The Changing Face of Cybercrime Amidst Global Pandemic
By MYBRANDBOOK
The state of the global economy has placed more pressure than ever on the resiliency of IT stacks, as data is the new fuel and data decoders are here to stay in the highly competitive landscape.
Twitter India is making a mechanism against the social media accounts in order to stop hatred, fake, instigative and other news which violates the law of the country. The total number of twitter handles in India are around 35 million and total number of Facebook accounts are 350 million and experts say that around 10% twitter handles (3.5 million) and 10% Facebook accounts (35 million) are duplicate/bogus/fake.
Huge Ransomware attacks are happening through the fake news and it has increased to 82% Indian organizations in the last 12 months. Ransomware has targeted around 82% Indian organizations in the last 12 months, As per a report, the attacks cost Indian organisations an average of Rs. 8 crore as they addressed its impact, which included business downtime, lost orders and operational costs.
The report is very surprising as it says around 8% of targeted organisations in India were able to stop the attack before attackers could encrypt their data, compared to the global average of 24%. About 66% of organizations whose data was encrypted had to pay the ransom. However 29% of IT managers managed to recover their data from their backups without giving in to the demands of attackers. It further says, organisations that were targeted by ransomware were located in metros and other larger cities such as Delhi (85%), Bengaluru (83%), Kolkata (81%), Mumbai (81%), Chennai (79%) and Hyderabad (74%).
Technology has become such a significant part of Covid-19, a robust IT infrastructure is of vital importance for smooth integration of software and hardware platforms. At the same time, an organization’s IT infrastructure can be subject to various cybersecurity related risks, hence it is necessary for the organisations to adopt the cyber-resilience strategy.
Chances of compromising the supply chains and critical infrastructure networks, different components of the IT infrastructure can be compromised, causing harm to public security as well as economic and social wellbeing. Luckily there are ways in which organizations can evaluate and ensure the security and integrity of these elements through various available solutions.
TAC Security becomes Cyber Security Assessor for the App Defen
The cybersecurity company, TAC Security has been selected as a key Cyber ...
InterGlobe’s Rahul Bhatia and C.P. Gurnani together announce
In a move that is set to transform the AI landscape, Rahul Bhatia, Group M...
Download masked Aadhaar to improve privacy
Download a masked Aadhaar from UIDAI to improve privacy. Select masking w...
Sterlite Technologies' Rs 145 crore claim against BSNL rejecte
An arbitrator has rejected broadband technology company Sterlite Technolog...
DRUVA SOFTWARE PVT. LTD.
LUMINOUS POWER TECHNOLOGIES PVT. LTD.
TAC SECURITY SOLUTIONS
AMARA RAJA POWER SYSTEMS LTD.
Technology Icons Of India 2023: Debjani Ghosh
Debjani Ghosh is the first woman president of NASSCOM (the umbrella bo...
Technology Icons Of India 2023: Shailendra Katyal
Shailendra is instrumental in Lenovo achieving the no.1 position in PC...
Technology Icons Of India 2023: Ajit Balakrishnan
The Company markets specific channels, community features, local langu...
Leading company into fertilizers in the country
NFL is a dynamic organization committed to serve the farming community...
CSCs enabling rural India digitally empowered
Common service centres (CSCs) are digital access points under the Digi...
Aadhaar: Architecting the World's Largest Biometric Identity System
The Unique Identification Authority of India (UIDAI) is a statutory au...
Crayon Software Experts India Pvt Ltd
Crayon helps its customers build the commercial and technical foundati...
WPG C&C COMPUTERS & PERIPHERALS PVT. LTD.
WPG C&C Computers & Peripherals (India) was incorporated in 2008 and ...
NETPOLEON SOLUTIONS
Netpoleon Group is a Value-Added Distributor (VAD) of Network Security...