ADD ANI AS A TRUSTED SOURCE
googleads
ANI Logo
Menu
Business

Cyble - Indian Tech Co.'s needs to be Buckle Up

Atlanta (Georgia) [United States] / Mumbai (Maharashtra) [India], November 17 (ANI/BusinessWire India): The Indian Technology ecosystem has seen a significant growth in the last five years. In 2019 alone, more than USD 9.3 billion have been invested in the tech ecosystem in the nation.

ANI Nov 17, 2020 17:00 IST googleads

Cyble logo

Atlanta (Georgia) [United States] / Mumbai (Maharashtra) [India], November 17 (ANI/BusinessWire India): The Indian Technology ecosystem has seen a significant growth in the last five years. In 2019 alone, more than USD 9.3 billion have been invested in the tech ecosystem in the nation.
While technological advances have improved the standard of living, the timing for a rise in cybercrime could not have been better given the rapid expansion of digitization of India.
As breakthroughs in the digital technology have bridged global economies, India has not been an exception. On the flipside, with one of the largest Internet population in the world, the growing interconnectivity has paved the way for greater vulnerability in the threat landscape.
There has been a steady increase in the volume of cybercrime in India. For instance, in 2019, India suffered more than USD 15 billion due to cybercrime, cyber fraud, and identity theft. What is gravely concerning is that while these are publicly affirmed numbers, the reality could be much worse.
In the last 12 months, Cyble has observed a significant uptick in cybercriminal activities, including a number of threat actors actively targeting the nation. The motives of cybercriminals range from state-sponsored attacks on government agencies to organized cybercriminals syphoning off confidential data or sensitive user information from businesses.
Here's why Indian companies are turning into soft targets of cyber criminals.

* Volume matters: India has one of the top 10 highest Internet users in the world. From students to government officials, most individuals are using Z-generation apps whether it is for making digital payments, paying mortgage, online banking, purchasing groceries, etc.

* Inadequate regulatory framework: The data privacy and regulatory frameworks are significantly weaker and still in their infancy as compared with most other nations where laws are considerably matured and well in their implementation process. Presently, in India, companies are not required to notify a breach by any mandate, thereby often leaving room for autonomy on the security measures around the data they are collecting. The impact of this is even magnified when the data pertains to personal information (PI) for a sizeable group of individuals.

* Virtually Nonexistent Security Contact: Companies that have been a victim of cybercrime almost always have one thing in common - they do not have a designated CISO in place. Interestingly, organizations often enlist the help of the existing internal IT professionals for managing enterprise security issues. However, these individuals may not possess the requisite experience for performing a risk assessment and implementing strategic measures to combat the threat. They may also be burdened with bandwidth issues alongside inexperience on the security domain.

* Poor Technical Measures: Factors such as the insufficient understanding of the need for an effective information security program coupled with inadequate attention towards a basic security hygiene have fostered malicious cyber activities. Beenu Arora, CEO of Cyble commented - "Most victims have a few common attributes such as a non-existent security awareness culture; Cloud Access Tokens that haven't been changed for months and in some cases, for years; developers embedding credentials in their code repositories; and compromises due to phishing campaigns and credential stuffing. Such lapses in the defense infrastructure are fueling the issues further." At an individual user lever, one of the most common security shortcomings is that of reusing the same login credentials and passwords across multiple sites or apps. This is one of the primary reasons for Credential stuffing. Considered one of the most common types of cyberattacks, Credential stuffing is the theft and misuse of login credentials, typically comprising usernames/email addresses and their corresponding passwords to gain unauthorized access to user accounts. Lately, credential stuffing has emerged as more prominent due to a rise in the number of high-profile breaches.

* Lack of Accountability: Recent incidents have highlighted that organizations are yet to take cybersecurity issues seriously and give it due importance as part of their corporate social responsibility. Upon analyzing several high-profile breaches, Cyble noted that the diversity of personal information collected by organizations after a breach is considerably distressing. Corporations need to take stock of the grim reality of the cyber security space and acknowledge that adequate disclosure is the right move towards establishing customer trust and confidence in the long run.
This brings us to the question of where the company is heading. Public reports have clearly stated that India is an attractive target for cybercriminals for a host of reasons ranging from motives of financial gain to geopolitical agendas. Here are five essential things Cyble recommends technology-based companies to consider.

1. Appoint a CISO - Without a clear vision and accountability on protecting customers' information and intellectual property, it would be a nightmare to manage the risks posed by the ever-evolving threat landscape.
2. Implement a Basic Security Hygiene - The Australian Signal Directorate has released strategies to mitigate cybersecurity incidents. In Cyble's opinion, The Essential Eight, when implemented and governed correctly, can help thwart the majority of the cyberattacks.
3. Bolster Security Awareness Initiatives - Over 80 per cent of cyberattacks originate via phishing and water-holing attacks. Organizations are increasingly using SSO to connect to their code repositories or third-party apps. Once a privileged account is compromised, the attacks can gain access to a large part of the company's infrastructure, including customer records. Irrespective of how secure an enterprise's IT security structure is, the company is only as protected as its user base. To improve awareness about phishing, organizations should conduct routine tests on the employees with fake phishing emails to educate them and help them learn how to recognize a real phishing attack.

4. Implement multi-factor authentication where possible. Ensure access token and secret keys are changed and accounted regularly. This builds an additional layer of security for protecting highly sensitive user PI.
5. Implement a Robust Security Monitoring capabilities - As the landscape of an organization evolves, it is prudent to maintain a situational awareness of the threats, risks, and vulnerabilities.
This story is provided by BusinessWire India. ANI will not be responsible in any way for the content of this article. (ANI/BusinessWire India)

Get the App

What to Read Next

Business

India market "relatively resilient" compared to its Asian peers

India market

The deepening conflict in West Asia has placed the Indian economy and the broader Asian region in the "eye of the storm," as supply chain disruptions and surging energy costs threaten to trigger a significant negative growth shock.

Read More
Business

Adani Foundation to connect 10 lakh women nationwide

Adani Foundation to connect 10 lakh women nationwide

The Adani Foundation, today, declared that in the next one year, it will connect one lakh women in Maharashtra with the Swabhimaan initiative. For the future, Adani Foundation has announced to connect 10 lakh women in India with the same initiative and make them strong.

Read More
Business

Govt Urges Citizens to Avoid Panic Booking

Govt Urges Citizens to Avoid Panic Booking

Amid global energy disruptions following the closure of the Strait of Hormuz, the government has assured that the domestic supply of LPG, petrol, diesel, kerosene, and natural gas remains stable, while citizens are urged to avoid panic booking and conserve fuel, said Sujata Sharma, Joint Secretary of the Ministry of Petroleum and Natural Gas, today.

Read More
Business

India Emerging as Stable Investment Anchor in Turbulent Global

India Emerging as Stable Investment Anchor in Turbulent Global

Mumbai (Maharashtra) [India], March 12: As military conflict in West Asia disrupts energy supplies through the Strait of Hormuz and global liquidity tightens, leading investors, policymakers and capital markets leaders gathered at IGF Mumbai 2026: Catalysing Capital to assess India's position in an increasingly fragmented global economy.

Read More
Business

India pushes for green ship recycling, euro-compliant yards

India pushes for green ship recycling, euro-compliant yards

India is rapidly expanding its ship recycling sector and upgrading shipbreaking yards to meet European environmental standards, as part of a broader effort to strengthen its maritime industry and reduce logistics costs, Sushant Kumar Purohit, Chairperson of VO Chidambaranar Port Authority, said today.

Read More
Business

Sarbabharatiya Sangeet O Sanskriti Parishad Convenes 48th Annual

Sarbabharatiya Sangeet O Sanskriti Parishad Convenes 48th Annual

Kolkata (West Bengal) [India], March 12: Sarbabharatiya Sangeet O Sanskriti Parishad officially commenced its 48th Annual Convocation yesterday, March 11, at the historic Mahajati Sadan, Kolkata. The three-day event, running from March 11 to 13, celebrates the institution's legacy of cultural service and its mission to bridge traditional heritage with a modernized future.

Read More
Business

Indian envoy in Shanghai meets Ant Group top official

Indian envoy in Shanghai meets Ant Group top official

Consulate General of India in Shanghai Pratik Mathur on Thursday met Carrie Suen, Vice President and Head of Global Affairs and Strategic Development of Ant Group.

Read More
Business

Nandita Desai Unveils a Unique Painting Exhibition on Vintage

Nandita Desai Unveils a Unique Painting Exhibition on Vintage

New Delhi [India], March 12: There is something quietly powerful about a window... It neither confines nor escapes. It simply allows us to look, to pause, to breathe between inner and outer worlds. In The Painted Window, multi-award-winning contemporary artist Nandita Desai turns this everyday architectural element into the soul of her fifth solo exhibition, transforming vintage and handcrafted windows into luminous works of art. Running from 16th to 21st March 2026 at the Kamalnayan Bajaj Art Gallery, Nariman Point, Mumbai, the exhibition brings together 50 artworks - windows that look outward at the world, and inward at memory and quiet reflection.

Read More
Business

AdvantageClub.ai Celebrates 100 Global Women HR Leaders Driving

AdvantageClub.ai Celebrates 100 Global Women HR Leaders Driving

Gurugram (Haryana) [India], March 12: AdvantageClub.ai, a global AI-powered employee rewards, recognition and wellbeing platform, has unveiled the winners of the Most Admired Women Awards (MAW) 2026, honouring 100 outstanding women HR leaders who are driving transformation across the global workplace landscape.

Read More
Business

Kody Technolab Ltd. Launches Medigo Robot

Kody Technolab Ltd. Launches Medigo Robot

Ahmedabad (Gujarat) [India], March 12: Kody Technolab Limited today announced the launch of Medigo Robot, a health screening robot developed to enable rapid preventive health assessments and expand access to routine screening across healthcare, public, and institutional environments.

Read More
Home About Us Our Products Advertise Contact Us Terms & Condition Privacy Policy

Copyright © aninews.in | All Rights Reserved.