How does Your Current CyberSecurity Posture looks like ? Where does your security strategy stand? What are your biggest risks? Where should you focus your efforts? Where do you stand with respect to your peers ? Why CyberSecurity Maturity Assessment ?
Majority of the answers for above questions for an organisation lies in its Cyber Security Maturity, and can easily be unfolded by security maturity assessment of an organisation.… Read More
Recently, you might have heard in news about COSMOS Bank Breach, a 112-year old cooperative bank in India and the second largest in the country being hacked and crores were siphoned off. COSMOS Bank has faced monetary losses because of recently happened COSMOS Bank hack. And also they might have to face non-monetary losses like any other financial organisation post breach.… Read More
This blog is based on the Google’s study on leaked credentials which was published by Google along with researchers from University of California, research paper titled “Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials” .
Researcher have collected data over the course of March, 2016–March, 2017, They identified:
- 788,000 potential victims of off-the shelf keyloggers;
- 12.4 million potential victims of phishing kits;
- 1.9 billion usernames and passwords exposed via data breaches and traded on blackmarket forums
Key Highlights (Google’s Study On Leaked Credentials):
1- More Than 20% Users Were Affected:
As per the study, 7–25% of exposed passwords match a victim’s Google account.… Read More
The Deep Web contains nearly 550 billion individual documents. Search engines can only access 16% of the available information, this gives you an idea of the huge size of dark web. There is about 5+ Billion Leaked Credentials, Credit Card Breaches information available on dark web. In this blog, we will talk about Top 8 ways to handle leaked credentials incidents.… Read More
As previously we talked briefly about digital footprint and how to manage it in our blog 4 Ways To Manage Enterprise Digital Footprint. Here we will talk in details about how to Secure Enterprise digital footprints. An Enterprise Digital Footprint is an inventory of all the digital assets over internet (web, mobile, individual, social etc) related to an enterprise which was exposed to internet intentionally or sometimes unintentionally.… Read More
As the name suggest “Digital Footprint”, it’s the unique traces of your digital presence. As per wikipedia, “ Digital Footprint refers to one’s unique set of traceable digital activities, actions, contributions and communications that are manifested on the Internet or on digital devices.” Here in this blog we will emphasise on how to manage enterprise digital footprint.… Read More