Saturday, May 10, 2025
Alternative Way
  • Home
  • Latest
    • Latest
  • News
  • World Tech
  • World Gaming
  • Minecraft
  • Guides
  • Contact Us
  • About The Team
    • Privacy Policy
    • Terms of Use
No Result
View All Result
  • Home
  • Latest
    • Latest
  • News
  • World Tech
  • World Gaming
  • Minecraft
  • Guides
  • Contact Us
  • About The Team
    • Privacy Policy
    • Terms of Use
No Result
View All Result
Alternative Way
No Result
View All Result

India Witnessed Spike in Cyber Attacks Amidst Covid-19

Gordon James by Gordon James
October 3, 2021
in Tech
0 0
0
Home Tech

India Witnessed Spike in Cyber Attacks Amidst Covid-19

Awareness in the context of COVID-19 is not only a medical, social and economic threat, but also a cyber security crisis. The pandemic has posed new challenges to business in terms of remote cooperation and business continuity.

As remote working for better business continuity increases, employees use various internet tools. As companies and individuals become increasingly dependent on technology and involved in the fight against the pandemic, attackers have more opportunities than ever to defeat the pandemic.

According to the April PWC report, the number of threats to the security of Indian society doubled by March 2020 – the 100 percent increase between 17 March and 31 December 2010 is particularly worrying. From March to March 20th. March from January 2020.

Sanjay Dhotre, Minister of State of the Union for Electronics and Information Technology (MeITY), said more than 350,000 cyber attacks were recorded in India in the second quarter, three times more than in the first quarter of 2020. He also pointed out that 700,000 cyber security incidents have been recorded as of August 2020.

Major Cyber Security crises in rooms

According to the ACRONIS Cyber Readiness Report 2020, 31 percent of companies worldwide experience at least one cyber security incident per day. However, India reports a doubling in the number of cyber attacks per day, with most cyber attacks involving phishing, DDoS, videoconferencing, use of weak services and malware.

The phishing campaign is the most disturbing attack, as it reached its peak during this pandemic. Although fewer people are affected by malware, the problem is even more acute in India, where malware reports are almost twice the global average.

In addition, 39 percent of the organisations surveyed were attacked via videoconferencing. Among them, Canada, India, Switzerland and the United Kingdom are the most affected countries.

Thematic phishing emails and malicious coronavirus websites with useful information about COVID-19 have become a major threat to businesses. Moreover, according to the Seqrite report, 400,000 new ransom attacks were identified between April and June 2020.

In most cases, these cyber attacks have managed to access a remote system using vulnerable services.

Why is India so vulnerable to cyber attacks?

Growing use of the Internet and mobile technologies – INTI’s Aayog report indicates that India ranks third in the world in terms of the number of Internet users after the United States and China. Due to the exponential growth in the number of internet and mobile phone users, the number of cyber attacks in India and the rest of the world has increased significantly.

Ignore – internal security threats Companies are more concerned with ensuring business continuity through uninterrupted operation than with filling gaps in their external infrastructure. When confidential data is transferred between different departments without proper control and registration, it becomes difficult to detect the flaws of an attack.

Counteracting external threats – With increasing external threats, an organization cannot be 100% prepared. Few Indian companies support security measures such as web application firewalls to monitor external threats and stop cyber attacks when they occur.

Vulnerabilities detected during remote operation – The main vulnerabilities occurring during a sudden transition to remote operation are weak authentication methods, insufficient monitoring and open servers (DNS, VPN, RDP, etc.).

In addition, many employees are generally not aware of personal hygiene online. Through this work, employees around the world can access their personal e-mail and social networking sites on their official computers.

In general, with the merging of private and professional life online, cyber-attacks can easily take place via unprotected personal accounts.

Lack of expertise in cloud technology – To ensure easy access to data from any device, anywhere, many companies have adopted cloud technology.

However, you do not have sufficient internal resources to manage and secure the API, SaaS or containers. The proliferation of poorly configured cloud architectures will inevitably open the door to attackers.

Pandemic landscape requires modern protection

Here are some golden tips to keep you out of these recent cyber security incidents:

  • Train your employees in safety principles
  • Pay attention to the attachments, links or texts you receive by e-mail, especially if the subject refers to KOVID-19.
  • A reliable teleworking policy
  • Use only reliable sources, such as legitimate websites, to obtain the most up-to-date information.
  • Do not disclose your financial or personal information via email or phone calls to strangers.
  • Promote the use of office equipment for official purposes only.
  • Do not use passwords between different accounts and applications.
  • Back up and save your data separately
  • Use of multi-factor authentication
  • Update your stack with cloud-based WAFs such as AppTrana, a next-generation cyber security suite that includes vulnerability assessment, virtual patching, zero false positives, DDoS attack prevention and more.

Conclusion

In the area of cyber security, cyber criminals are at the forefront of training, while security experts monitor the improvement of preventive measures. However, with the advent of advanced technologies, this scenario is beginning to change.

The next generation of threat monitoring and forecasting tools goes beyond a rules-based system to detect cyber threats and identify potential threats safely and quickly.

With sufficient national awareness of cyber security and a good policy, companies must be able to deal effectively with cyber threats in the future.

 

Related Tags:

Total
0
Shares
Share 0
Tweet 0
Pin it 0
Share 0
ShareTweet
Gordon James

Gordon James

Next Post
How to Block Websites on Android [4 Easy Methods]

How to Block Websites on Android [4 Easy Methods]

  • Trending
  • Comments
  • Latest
How To Get Free Internet On Android Without Service

How To Get Free Internet On Android Without Service

March 10, 2022
🥇 +4 Neo Geo Emulators for Android  List ▷ 2021

🥇 +4 Neo Geo Emulators for Android  List ▷ 2021

October 3, 2021

Fix: Notifications not working on Nova Launcher

October 3, 2021
How to Fix OpenVPN Connected but Not Changing IP Address

How to Fix OpenVPN Connected but Not Changing IP Address

October 3, 2021

Setting Up Directory Sync Between On-Premises Active Directory with Microsoft 365 Azure AD

0
🥇 DELETE ACCOUNT from PS4  ▷ Step by Step Guide ▷ 2020

🥇 DELETE ACCOUNT from PS4  ▷ Step by Step Guide ▷ 2020

0
🥇 PPTX File Extension  What is .Pptx and how to open them? ▷ 2020

🥇 PPTX File Extension  What is .Pptx and how to open them? ▷ 2020

0
🥇 Make a Crossword in Microsoft Word  Step by Step Guide ▷ 2020

🥇 Make a Crossword in Microsoft Word  Step by Step Guide ▷ 2020

0
What to Know About Car Shipping Services

What to Know About Car Shipping Services

May 7, 2025
CS2 Skins-Why Trade Them?

CS2 Skins-Why Trade Them?

May 7, 2025
Alternative Routes: Successfully Exiting Your Wyndham Timeshare Without The Stress

Alternative Routes: Successfully Exiting Your Wyndham Timeshare Without The Stress

May 6, 2025
The Ultimate Seiko Watch Gift Guide

The Ultimate Seiko Watch Gift Guide

May 1, 2025

There's always an alternative Way!
Find us at 4145 Zolynthian Street, Vylorthos, QP 78425
No Result
View All Result
  • Home
  • Latest
    • Latest
  • News
  • World Tech
  • World Gaming
  • Minecraft
  • Guides
  • Contact Us
  • About The Team
    • Privacy Policy
    • Terms of Use

© 2022 - Alternative Way

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
    • Home – Layout 4
    • Home – Layout 5
  • Travel News

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.