Digital economy is at risk with the growing cyber attacks

Spread the love

According to Cert-In, there is an looming threat of a massive phishing attack in India. The new phishing attack could imitate government organisations and can steal sensitive personal data and financial information. The advisory claims that the phishing attack, conducted by “malicious actors”, will be done in the guise of a Covid-19 related directive and it is expected to begin on 21 June. These cyber-attacks will be focused on both individuals and business organisations ranging from small to large.

 

Make sure you know about “shadow IT” solutions, It is where non-IT staff find their own ways of solving technical problems, for convenience or speed. If you have a bunch of colleagues who are used to working together in the office, but who end up flung apart and unable to meet up, it’s quite likely that they might come up with their own ways of collaborating online – using tools they’ve never tried before. Shadow IT risks that are putting your company in danger.

 

Tips for individuals for secure remote working

 

# Don’t open documents or spreadsheets attached to unsolicited emails : Even if they promise news you are interested in, any information in the attachment will almost certainly be available from a more direct source, via a link of your own choosing. If you are genuinely interested to know the official Johns Hopkins coronavirus figures, find your own way to the real site. That will not only avoid malware or phishing attacks but also protect you from manipulated data and fake news.

 

Secondly, Don’t enable macros in Office files on the say-so of an email : “Enable macros” sounds innocent, and crooks often tell you that you have to do it in order for Word or Excel to display the file properly. Don’t do it! “Macro” is a jargon word that really means “an embedded program that can do almost anything, including downloading malware, installing new software and stealing files”.

 

Every day, employees from all departments are installing unapproved software or using cloud apps to get their work done. The whisperings in the dark web and hackers’ forums have increased in volume and intensity with actual mentions of Indian targets. As per the report says, plans are afoot to steal sensitive data like trade secrets, launch denial of service attacks and deface websites or launch malicious phishing campaigns targeting Indian government websites and companies in the telecommunications, pharma, smartphone and construction industries.

 

For the first time in as many years, both India and China have suffered loss of lives on the Line of Actual Control or LAC. Now, India has changed rules of engagement at China LAC. Reports suggest that Indian Army from now on allows field commanders to use firearms in case of ‘extraordinary’ circumstances on India-China LAC.

 

Indian consumers has came-out strongly against, every company that is either of Chinese origin or backed by China. These include popular consumer-faced startups such as Paytm, Ola, Zomato, MakeMyTrip, and many more. Even though all these companies are run by Indian entrepreneurs, are based out of India. Indian consumers expressing their anger and disappointment on the chinese electronics , smartphones and home appliances as well.

 

Analysts predicts, that non-Chinese brands such as Samsung, LG might finally have an upper hand and gain some extra market share in India against the highly competitive Chinese brands during this time.

Related posts

Leave a Comment

90 − = 85