With rapid progress of wireless technology, the daily life of the citizens has undergone drastic change. They are using sophisticated devices based on latest technology for their daily usage at homes. This lucrative facility is available especially to the citizens of modern cities of the world. India is also not lagging. Government of India has announced for creation of 100 Smart Cities where the citizens are expected to use Information and Communication Technology with the help of internet. More use of internet by the citizens would enhance more internet penetration and here Internet of Things (IoT) plays a crucial role.
As many businesses move their processes online, they are encountering a greater security challenge that is so tricky to manage. It is all about sophisticated cyber criminals whose mission is to steal or disrupt enterprise data.
Data is a vital asset to any business or organization, and any kind of data breach can be very disastrous as it can lead to loss of finances, reputation and valuable information. There are several ways that these criminals use to gain access to an organization IT system, and they succeed because businesses have no effective strategies for dealing with cyber insecurity. Continue reading “Are You Handling Your Endpoint Security The Right Way?”→
A cardholder’s worst nightmare is finding out that their credit card information is being used without their consent.This not only results in personal financial loss, but also in loss of confidence in the card market. For vendors, the negative upshot is not only losing existing customers, but it can affect future business as well. This is because prospective customers may not trust vendors who have had people’s financial information compromised.It goes without saying that credit card data breach also exposes merchants to legal liability. Continue reading “Why Your Organization Should Comply with PCI DSS”→
Despite best efforts, it’s very likely that you have personal information on your computer you would rather not have found online or in the hands of a mischievous individual. It’s inevitable that you’ll end up saving documents that have information such as your finances or even as simple as a personal journal that’s meant to be private.
As more companies let their employees access information and applications remotely, managers need to think about how they will eliminate security gaps in the cloud. These four options should provide the security you need to protect your company and clients. Continue reading “Cloud Security: Inputs for practice”→
The increasing reliance in our information age on product and process digitisation and e-governance makes us progressively more vulnerable to cyber attacks on our computer systems, networks and data. In their most disruptive form, cyber attacks may target the individuals, organizations, government, military, or infrastructural assets of a nation or its citizens, in isolation or event at the same time. We have finally concluded this three day workshop on information risk management and cyber security in IIT Delhi. Continue reading “Workshop in Cyber Security Policy 2016”→
RBI has ordered Indian Banks to develop a stronger focus in terms of capabilities to combat cyber crimes. The increasing role of ICTs in the indian banking industry is highlighted in this statement. It is interesting to note that RBI has recently frame the policy which insurance the need for Indian banks to have a dedicated focus for combating Cyber crimes. Indeed this is evident the way recently RBI has his structured its internal organisation to include a CIO heading at its top management who has a very strong focus on cyber security with decades of experience in the domain. Continue reading “RBI decision highlights the increasing role of ICTs in Banking Sector”→
Digital services are increasingly getting prominence, due to the multi-faceted models of service delivery and different approaches of customer engagement. However such models face a lot of challenges from the different dimensions of perceived risk. An empirical investigation was conducted by our student, Mr. R Mohta, which highlights the different dimensions of risk in different digital services. Continue reading “Evaluating Multifaceted Risks in Digital Services”→
You must be logged in to post a comment.