Integrating Forensic with other IT security activities Forensic readiness is complementary to, and an enhancement of, many existing information security activities. Policy Update – Updating IT policies appropriately for inclusion of Digital Forensic related terms Asset Management – It is important to know which assets are subject to target and potential sources for evidence gathering Risk Management – It should be part of an information […]
Most commonly, forensic investigation of digital evidence is done as a post-event response to a serious information security incident and given an option, IT department of most of the orgnizations would prefer to avoid it given the timeframe, cost and wide range of staff impacted with such investigations. However, monitoring, analyzing and investigating digital evidences as a standard practice can actually help organizations to avoid […]
Cybercrime has become the biggest threat to digital information, causing reputational and financial damage to businesses and individuals around the globe. Cyber attacks are now impacting not only individuals who are online but also those are not online, for example, one of the cyber-attacks have disrupted the availability of electricity in thousands of homes in Eastern Europe. Therefore Digital Forensics practice, which deals with acquisition-preservation-analysis […]
With Digital India initiative, there is a new wave of transformation across country. It includes e-Governance, electronic delivery of services, and information to all in electronic form in the central & state government segment. This transformation also demanding every small and big business to go online to increase efficiency and revenues. This is making government and private businesses increasingly dependent on devices, services and applications […]
There is a rapid increase in the usage of digital channels in the financial sector such as internet banking, digital wallets, mobile banking. This increase the exposure and thereby cyber-attacks causing financial and reputation losses to institutions.
Cyber-attacks from employees and other insiders is a common problem for all organizations. Most of the times such attacks go unnoticed for many months to years and many a times it is never detected. Usually such attacks within private organizations are never reported outside unless it causes losses or impact to their customers. Snowden and WikiLeaks are famous examples of insider attacks known in public […]