The Indian Computer Emergency Response Team (CERT-in) issued “Directions” relating to information security practices, procedure prevention, response, and reporting of cyber incidents for Safe & Trusted Internet (“Directions”) on 28.04.2022. The said directions will become effective on 27.06.2022. “Cyber Security Incident” means “any real or suspected adverse event concerning cyber security that violates an explicitly […]
Category Archives: Uncategorized
8 Steps to Establishing a Strong Risk Management Program in an Organization
Risk management is essential not only for legal compliance but also for safeguarding the assets and reputation of an organization. It needs to be inculcated into the very culture of the organization and become part and parcel of every employee’s daily duties. If this happens, management and staff alike will always consider the risks involved […]
The 5 Main Pillars of Data Privacy
For modern businesses, data has become the most valuable asset. However, organizations are continually bombarded by daily threats that emanate from potential data breaches which can cost an organization dearly. The Covid pandemic brought with it many challenges and organizations had to adapt for survival. Organizations implemented alternative methods of working such as remote/ work […]
Maintaining an Information Security Awareness Program within a Remote Workplace
Employers need to take some time and review their security plans for their employees that are working remotely. There is a greater security risk for systems that are using remote access technology than for those on-site. Cybercriminals are always looking for ways to hack into systems that are not well secured and take advantage of […]
Identity and Access Management (IAM) Best Practices
IAM sits at the dead center of information security: an information system would be incomplete without Authentication and Authorization. You need to determine who accesses what piece of information and to what extent. If IAM is governed appropriately, then organizations will reduce the risk of data breaches which comes with a myriad of consequences ranging […]
Important facts about the updates in ISO 27001/ISO 27002
ISO 27001 is a globally recognized information security standard which help organization to adopt information security framework for their data protection and information security compliance requirements. The standard was initially published in 2005 and it has been updated a few times throughout these years. In 2022 the ISO 27001 and ISO 27002 standards will be […]
The First Line of Defence: A Strong Password
As organizations are adopting work from home culture and we are surrounded of online services, resources and devices. The passwords are the “First line of defence” to secure your data. We should pay special attention during choosing the password. In this blog, we’ll explore the importance of strong and complex passwords and will discuss how […]
Benefits of Having an Information Security Program in an Organization
With developments in internet technology, information security has become a matter of concern for every organization. There is a need for a comprehensive security program that will oversee the protection of the three main components of information security (commonly known as the CIA of security): Confidentiality – protection of information against unauthorized disclosure Integrity – […]
Top 10 Application Security Best Practices
Mobile and web applications have become part and parcel of our lives. They have just simplified our lives. Whether it’s adjusting room temperature in your smart home, or buying an air ticket to your favorite holiday destination, whether it’s accessing your drug store or ordering your favorite pizza, all these have been made possible through […]
Cyber Security Compliance and Regulation in India
With developments in internet technology, cyber security has today become a global concern for both individual persons and companies. International bodies such as ISO and NIST have come up with regulations and compliance requirements to guide both public and private sector organizations into a world of data safety. India has the second-largest internet user base […]