Posts

Showing posts from August, 2023

What is Phishing and How Does it Work?

Image
What is phishing? Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person in an email or other form of communication. Attackers commonly use phishing emails to distribute malicious links or attachments that can extract login credentials, account numbers and other personal information from victims. Deceptive phishing is a popular cybercrime, as it's far easier to trick someone into clicking on a malicious link in a seemingly legitimate phishing email than it is to break through a computer's defenses. Learning more about phishing is important to help users detect and prevent it. How phishing works Phishing is a type of social engineering and cybersecurity attack where the attacker impersonates someone else via email or other electronic communication methods, including social networks and Short Message Service (SMS) text messages, to reveal sensitive information. Phishers can use public sources of information, such as

Public Draft: The NIST Cybersecurity Framework 2.0

Image
The NIST Cybersecurity Framework (CSF) is an integrated set of standards, best practices, and guidelines created by the NIST (National Institute of Standards and Technology) to assist organizations manage and improve their cybersecurity risk management processes. The framework provides a flexible and voluntary approach that organizations can use to assess and strengthen their cybersecurity posture by outlining a series of steps and activities across core functions. It provides a set of categories and subcategories for each function, along with a set of informative references that can help organizations implement the framework in their specific context. It serves as a common language for organizations to communicate and collaborate on cybersecurity risk management.   NIST Cybersecurity Framework 2.0 NIST Cybersecurity Framework (CSF) 2.0 is the latest revision of NIST CSF 1.1 that includes the six core functions: Govern, Identify, Protect, Detect, Respond, and Recover. The

How organizations can defend themselves against cyber risk

Image
    Cyber insurance, once viewed as a desirable security accessory, has evolved into an incident response and business resilience lifeline. As cybercrime continues to leave mass financial and operational destruction in its wake, protecting the bottom line and ensuring business continuity following such events has captivated the attention of executive leadership, and propelled the demand for cyber insurance. Regulatory compliance and increased scrutiny from customers have also forced this level of urgency. Not only has there been an influx of applications for cyber insurance but also a tidal wave of organizations actively using their coverage. Research from Delinea found that 80% of organizations have leveraged their coverage at least once , and more than half of that group has used it on more than one occasion. With the average cost of a data breach reaching astronomical amounts ($4.35 million according to IBM), insurers are not only raising rates but also tightening requir

The Digital Personal Data Protection Bill, 2023

Image
Highlights of the Bill The Bill will apply to the processing of digital personal data within India where such data is collected online, or collected offline and is digitised.  It will also apply to such processing outside India, if it is for offering goods or services in India. Personal data may be processed only for a lawful purpose upon consent of an individual.  Consent may not be required for specified legitimate uses such as voluntary sharing of data by the individual or processing by the State for permits, licenses, benefits, and services. Data fiduciaries will be obligated to maintain the accuracy of data, keep data secure, and delete data once its purpose has been met. The Bill grants certain rights to individuals including the right to obtain information, seek correction and erasure, and grievance redressal. The central government may exempt government agencies from the application of provisions of the Bill in the interest of specified grounds such as