Secure Mobile Devices 4 Reporting Cyber Incident at SIDBI 5 Accessing Public Wi-Fi 6 Preventing Phishing Attacks 7 Protecting Personal Information on Social Media 8 Creating Strong Passwords 9 Caution when downloading Mobile Apps 10 Importance of Regular Software Updates irdesk@sidbi.in Use VPN Fix security vulnerabilities Set strong PINs, Enable Biometrics & Anti Virus Limit sharing, adjust privacy settings, be cautious Attend security training, report incidents, follow policies Long, Complex Words with Special Characters and Numbers Extra protection beyond passwords Verify sender legitimacy, links and attachments Stick to official app stores