Talk to Our Experts  

Information Risk Management Blog

10 Basic Things Every Organization MUST-DO for Cybersecurity

[fa icon="calendar'] Aug 26, 2016 2:08:05 AM / by Anupam Bonanthaya posted in Cybersecurity, Cyber Security, Information security, basics of cyber security

[fa icon="comment"] 9 Comments

These days, it is a rarity if there is no news of a high profile cyber attack or breach every week or so. This week was the French Submarine builder DCNS who is building defense submarines for India, Australia, Malaysia and Chile.  Last week was SAGE. The week before was Oracle.

It is a common misconception that only high profile companies in specific industries get attacked. In reality every organization - big or small, across all industries is a target. Or that is what the data says.

The ones who hog the headlines just got lucky.  

We put together a check-list in an infographic format to cover the basics of information security. 10 basic things that every organization must pay attention to in-order to stay away from the headlines when it comes to cybersecurity.

Read More [fa icon="long-arrow-right"]

13 Different Phishing Tactics and 1 Way to Prevent It

[fa icon="calendar'] Apr 20, 2016 1:14:51 AM / by Anupam Bonanthaya posted in Social engineering (security), fail-rate, Cyber Security, hackers, databreach, fall-rate, Information security, Malware, Vulnerability management, Security Trends, ransomware, Security, phishing, hacking, infosec

[fa icon="comment"] 2 Comments


Phishing Attacks are no longer that TOO GOOD TO BELIEVE - you have won a Million $$ jackpot kind of emails from strangers that easily stands out from your otherwise mundane life.

Today, phishing emails have got sophisticated. It is called spear phishing where the attacker tries to "custom-write" the emails to make it believable to you. They try to copy our (normal) life, and that's where it gets interesting and scary at the same time.

23% of recipients now open phishing emails and 11% click on attachments. and nearly 50% of this happens within 60-minutes of the attack !

- 2015 Data Breach Investigations Report (DBIR group)

Let me share a personal experience.

Read More [fa icon="long-arrow-right"]

How can Internet of Things (IoT) Not become a pain-in-the-a$$ from a cyber security perspective?

[fa icon="calendar'] Mar 30, 2016 3:38:06 AM / by Avinash Sinha posted in Privacy, Cybersecurity, IoT, Cyber Security, Internet of Things, Information security, Mobile Security, Security, cyberthreat

[fa icon="comment"] 5 Comments

Internet of Things is as enticing to hackers, as it is to consumers like you and me!

Read More [fa icon="long-arrow-right"]

30-Sec Guide: How to save from DROWNing?

[fa icon="calendar'] Mar 28, 2016 8:35:26 AM / by Naresh T A posted in Cyber Security, DROWN, CVE 2016-0800, Information security, Vulnerability management, Security, CVE

[fa icon="comment"] 0 Comments


Read More [fa icon="long-arrow-right"]

Key learning from Security Breaches of 2014

[fa icon="calendar'] May 27, 2015 12:19:47 AM / by Tom Thomas posted in Cyber Security

[fa icon="comment"] 0 Comments

Author: Amit Khanna

Read More [fa icon="long-arrow-right"]

Shadows are there to protect your Passwords (How Shadow-Utils is storing your password in Linux)

[fa icon="calendar'] Feb 13, 2015 4:22:33 AM / by Shekhar suman posted in Linux, Cyber Security, Password, Vulnerability management, Shadow-Utils

[fa icon="comment"] 0 Comments

Our world would have been exponentially more peaceful if there was no fear of theft. We would’ve left our doors open but still enjoyed our privacy and security. Unfortunately looking at the current scenario, that’s a rather impossible fiasco and hence the need for doors and locks.
A similar case is applicable for the digital world where we have to assure complete data security. The simplest yet most important way to protect ones data even today remains with the use of passwords and robust access management systems.
Password is defined as:

Read More [fa icon="long-arrow-right"]

The Escalating Trend in cyber-security

[fa icon="calendar'] Jan 13, 2015 1:29:37 AM / by navinkotianaujas posted in Cyber Security

[fa icon="comment"] 0 Comments

2014 has been one of the worst years for cyber-security breaches with a record number of high profile cases. Let’s look at some of the most recent attacks on companies and examine this escalating trend in cyber-security.

Read More [fa icon="long-arrow-right"]

Other Popular Posts


Case Studies