Cyble – Indian Tech Co.'s needs to be Buckle Up

[ad_1]
Business Wire IndiaThe Indian Technology ecosystem has seen a significant growth in the last five years. In 2019 alone, more than 9.3B dollars have been invested in the tech ecosystem in the nation. While technological advances have improved the standard of living, the timing for a rise in cybercrime could not have been better given the rapid expansion of digitization of India.

As breakthroughs in the digital technology have bridged global economies, India has not been an exception. On the flipside, with one of the largest Internet population in the world, the growing interconnectivity has paved the way for greater vulnerability in the threat landscape. There has been a steady increase in the volume of cybercrime in India. For instance, in 2019, India suffered more than 15B dollars due to cybercrime, cyber fraud, and identity theft. What is gravely concerning is that while these are publicly affirmed numbers, the reality could be much worse.

In the last 12 months, Cyble has observed a significant uptick in cybercriminal activities, including a number of threat actors actively targeting the nation. The motives of cybercriminals range from state-sponsored attacks on government agencies to organized cybercriminals syphoning off confidential data or sensitive user information from businesses.

Here’s why Indian companies are turning into soft targets of cyber criminals.
 

  

 

 

 

This brings us to the question of where the company is heading. Public reports have clearly stated that India is an attractive target for cybercriminals for a host of reasons ranging from motives of financial gain to geopolitical agendas. Here are five essential things Cyble recommends technology-based companies to consider.
 

  1. Appoint a CISO – Without a clear vision and accountability on protecting customers’ information and intellectual property, it would be a nightmare to manage the risks posed by the ever-evolving threat landscape.
  2. Implement a Basic Security Hygiene – The Australian Signal Directorate has released strategies to mitigate cybersecurity incidents. In Cyble's opinion, The Essential Eight, when implemented and governed correctly, can help thwart the majority of the cyberattacks. 
  3. Bolster Security Awareness Initiatives – Over 80% of cyberattacks originate via phishing and water-holing attacks. Organizations are increasingly using SSO to connect to their code repositories or third-party apps. Once a privileged account is compromised, the attacks can gain access to a large part of the company’s infrastructure, including customer records. Irrespective of how secure an enterprise’s IT security structure is, the company is only as protected as its user base. To improve awareness about phishing, organizations should conduct routine tests on the employees with fake phishing emails to educate them and help them learn how to recognize a real phishing attack.
  4. Implement multi-factor authentication where possible. Ensure access token and secret keys are changed and accounted regularly. This builds an additional layer of security for protecting highly sensitive user PI.
  5. Implement a Robust Security Monitoring capabilities – As the landscape of an organization evolves, it is prudent to maintain a situational awareness of the threats, risks, and vulnerabilities.

[ad_2]
Source link
Exit mobile version