Zero Trust, Controlled Privileges and Data
ARCON has always propagated the message of controlling and protecting the inner realm of an organization’s IT network. It builds the foundation for robust cybersecurity. Whether the cyber-criminal sits outside the realm or is present inside the periphery, typically it is the compromised insider-privy to confidential information- who is behind an insider attack or cyber-espionage. […]
Critical IT Infrastructure: Time to Push the Alert Button
Overview It is not uncommon that critical systems are often targeted by cyber criminals. And we have documented it from time to time. But this time the attack was on toll collection systems. Indeed, gone are those days when you take out your wallet to pay highway tolls while driving through the city suburbs. Today […]
Unauthorized Access: It’s not just about databases
Overview A recent report by The Economic Times (CISO) revealed that more than 600 twitter accounts, emails and websites pertaining to the government of India were compromised in the last five years. CERT-In, the official government body that notifies the affected entities along with remedies, have also confirmed these shocking statistics. The ‘Digital India’ drive, […]
Data Security: A Never-ending Concern
It is not a bank, a government entity or a healthcare organization! This time the cyber crooks strike hard on the entertainment industry! Recently, a USA-based vendor that designs graphics processing units for the gaming and professional markets suffered a compromise of emails of more than seventy thousand employees. Can there be anything worse? The […]
Secure Passwords, Save your Digital Assets
Who can forget the infamous data breach incident of one of the popular file hosting service providers where more than 60 million users’ email addresses and passwords got affected? An employee just reused a password at work and that was the mistake. The password was broken through to steal the valuable records of the organization. […]