With Digital India initiative, there is a new wave of transformation across country. It includes e-Governance, electronic delivery of services, and information to all in electronic form in the central & state government segment. This transformation also demanding every small and big business to go online to increase efficiency and revenues. This is making government and private businesses increasingly dependent on devices, services and applications […]
Cyber-attacks from employees and other insiders is a common problem for all organizations. Most of the times such attacks go unnoticed for many months to years and many a times it is never detected. Usually such attacks within private organizations are never reported outside unless it causes losses or impact to their customers. Snowden and WikiLeaks are famous examples of insider attacks known in public […]
In my earlier blog of the series Common Cyber Security Threats for Novice I’ve discussed about common cyber threats which are applicable to everybody. In this blog, I’m trying to bring up other common security practices to be exercised by working professionals. This group of people are very well versed with common cyber threats but should be aware of common vulnerabilities around work place.
There have been many other threats, mitigation techniques and awareness mechanisms available when it comes to Information Security of an organization but this attempt is to discuss about most likely cyber security threats that affect organization’s businesses monetarily or reputation and any business owner or management body should be aware of to take appropriate measures.
This blog is more focused on the security threats exposed and experienced by beginners, infrequent internet users or those who spend much time on social network without appropriate security concerns. As part of a series, this is the first blog post.
This blog is continuation of security threats exposed and experienced by beginners, infrequent internet users or those who spends much time on social network without appropriate security concerns. 1. Protecting Personal Information Refers to any information that can personally identify you, such as your name, address, phone numbers, your schedule, bank account number, credit card account numbers, family members’ names or friends’ names.
This video blog is for making aware general internet users about cyber security. It talks about: What is cyber security? What are impacts of cyber security incidents? How do we connect to internet? Different threat and attack vectors of cyber security How to identify if you are victim of cyber-crime/incident General preventive measure Access this video below: