๐Œ๐š๐ซ๐ข๐ญ๐ข๐ฆ๐ž ๐‚๐ฒ๐›๐ž๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ

With the advent of Industry 4.0, OT and IT systems have converged and exposed to Cyber world. It has increased possibilities for operational optimisation, cost savings and more sustainable business. However, it has also brought in inherent cyber risks. Maritime Industry which is entering the digital era to become smart and autonomous has similar characteristics. However, Cyber risks and challenges posed for Maritime industry is […]

Read Me 1 Comment

Ransomware: A wake up call for every online business

Are you CIO/CTO/CISO/IT Manager? Designation may vary company to company but if you are accountable for protecting business data then itโ€™s time to reassess your IT controls and strategies deployed for protecting business data in the wake of Ransomware attacks.  This data may include personal data of customers/employees, financial data, IP etc. which might need to comply to other regulations but the primary objective this data is to […]

Read Me Leave comment

Securing Financial Exposure against Cyber Crimes

This video is to spread awareness on how to reduce financial losses in case someone becomes victim of cyber crime and financial data is compromised.

Read Me Leave comment

Social Sites Security against Cyber Crimes

This is an awareness video to secure information shared on social sites to avoid becoming victim of cyber crime.

Read Me Leave comment

Social Engineering Attacks in Cyber Crimes

This video is about common Social Engineering attacks used in Cyber Crimes and how to prevent it.

Read Me Leave comment

Mobile Phone Security against Cyber Crime

This is Cyber Security video to raise awareness on smart phones security and security tips against cyber crimes

Read Me Leave comment

Cyber Crime – Confidential Data – Identifying being a Victim

This video is about making awareness on Cyber Crime, the Confidential data and some symptoms to identify if you are victim of Cyber Crime.

Read Me Leave comment

Identifying Fake WhatsApp posts

This Video talks about identifying fake or doubtful WhatsApp Posts

Read Me Leave comment

Measuring SOC effectiveness – An Integrated SOC

Security Operations Center (SOC) is an integral function of the information security operations for most of businesses that heavily depend on online transactions. This is not just because of statutory or regulatory mandates but also organisations want to continuously assess their security postures and monitor threats to their IT infrastructure. Even consumers of the services or products want providers to take complete responsibility of securing […]

Read Me 2 Comments

Organizations need to get ready with Digital Forensic: Part 2

Integrating Forensic with other IT security activities Forensic readiness is complementary to, and an enhancement of, many existing information security activities.  Policy Update – Updating IT policies appropriately for inclusion of Digital Forensic related terms Asset Management – It is important to know which assets are subject to target and potential sources for evidence gathering Risk Management – It should be part of an information […]

Read Me 1 Comment
WP2Social Auto Publish Powered By : XYZScripts.com