Password Attack
Several kinds of cyberattacks are prevailing around the globe but some manage to dominate and cause utter damage to both the privacy and security of information. This seems to increase
Global Privacy Regulations
The digital age started around 1980 with the Internet and the traditional industry witnessed a rapid shift to the present era which is entirely based on information technology. Slowly information
Information Classification – Why does it matter?
Information classification is a very important process that every organization should utilise, regardless of the size. You may think, why does information classification matter? Failing to classify information can lead
A critical comparison between ISO 27001 & NESA
What are the similarities between ISO 27001 & NESA? How are they different? What are the typical implementation pitfalls of these standards? Read on for an elaboration of many such topics.
5 Significant Data Breaches of 2022
Cybersecurity has been evolving as a substantial threat to business ecosystems worldwide. 2021 has witnessed some biggest and disastrous data breaches. With the Covid-pandemic and consequent lockdowns, the business worldwide
Top 10 Privacy Breach Penalties
Before we deep dive into the details of punitive actions that had been taken against renowned organizations due to their failure or negligence towards securing the personal information of their
Cybersecurity Assessment
Cybersecurity is one of the complex landscapes in which every organisation deals in this fourth industrial revolution, which witnessed the dramatic increase in modern business activities not just in the
Top 10 Personal Data Breaches of 2020 – 2021
Data Breach is defined as a security violation, which involve Sensitive, Unauthorised and confidential Data to be copied, Transmitted, exposed, stolen by an unauthorised individual for the purpose of personal
A Critical Comparison
Over the years many standards and frameworks have been developed and adopted to address information security concerns. Information security which was once a niche domain and often an afterthought for
Distributed Denial Of Service (DDoS) Attack
A DDoS attack is a cyberattack on a specific server or network with the intended purpose of crashing that network or server’s normal operation. This is done by flooding the
Key Changes in ISO/IEC 27002:2022
The draft version of ISO/IEC 27002:2022 has triggered people all over the world, especially the people who are dealing with information security. Let’s understand what are the changes are going
Cybersecurity Budgeting: 6 Tips for an effective security Budgeting
Cybersecurity has become an essential part of the corporate security landscape. With the evolving business transformation in the recent past, business is now highly becoming dependent on Information and digital
UAE’s Personal Data Protection Law
The United Arab Emirates in Jan 2022 has introduced its Personal Data Protection Law frameworks to protect the privacy of individuals and secure their information. This law provides a robust
Six best privacy practices
How best data privacy practices defines international data regulations? By 2023, 65% of the world’s population will have its personal data covered under modern privacy regulations, up from 10% in
Essential cybersecurity assessment frameworks
Cybersecurity Assessment Frameworks A standard framework is a set of tested guidelines and practices to engage with a specific Vulnerability in an Organisation. IT security management as a service has
Privacy By Design Principles
Privacy is the ability to control who can access the individuals’ personal information about their private life and their activities. In many aspects, privacy becomes very important for our daily
Why Organisations Needs to Take Data Privacy Seriously?
India by 2020 has nearly 749 million Internet users at a growth rate of 7-8%. India is well on the path to becoming a digital economy, which can be a
Functions of OSI Layer
Functions of The OSI Layer: An Introduction Open System Interconnection (OSI) Model developed by the International Standards Organization (ISO) which describe the flow of information from one computing device to
ISO and OSI model: How Does ISMS Protect OSI Model From Cyber Threats?
ISO and OSI model: How Does ISMS Protect OSI Model From The Cyber Threats? Cyber threats can occur at any layer of the OSI Model, starting from the Physical Layer
GDPR and PDPB: Relations & Differences
The five brief differences between GDPR and Personal Data Privacy Bill The Indian Government Has Recently Introduced the Indian Privacy bill, 2019. Ostensibly the bill was considered as an Indian
Ten data security standards
Ten data security standards Data is a new currency of business. A new business can be built by using data and information and a well-reputed business can be destroyed by
What is Phishing?
Firms across the globe have come up with action plans to tackle the increasing scenarios of various kinds of Cyber-crimes. Though every threat leads to damaging consequences, Phishing still tops
Impact Of Pandemic on Information Security/ Cyber Security
In the wake of sudden health emergency of COVID-19 pandemic, the world came to a standstill and the organizations around the globe struggled hard to find ways for continuing their
Smart Cybersecurity Budgeting: Part 2
Cybersecurity has evolved into a much more critical and risk-bound than ever before. With the business organizations around the world embracing DIGITAL Transformation with data and information encompassing the core
Man in the Middle (MITM) Attack
A MITM attack takes place when a communication between two systems is intercepted by an outside entity and it usually happens in any form of online communication such as, email,
Malvertising Attacks
“Malvertising” comes from a combination of “malware” and “advertising”, and includes taking advantage of online advertisements to spread malware or divert users to malicious websites. It is a type of
INFORMATION SECURITY: TOP 10 DATA BREACHES OF 2021
Data Breach is defined as a security violation, which involve Sensitive, Unauthorised and confidential Data to be copied, Transmitted, exposed, stolen by an unauthorised individual for the purpose of personal
Global Privacy Regulations – Part 2 of 2
The digital age started around 1980 with the Internet and the traditional industry witnessed a rapid shift to the present era which is entirely based on information technology. Slowly information
8 Most Destructive Malwares
Malware is intrusive software that is designed to damage and destroy computers and computer systems. The word Malware comes from “malicious software.” In the 1980s the first malware was created
How To Conduct Information Security Risk Assessment in An Organization?
Information leakage, Failure of electricity, Damage to a network device, Bug in software, are various kinds of threats an organization can face if they do not take precautions. These threats
INNOVATION IN THE AGE OF CYBERSECURITY
Do high regulations penalises innovation? The most complex challenge every Individual, Corporate entity, government facing in the 21st century is cybersecurity. This trend is invariably going to continue in the
Difference Between IT and OT
Even with the same manufacturing organization Information Technology (IT) and Operation Technology (OT) can seem like in separate world. They do not always speak the same language. For IT, security
Common Threats That Affect Organizations The Most
In this era where information forms the foundation of organizations and the only means to hold on to businesses require the employees to be severely connected through internet and communicate,
Who is Data Controller?
Who is Data Controller? In an era dominated by digital interactions, understanding the pivotal role of a Data Controller is essential to ensuring the privacy and security of personal data.
Why does an organization need SOC 2 Compliance?
Most organizations are increasingly relying on cloud services to meet so many of their business needs. How an organization can know all its vendors are handling its sensitive information securely?
What is Data Privacy Regulation Act?
The absence of any data protection law in India leads to leakage of individuals’ (our) personal data causing the violation of our fundamental right to privacy. From Table 1, you
Is it worth implementing ISO 27001 Standard?
Implementing ISO 27001 Do you want to – Strategically manage security/cyber security? – Become a leader in your industry to manage security risk? – Secure information across all areas of
INDIA’S NEW PRIVACY REGULATIONS
The Indian government has put forward the Personal Data Protection bill Draft in 2019 to regulate the data Privacy and processing in India. With the fourth industrial revolution (digital Age),
UAE’s Cyber Landscape
Why cybersecurity is an urgent necessity rather than a technical luxury? United Arab Emirates, is considered as one of the advanced countries for doing business within the Middle East and
Difference Between Privacy & Security
Difference between Privacy & Security Privacy and Security are related and they are frequently inseparable from one another. A significant number of us might accept both are firmly related terms