Top 5 Benefits: Why Organisation Must Do CyberSecurity Maturity Assessment ?

How does Your Current CyberSecurity Posture looks like ? Where does your security strategy stand? What are your biggest risks? Where should you focus your efforts? Where do you stand with respect to your peers ? Why CyberSecurity Maturity Assessment ?

Majority of the answers for above questions for an organisation lies in its Cyber Security Maturity, and can easily be unfolded by security maturity assessment of an organisation.Read More

Business Impact Of COSMOS Bank Breach

Recently, you might have heard in news about COSMOS Bank Breach, a 112-year old cooperative bank in India and the second largest in the country being hacked and crores were siphoned off. COSMOS Bank has faced monetary  losses because of recently happened COSMOS Bank hack. And also they might have to face non-monetary losses like any other financial organisation post breach.Read More

Top 9 Highlights Of Google’s Study On Leaked Credentials

This blog is based on the Google’s study on leaked credentials which was published by Google along with researchers from University of California, research paper titled “Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials.


Researcher have collected data over the course of March, 2016–March, 2017, They identified:

  • 788,000 potential victims of off-the shelf keyloggers;
  • 12.4 million potential victims of phishing kits;
  • 1.9 billion usernames and passwords exposed via data breaches and traded on blackmarket forums


Key Highlights (Google’s Study On Leaked Credentials):


1- More Than 20% Users Were Affected:

As per the study, 7–25% of exposed passwords match a victim’s Google account.Read More

Top 5 Benefits Of Analysing Enterprise Digital Footprints

As we have already talked about the digital enterprise digital footprint and how to manage it, Now we will emphasise on some of the benefits of analysing enterprise digital footprints :

Enterprises are generating a lot of data these days . It’s been estimated that, by 2020, firms will manage 28 zettabytes of data, and almost 11 zettabytes of that data will be generated by them.Read More

Top 8 Ways To Handle Leaked Credentials Incidents

The Deep Web contains nearly 550 billion individual documents. Search engines can only access 16% of the available information, this gives you an idea of the huge size of dark web. There is about 5+ Billion Leaked Credentials, Credit Card Breaches information available on dark web. In this blog, we will talk about Top 8 ways to handle leaked credentials incidents.Read More

4 Steps To Secure Enterprise Digital Footprints

As previously we talked briefly about digital footprint and how to manage it in our blog 4 Ways To Manage Enterprise Digital Footprint. Here we will talk in details about how to Secure Enterprise digital footprints. An Enterprise Digital Footprint is an inventory of all the digital assets over internet (web, mobile, individual, social etc) related to an enterprise which was exposed to internet intentionally or sometimes unintentionally.Read More

4 Ways To Manage Enterprise Digital Footprint

As the name suggest “Digital Footprint”, it’s the unique traces of your digital presence. As per wikipedia, “ Digital Footprint refers to one’s unique set of traceable digital activities, actions, contributions and communications that are manifested on the Internet or on digital devices.” Here in this blog we will emphasise on how to manage enterprise digital footprint.Read More