Separator

Security is all about Illusion!

Separator
Security is all about  Illusion!
PM Ramdas, Head - Cyber Security, Reliance Group
Headquartered in Navi Mumbai, Reliance Group is an Indian conglomerate which servers millions of customers across telecommunications, power, financial services, infrastructure, media and entertainment, healthcare, and many other sectors.

Gone are the days when wars took place amongst armies, battalions, and legions. Gone are the days when lives were lost in millions due to international conflicts. At present we are in a scenario where wars are not instrumented using guns and troops, but ‘PCs’.

The silent cyber wars of the 21st century are brewed inside homes, initiated by civilians and won by intellect, not instruments of destruction. This newly invented method using hacks through which victory is calculated has given birth to a fresh range of soldiers! And the only element you need is an internet connection and a pinch of patriotism.

As the world goes digital fast, its vulnerabilities also grow at a worrying pace, and this is the time when the device and data security takes the centre stage. With just a few million dollars and a phone number, one can snoop on any call or the text from the phone - no matter where you are or where the device is located. That’s the bold claim of Israel’s Ability Inc., which offers its set of bleeding - edge spy tools to governments across the globe. These cyber frauds, by nature, are complex and difficult to detect.

According to Indian Intelligence agencies recent reports, rivals, adversaries, and militants are targeting large corporates for financial gains as well as to defame them. These hackers use several undetectable tools to gain unlimited access to infected endpoints. Hence, these attacks will be stealth in nature and can’t be traced by any common man. Unless and until our society recognizes cyber bullying for what it is, the suffering of a thousand silent victims will continue. We need to bear in mind that these cyber bullies hide behind a mask of anonymity online and can cause ineffable harm to the victims without even having any direct physical access.

In the wake of many targeted attacks we have been witnessing, a lot needs to be done by us to win the cyber war. Hackers can get away with anything due to geographical shrinking. The internet was first used to convert and radicalise people online. Now it is used to spread cyber terrorism, which hurts the economy, affects businesses, disrupts services and facilitates extortion and blackmail. These attacks can only be recognized and detected with several tedious monitoring and deep root analysis involving complex tools and systems.

Further, we are aware that countries are deploying cyber warriors to attack vital organisations in other(enemy)
countries. Many countries have deployed cyber warriors by providing them with immunity from the consequences. The most vulnerable industries are banking, finance, energy, oil, electric power production, supply sector, nuclear power and of course defence.

Cyber-espionage has been the single greatest threat in recent years and this can be expected to continue frequently. Cyber-criminals will continue working to improve methods to attack organizations and companies, as well as making them more difficult to detect. Online crime, espionage, sabotage and subversion are never going to vanish nor is the temptation for governments to treat the internet as a new combat zone, alongside land, sea, air and space.

" While Managing Network Security Can Be A Complex, Resource-Intensive Task, It’s Crucial For Senior Management To Have An Accurate Picture Of The Organization’s Security Posture At All Times And The Ability To Act Quickly To Close Any Gaps"

Crime-fighting is a better analogy than warfare and a useful idea. Instead of saying, police need to get hold of criminals, why don’t we as common man help prevent crimes in the first place by taking sensible precautions. We have to fine-tune our protection mechanisms and develop robust contrivances to safeguard against such attacks. We need to spend resources to upgrade our technology. Security audit needs to be done regularly by a third/neutral party. An internal team can conduct an investigation to find the people behind such attacks (if any,) which will eventually strengthen our arms to safeguard our vital corporate data.

Security policy enforcement is one thing to have a security policy that defines how the IT platform behaves and another to actually validate that it is being enforced across your network. Doing the former but not the latter might allow you to comply with some regulations, but it won’t make your network safer.

Last but not least, while managing network security can be a complex, resource-intensive task, it’s crucial for senior management to have an accurate picture of the organization’s security posture at all times and the ability to act quickly to close any gaps. Organizations must constantly monitor their network for changes to configurations and ensure that these changes are approved and compliant with policy. It’s a collaborative effort across the enterprise—network operations, security operations, and the CIO.

Security policy enforcement is one thing to have a security policy that defines how the IT platform behaves and another to actually validate that it is being enforced across your network. Doing the former but not the latter might allow you to comply with some regulations, but it won’t make your network safer.

Last but not least, while managing network security can be a complex, resource-intensive task, it’s crucial for senior management to have an accurate picture of the organization’s security posture at all times and the ability to act quickly to close any gaps. Organizations must constantly monitor their network for changes to configurations and ensure that these changes are approved and compliant with policy. It’s a collaborative effort across the enterprise—network operations, security operations, and the CIO.

In Print




Most Viewed

From 'Volume' to 'Value': India Inc's Mantra to Capture the Global Pharmaceutical Market A Fight Back from Arabian Peninsula When will The Tech Industry’s Lay-off Season End? The Story of a Broken Trust Technology Key To Global Travel Recovery What To Keep In Mind When Selecting The Right Air Compressor For Replacement? The Best Way to Recover from Ransomware Attacks How Tensions Grew Worse between Elon Musk and Donald Trump New Markets, New Brands: Tailoring Success for Different Places Empowered Leadership in a Changing Legal World Four Key Steps For Healthcare Providers To Combat Ransomware Turning Vision into Value: How I Built Purposeful Digital Ecosystems in the UK Dave Thomas: A Role Model for Aspiring Entrepreneurs, Philanthropists Digital Analytics Products: How Organizations Choose Them Kelly Ortberg: The New Boeing CEO Who is Already on the Headlines India’s Military Alacrity for Modern Threats Reshma Saujani: Reshaping Social Attitudes Around Gender and Tech India is Manifesting Leadership in Drone Technology 5 Greatest Role Models in the Manufacturing Industry Creating a Stronger Ecosystem by Fixing the Nuts & Bolts of the Economy Microsoft for India: Making India for Future Ready India's UPI Launch in France Opens Gateway to Global Fintech Power Tim Cook Nears Retirement, Who Will Take Over Apple's Throne? Soil Based Microbial Fuel Cells Could Protect the Environment from Flammable Chemicals The mantra of Academic Collaboration Echoes on this Teachers’ Day Indian semiconductor Boom Has Abundant Room for SME-preneurs Indian Healthcare Ecosystem is Hosting a Multidimensional Paradigm Shift Being a True Republic: You Got to Love this New, Powerful India Qatar World Cup 2022 Might Be Over, But Arabian Peninsula’s Sports Dream is Just Beginning Reimagining the UK–India Partnership in a Changing Global Order These Schemes Will Facilitate Women Entrepreneurs Decarbonization & Sustainable Future: Technology & What it can Do?


🍪 Do you like Cookies?

We use cookies to ensure you get the best experience. Read more…