This section will cover the latest posts and articles around cybersecurity.

Is our data protected?

Growing cyber attacks

Infamous cybercrimes

“One of the main cyber-risks is to think they don’t exist. The other is to try to treat all potential risks.

Fix the basics, protect first what matters for your business and be ready to react properly to pertinent threats. Think data, but also business services integrity, awareness, customer experience, compliance, and reputation.”
― Stephane Nappo

With the ever growing trend of digital information, a lot of new field of study has come into limelight. Some of them include data science, RPA, digital marketing and so on. Data science has presented so many applications that has helped us understand the potentials of what we can do with the data we have. Data can range from the most simple to the most confidential class. Higher the class, the protection and safeguarding becomes an unavoidable aspect

Cybersecurity has undoubtedly been a boon for every organization dealing with data immaterial of the size. Today, in this pandemic era, the dependency on data has been more than ever. With the COVID-19 problem, a lot of things have changed. From people losing jobs, organizations experiencing cyber attack in various forms, the demand for cybersecurity has just skyrocketed and Gartner quotes the rate will multiply by 2022.

As you can see, we’re not short on threats for the coming year. In part, we have new technology to thank for that. As 5G, blockchain and other technologies become more common, they will undoubtedly improve our lives, but also offer significant security challenges.

Whichever industry you’re in, make sure you know how your business could be affected, then plan proactive solutions to keep your business safe.

Source: Yale


AIIMS Data breach, Safdarjang and Chennai patient records leaked – Are we still thinking about Cybersecurity?

A week earlier, one of India’s biggest healthcare & education giants, All-India Institute of Medical Sciences (AIIMS) was a victim of a massive ransomware data breach. AIIMS was established as an institution of national importance by an Act of Parliament with the objectives of developing patterns of teaching in Undergraduate and Post-graduate Medical Education. WhileContinue reading “AIIMS Data breach, Safdarjang and Chennai patient records leaked – Are we still thinking about Cybersecurity?”

Welcome to the ransomware weekly across multiple sectors – A summary   

The fact that October is designated as a month of cybersecurity awareness has unquestionably motivated a few businesses to strengthen their security posture and focus on specific cybersecurity aspects in order to enhance detection and response. From the 22nd to the 28th of October, a number of notable attacks have come to light, and theseContinue reading “Welcome to the ransomware weekly across multiple sectors – A summary   “

India’s largest Integrated power company hacked – Weekend attack trend continues

What do we know so far? So on Friday, one of India’s largest integrated power company TATA power confirmed that it encountered a cyber attack. The attack has impacted some of the IT infrastructure but the critical infrastructure seems to be intact. The news was relayed to the National Stock Exchange (NSE India). As perContinue reading “India’s largest Integrated power company hacked – Weekend attack trend continues”

Telstra Data breach follows Optus – 2 weeks apart – A summary

A couple of weeks back, Optus, one of Australia’s leading telecom provider suffered a malignant data breach there by impacting internal and external records including but not limited to sensitive customer data. Furthermore, Optus confirmed that 2.1 million customers had government identification numbers compromised during a cyberattack last month. Additionally, another leading telecom provider TelstraContinue reading Telstra Data breach follows Optus – 2 weeks apart – A summary


Something went wrong. Please refresh the page and/or try again.

Keep an eye on this page for more interesting articles

%d bloggers like this: