Search
Register

Data Privacy Day

January 28 is celebrated as Data Privacy Day (DPD) across the world. The objective of the day is to sensitize individuals and disseminate privacy practices and principles. From being privacy professional to an internet user or a consumer, the onus of safeguarding privacy lies on every shoulder.


In order to commemorate the day, a Privacy focussed Wallpaper & Posters have been created which depict the Privacy landscape and imperatives towards Privacy. The wallpaper depicts the steadfast approach of a Privacy Champion; inspiring others to crossover the abyss of privacy violations, using the bridge of privacy principles.

Download the Data Privacy Day creatives and show your support by applying them in and around your organisation.Get them from here: http://bit.ly/dpd2019

We encourage you to help us in mass adoption of this Wallpaper by getting it adopted personally and within your organization for at least a week to 10 days starting Jan 28. The posters are print-ready and can be easily printed and pinned on workstations and notice boards.
Data Privacy Day presents itself as an opportunity to further the long-standing goal of robust use and transfer of data in a fashion that is responsible and protected. It is imperative for us as a country to continuously strive to become Privacy aware and build a robust Privacy posture for our organizations and citizens. This Data Privacy Day, let us pledge to embark on this promising journey of Data Protection and become the true champions of Data Privacy.
Let’s Think Privacy First!

Ransomware – A Painful Extortion

The word Ransom refers to a demand made by the abductors for the release of an imprisoned. In some cases, the criminal may not release the person even after getting the money. Similarly, in the cyber world, it’s not guaranteed that even after paying the Ransom, your encrypted files get released/decrypted. In some case, also collects banking information along with the demanded money.  For taking advantage and utilizing it again, most of the times, malicious files are not removed. Anatomy of Ransomware Ransomware is a piece of software intended to block access to system resources until a sum of money is paid. Ransomware encrypts files on the infected system. When infected all files are inaccessible as they also have a different extension which is unknown to a computer file system. Bad actors...

Understanding Data and Its Capabilities

|

The strong characteristics of Data in today’s world leads us into the tunnel where our information is being used without our consent and we don’t even know by whom! We give out information about our life, personal and professional, that we have no idea what we are getting ourselves into. So, it is up to us to be aware and cautious about what we do and what we give out in this cloud world. Before I begin, let me just put a few facts about Data for you: Every day 2.5 quintillion bytes of data is generated online By 2023, the big data analytics market is expected to reach $103 billion. The big data market is projected to grow by 20% In one second, each person is expected to generate 1.7 megabytes of data by 2020 Netflix saves $1 billion every year by channelizing Big data for cust...

Cyber Security Threats to Look For in 2020

|

Cyber Threats to Look For in 2020 With the advent of new technologies, the doors of complex cybersecurity challenges have opened. This advancement has provided cyber criminals with thousands of opportunities to exploit and damage an organisation’s cybersecurity infrastructure. The year 2019 had some worst data breaches. 2020 is going to be a challenging year for the businesses, organisations and governments as the advanced cyber attacks are expected to rise. Let us have a look at some of the top cybersecurity threats to watch out for in 2020. Over the last decade, Internet-connected smart devices used in offices and homes have proliferated. Most of these devices do not have enough security features installed, which allows attackers to coerce the device and enter the network. All through 20...

4 P’s of DLP (Data Leak Prevention)

|

IT security is entering a new phase. According to a recent APWG phishing trends report, in the first quarter of 2019, phishing of SaaS and webmail services surpassed payment services. This is an important inflection point for the new industry when one must take stock of the emerging threats.  According to Verizon’s 2019 data breach investigations report, 34% of breaches involved internal actors. Finally, based on a data privacy survey by egress, The five most common technologies that have led to accidental data breaches by employees are:  Email services like Gmail and Yahoo (51 percent) Corporate email (46 percent) File sharing services like FTP sites (40 percent) Collaboration tools such as Slack and Dropbox (38 percent) SMS/Messaging Apps like G-Chat and WhatsApp (35 percent). IT leaders...

Performance Testing – prevent your site from Crashing this holiday season?

|

What did you do to prevent your site from Crashing this holiday season? – The science of improving website conversion Imagine about that customer who is navigating a mobile/web app and everything is just running slow. Nothing happens with the click of a button and the spinning wheel continues to spin for a very long time. More than anything, response time plays a crucial role in customer experience. 49% of the e-commerce customers expect pages to load in 2 seconds or less. Better Customer Experience = Better Business Below is the Cheat Sheet of Performance Testing Which Can Prevent Your site from Crashing This Holiday Season E-Commerce websites have different flavors based on the season. Why not to impress the customers with excellent product variety and the convenience of shopping line be...

Anomaly and Breach Detection Empowers Cybersecurity Efforts

|

Note: To learn more about anomaly and breach detection, watch the author’s presentation in the recorded webinar sponsored by Indegy on November 14, 2017. As discussed in a recent ARC Market Analysis Report, anomaly and breach detection is one of the hottest markets in industrial cybersecurity. But, as is true for many hot markets, there is a lot of confusion about what these solutions really do and how this can help end users. In simple terms, industrial anomaly and breach detection solutions continuously monitor the health and integrity of critical control systems. The goal is to provide early warning of problems, whether they are cyber attacks or other system issues, and give responders a chance to minimize the impact. Solutions in this market vary in what they monitor, how they do it, a...

The Cybersecurity Challenge of IT/OT Convergence

|

The Industrial Internet of Things has moved beyond the hype, and end users are dealing with the challenges of implementing real-world IIoT technology in their plants. This trend is accelerating the convergence of IT and OT technologies, which has already been an issue for end users as commercial IT technologies become more pervasive in today’s control systems and worker roles and organizations continue to change. The resulting cybersecurity challenges that come with this convergence are considerable. Cyber threats are on the rise. Malware and ransomware attacks are disrupting services and supply chains, leading to damaged equipment and impacting the company brand as well as the bottom line. It can be challenging to manage security personnel and the teams entrusted to safeguard company asse...

Do we need to debate the relative drivers behind ICS Cybersecurity?

|

Anyone who has any familiarity with the field of information security has encountered the abbreviation “CIA”, which is short for “Confidentiality, Integrity and Availability.” These are often put forward as the essential drivers behind efforts to secure information systems and the data they contain. When applying information security principles and practices to industrial systems security, we’ve heard debates about whether these drivers apply equally for both domains. In fact, while confidentiality may be the foremost imperative for information systems, there is a common argument that the order should be reversed for industrial systems, placing availability as the highest imperative. Others have stated just as emphatically that the primary concern must be with the overall integrity of the ...

The SANS 2017 ICS Cyber Security Survey Results are In

|

Earlier in July, SANS published the results of its 2017 ICS cybersecurity survey. You can register to view the webcast here. ARC reported previously on the alliance between ARC Advisory Group and SANS, and as part of that alliance, ARC vice president Sid Snitkin wrote the prologue to the survey. Here’s what Sid had to say about the survey results and how they match up to what ARC sees as some of the key challenges in cybersecurity. “The findings of this SANS research are quite interesting. Despite some significant differences in the survey groups, the results align quite well with ARC’s ICS cyber security surveys of plant operators, process control engineers, and manufacturing IT specialists. Everyone considers budgetary constraints and the introduction of potentially insecure Industrial I...

Is ICS Cybersecurity Common Across Sectors?

|

Industrial control systems have been essential components of the critical infrastructure for decades. Securing these systems is essential to protect their integrity and availability of the equipment under control and the associated information. The control systems requiring protection are very similar. They are applied in virtually all industrial sectors using similar or common configurations. The products and technologies used to assemble and configure these systems are available from a number of suppliers. The primary functional requirements for these systems are also largely the same, although the relative weights placed on specific requirements may vary by application. Those conducting a critical analysis of the security-related requirements often come to very similar conclusions, rega...

  • 1
  • 2