As many businesses move their processes online, they are encountering a greater security challenge that is so tricky to manage. It is all about sophisticated cyber criminals whose mission is to steal or disrupt enterprise data.
Data is a vital asset to any business or organization, and any kind of data breach can be very disastrous as it can lead to loss of finances, reputation and valuable information. There are several ways that these criminals use to gain access to an organization IT system, and they succeed because businesses have no effective strategies for dealing with cyber insecurity. Continue reading “Are You Handling Your Endpoint Security The Right Way?”
The success or failure of your mobile app is dependent on many factors. One of the most important of these factors is the experience of the user while on the app. This is the key that will determine how successful your mobile app will be. Continue reading “Enhance the User Experience of Your Mobile App with These Tips”
A cardholder’s worst nightmare is finding out that their credit card information is being used without their consent.This not only results in personal financial loss, but also in loss of confidence in the card market. For vendors, the negative upshot is not only losing existing customers, but it can affect future business as well. This is because prospective customers may not trust vendors who have had people’s financial information compromised.It goes without saying that credit card data breach also exposes merchants to legal liability. Continue reading “Why Your Organization Should Comply with PCI DSS”
Despite best efforts, it’s very likely that you have personal information on your computer you would rather not have found online or in the hands of a mischievous individual. It’s inevitable that you’ll end up saving documents that have information such as your finances or even as simple as a personal journal that’s meant to be private.
People can use this information against you; some do it for fun while others for financial or personal gain. Either way, it’s not something you’ll want to experience. Continue reading “How to Keep Data Locked Down: Everyday Tips for Everyday Users”
As more companies let their employees access information and applications remotely, managers need to think about how they will eliminate security gaps in the cloud. These four options should provide the security you need to protect your company and clients. Continue reading “Cloud Security: Inputs for practice”
The increasing reliance in our information age on product and process digitisation and e-governance makes us progressively more vulnerable to cyber attacks on our computer systems, networks and data. In their most disruptive form, cyber attacks may target the individuals, organizations, government, military, or infrastructural assets of a nation or its citizens, in isolation or event at the same time. We have finally concluded this three day workshop on information risk management and cyber security in IIT Delhi. Continue reading “Workshop in Cyber Security Policy 2016”
Whenever any new certification or course is talked about, the first question that pops is the future career opportunities it would offer. This is a valid concern as the main reason for learning new technology and processes is to grow in the current organization or to find better opportunities outside. The training experts know this fact well, hence they come up with career oriented diplomas and certifications in various streams of information technology, management, planning and finance. Amongst many such career oriented courses getting popularity globally, the certification and diploma in cyber security is trending quite fast. Continue reading “Career Opportunities for Cyber Security Professionals and Ways to Grab Them!”
RBI has ordered Indian Banks to develop a stronger focus in terms of capabilities to combat cyber crimes. The increasing role of ICTs in the indian banking industry is highlighted in this statement. It is interesting to note that RBI has recently frame the policy which insurance the need for Indian banks to have a dedicated focus for combating Cyber crimes. Indeed this is evident the way recently RBI has his structured its internal organisation to include a CIO heading at its top management who has a very strong focus on cyber security with decades of experience in the domain. Continue reading “RBI decision highlights the increasing role of ICTs in Banking Sector”
Digital services are increasingly getting prominence, due to the multi-faceted models of service delivery and different approaches of customer engagement. However such models face a lot of challenges from the different dimensions of perceived risk. An empirical investigation was conducted by our student, Mr. R Mohta, which highlights the different dimensions of risk in different digital services. Continue reading “Evaluating Multifaceted Risks in Digital Services”
This is a study where we attempt to explore different dimensions of risk that a consumer of any service or product may face over an interaction between the service / product vendor / provider and the consumer. Results are descriptive statistics based on findings of an empirical study. Different dimensions of these risk, which are defined in scientific literature provide different interaction effect at the point of decision making and service consumption. That is why it is important to understand their dynamics when service science is being explored. Continue reading “Risk Management Approaches”
We keep hearing that analytics is going to change the world in a big way and in fact it is already affecting firms and organisations in a way that could not have been visualised earlier. What is increasingly becoming prominent is that today is not the world where knowledge laden information can be stored free. Continue reading “What is obtrusive analytics”
Information security is the talk of the day. With the advent of growing popularity of information services and web enabling technologies for enterprise digitization, information becomes the critical asset that enterprises have to protect. So how does these critical assets fall under the risk of security breaches? Let us investigate some of the popular approaches. Continue reading “Major Approaches in Information Security Breaches”
Over the years, E Commerce security has become an important aspect of businesses worldwide, particularly the aspects of Information Security and Computer Security. With technological advantages, we are able to eliminate ‘Human touch’ and improve efficiency in a number of areas, but with the added fear and risk that some part of the entire value chain might be compromised, leading to financial loss, and more importantly loss of private information. Continue reading “Security Threats in E Commerce”