Cybersecurity in 2021: Plan Now To Confront Future Challenges

As 2021 has come close to our doors, it is an opportune time for companies to relook and set an effective strategy to navigate through the cybersecurity challenges in the coming year. All the C-level executives must brainstorm to effectively deal with concerns such as meeting regulatory compliance, keeping pace with emerging trends and technologies, preparing a strong incident response and remediation plan, and creating policies to securely manage critical data throughout its lifespan. All these tasks need to be accomplished while keeping in mind the security of sensitive digital assets, which becomes even more difficult when we all are in the midst of a pandemic. It is important for organizations to set their goals and priorities regarding the cybersecurity challenges right from the beginning of the new year.

Let’s discover some promising ways that can help in mitigating cybersecurity risks and strengthening the IT infrastructure in 2021.

  • Focus on Cloud Security

Cloud migration has increased incredibly in 2020. As per a report from the Synergy Research Group, global spending on cloud infrastructure services increased 33% in Q2 2020 over the same period in 2019 to $30 billion. During this pandemic, the velocity of creating digital-native business applications and services has greatly enhanced as enterprises are preparing themselves for survival in the post-pandemic period.

In 2021, organizations must look for misconfigurations and human errors, implement strong practices for container security, and meet compliance with industry regulations such as PCI, HIPAA, GDPR, etc. Companies should adopt and execute such a cloud security strategy that accelerates significant workplace transitions, to incorporate constantly increasing remote workforce. They can also prioritize Privileged Access Management (PAM) & Identity Access Management (IAM) to provide the least privilege access to the confidential data. Also, investment in Zero Trust Policy and Micro-segmentation will be a good option for cloud security.

  • Look for Insider Threats

Insider threats are one of the biggest drivers of the security risks faced by organizations as an insider has all the necessary rights required to assess the company’s critical assets. Identification and detection of malicious insider activities is a daunting task as companies often lack the ability to detect such unusual activities within their premises. According to a report by Forrester, it is expected that internal incidents will be accounted for 33% of data breaches in 2021.

Organizations should consider insider threat defence in order to prevent such incidents while being cautious not to degrade employees’ privacy, company’s culture and standards for labour practices. They can follow the below-mentioned security procedures to mitigate insider threats:

    • Conduct regular risk assessments
    • Create and document security policies such as account management, user monitoring and password management policies
    • Invest in security software like endpoint protection, intrusion detection and prevention and traffic monitoring
    • Strengthen the network security
  • Add Multi-factor Authentication (MFA)

Throughout 2020, data breaches remained at the top of the headlines across the globe. Malicious activists have gained incredible success in stealing sensitive business data with the help of stolen usernames and passwords, which are now easily available on underground marketplaces like Dark Web. Threat actors take advantage of the fact that most of the users still do not select strong and unique passwords for their accounts.

MFA reduces the risk by providing additional security methods, apart from username and password, such as One-Time Passwords (OTPs) that you often receive via emails & SMS. It is expected to be a crucial factor in protecting a user’s identity and preventing unauthorised account accesses. As per a recent report from MarketWatch, the global Multi-Factor Authentication (MFA) market size is expected to reach USD 32110 million by the end of 2026, with a CAGR of 19.6% during the forecast period (2021-2026).

  • Keep an Eye on Human Vulnerability

In 2021, enterprises must keep a sharp eye on the security of their workforce against the growing and evolving social engineering and phishing attacks. CISOs and other security leaders need to focus on and improve the casual attitude of employees towards cybersecurity in order to reduce the occurrences of data breaches and cybersecurity attacks.

It will be vital for organizations to look into cybersecurity education and training of their workforce, particularly when remote work is being followed globally. Employees should be made aware of the basic practices such as the creation of a strong password and double-check the URLs (embedded in emails) before clicking on them.

  • Review Data Security & Privacy Policies

In 2021, the data privacy landscape will remain in the spotlight. With the increasing focus on compliance with industry regulations, organizations will be looking forward to the security and privacy of data more seriously than ever. Classifying data as public, private and confidential is not sufficient enough to avert data breaches. Companies often provide employees with access to data that they do not need, and hence they are more likely to face a data security incident.

Strong data access controls and policies should be considered as one of the top priorities in 2021 in order to ensure the security of critical business data. Solutions, like email security, can be viewed and implemented to keep a check on what data is being transferred or received to/from outside the organizational perimeter. Companies must regularly review policies to track how their critical information is being stored and update authorizations on a regular basis.

Read More
Cybersecurity Preparedness – Lessons We Learnt In 2020

To call 2020 a year filled with unprecedented challenges would not be an overstatement. Right from the eruption of COVID-19 pandemic to a comprehensive list of disruptive cyber-attacks, 2020 has engendered enormous concerns to enterprise cybersecurity teams. While these cyber-attacks have caused terrible damage to many organizations globally, they have also presented several key lessons for cybersecurity and information security professionals moving forward. By taking into consideration these lessons, enterprises can augment and strengthen their security posture against the rising wave of cyber threats.

Now as we move towards a new calendar year, let us have a look at some critical areas that need to be looked after cautiously.

Data Security is Crucial

As per a recent report from Risk Based Security, the number of records exposed through the end of September 2020 has increased to 36 billion. Two breaches in Q3 leaked more than 1 billion records and four breaches exposed over 100 million records, which together accounted for approximately 8 billion exposed records.

Therefore, companies must look to protect their sensitive data in all forms i.e. at rest, in motion and in use throughout its lifespan. They should ensure data integrity, security and consistency by heeding advanced security controls like robust encryption policies that can help in reducing the impact, to some extent, if data is exfiltrated or stolen. They can establish a data governance program to manage the flow of critical information across the organization. This program may include (but not limited to) the below points:

  • Assigning roles and responsibilities for managing and monitoring the consistent and effective management of the data assets
  • Identifying who can take what actions, with what data, under what circumstances
  • Establishing different security levels for different categories of data like highly sensitive, moderately sensitive and publicly available information

Check For Vulnerabilities

Threat actors discover and exploit vulnerabilities in order to penetrate corporate networks and infect critical resources with malware, Trojans and worms. Organizations must seek to identify and address the existing security gaps through vulnerability assessments that should be followed as a continuous practice performed at regular intervals. Such assessments have become more important than ever as employees have started coming back to their offices after a long break of remote working. Safety practices such as patching vulnerabilities and reviewing security settings will play a key role in mitigating cybersecurity incidents.

Cybersecurity Awareness & Training for Employees

As humans are more likely to create errors in comparison with digital assets, threat actors primarily target them using popular techniques like Social Engineering and Phishing. So far, we have witnessed several instances where cybercriminals leveraged human vulnerability to cause damage and gain huge profits.

Did you know that around 22% of breaches in 2019 involved phishing? (Source: Verizon DBIR 2020)

In 2020, the phishing attacks have continued to explode. As per the APWG’s Trend Report Q3 2020, around 199,133 unique phishing websites were detected in September. The report revealed that Saas & webmail sites were the most targeted industry sectors in Q3 2020. The most noticeable thing is that 80% of phishing sites were protected by the HTTPS encryption protocol.   

Therefore, enterprises must mitigate the probability of human errors through regular training and awareness sessions. Improving awareness will not only enhance cyber hygiene and reduce cyber risks, but also help in cultivating cybersecurity culture within organizations.

Look For Ransomware

Ransomware has been the most prevalent cyber-attack faced by organizations across the world in 2020. As per a recent report by SonicWall, ransomware attacks globally have increased by 40% to reach 199.7 million in the Q3 2020. Enterprises need to remain careful and can follow the below-mentioned practices to ensure their safety:

  • Encourage employees to avoid clicking on the unknown URLs
  • Create data backup
  • Avoid disclosing personal information to unknown calls, texts or emails
  • Promote usage of anti-virus/anti-malware software
  • Conduct security awareness sessions

Be Ready with Incident Response Plan

Companies should follow a proactive approach while preparing themselves to defend cybersecurity incidents. This approach can help organizations to protect their critical data, brand reputation, customers’ trust from getting impacted by malicious activities. An Incident Response plan may include (but not limited to) some key phases including preparing a plan to prevent and respond to events, identify incidents and its severity, containment of the incident before it causes damage, addressing the root cause of the incident and restoration of systems to normal operation.

Towards the End…

Cybersecurity is not an overnight process. It is an ongoing practice that takes time and continuous efforts. This COVID-19 crisis has taught us the reason behind why we are at risk. And that is, we are not enough prepared. We often wait for things to happen and then react accordingly. To stay safe and secure, organizations need to follow a proactive approach and invest in their security infrastructure to prevent themselves from falling short to evolving, complex cyber threats.

Read More
Vulnerability Assessment: Increasingly Becoming Top Priority for C-Suit in The New Normal

Conducting an assessment to look out for vulnerabilities existing within the networks, applications or infrastructure has always been an ideal approach to safeguard your organization against evolving and complex cyber threats. And, doing so on a regular basis takes an organization far ahead of the reach of cybercriminals.

But, during these uncertain times when businesses have adapted to a remote working model, the attack surface has exploded to a large scale. After which, Vulnerability Assessment (VA) has now surfaced as the core requirement of the CISOs, CIOs, COOs and other C-level executives. The reason behind the expansion of the attack surface and growing demand for security assessment includes:

  • Introduction of Personal Devices: Most employees were not provided with company-issued laptops or computers to continue work from home. Consequently, they were using their own devices to access corporate resources and data that may have vulnerabilities or already been compromised. Also, they have made a huge dependency on web conferencing & collaboration tools like Zoom, Microsoft Team Meeting, Google Meet, etc. for daily operations. Throughout this global crisis, threat actors have leveraged such platforms to deceive people and compromise their devices.
  • Migration to Cloud: Owing to the current pandemic, organizations have promptly moved to the cloud to accommodate remote workforce requirements. But this swift movement has also opened them to multiple risks including configuration errors, vulnerabilities within the applications, security oversight issues, etc. As per the Cloud Threat Landscape Report 2020, any unauthorized access to cloud assets can result in losses of more than $50000 in less than one hour. Also, over one billion records were stolen in 2019 due to misconfigured cloud servers.   
  • Insecure Home Networks: Home networks often lack sufficient security measures that are required for a secured connection with corporate resources. For instance, it does not include intrusion prevention systems, advanced firewalls (say WAFs), etc. This may allow cybercriminals to enter into and get access to critical corporate data and applications. As per a report from BitSight, it was found that home networks are 3.5 times more expected as compared to office networks to be infected by malware. Threats like Mirai malware and Trickbot were observed 20 and 3.75 times, respectively, more frequently on home networks in comparison with corporate networks.

How Vulnerability Assessment Helps

As the new normal has begun, businesses are recognizing the need for a proactive approach to detect and remediate the security flaws (if any) to prevent threat actors from causing havoc and stealing sensitive business-critical data. The VA provides a clear picture of the effectiveness of the security controls in place. It enables organizations to fill the security gap in their security posture before getting exposed by the cybercriminals. An effective VA can yield several benefits including:

  • Find known security vulnerabilities before attackers exploit them
  • Discover all the critical assets present on the network, including vulnerabilities associated with each asset
  • List of required future upgrades
  • Define the level of risk
  • Prepare a well-defined response plan

Outsource Vulnerability Assessment Services

Typically, it is often seen that organizations prefer to have their in-house vulnerability assessment team. An in-house team has its business advantages like it has a better understanding of the systems being assessed, and availability as per the company’s schedule or requirement. But due to the lack of skilled resources, it is somewhat difficult to find the right talent and create your own VA team. Alternatively, businesses can outsource security teams to conduct VA in their environment. It saves time and efforts that can be further utilized in other business functions. It can also help CISOs and CIOs to reduce dependency on internal resources, improve prioritization of human assets, meet compliance with different industry regulations, etc.  

How Market is Shaping

As per a report from MarketsandMarkets,  the global Security and Vulnerability Management market is predicted to increase from USD 12.5 billion in 2020 to USD 15.5 billion by 2025, with a Compound Annual Growth Rate (CAGR) of 4.5%. The contributing factors include growing cyber awareness among developing economies, soaring mandates for adhering to regulatory compliances across organizations in different verticals, growing volume of cyberattacks such as phishing, ransomware, DDoS and malware. According to an estimate by Cybersecurity Ventures, the global annual cost of cybercrimes will reach USD 6 trillion by 2021.


Rather than a quinquennial review process, Vulnerability Assessment should be viewed as a continuous process performed after regular short intervals. An in-depth understanding of the potential security risks within the security posture of an organization can aid C-level executives and their security teams to effectively manage business operations in the new normal while reducing the risks of being compromised. Conducting assessments, along with the implementation of appropriate security solutions like Zero Trust and Privileged Access Management will expand the security capabilities of businesses and help them to stay on top of the vulnerabilities.

If you are looking to assess and revamp the security posture of your organization, connect with us at contactcs@tataadvancedsystems.com or visit at https://www.tataadvancedsystems.com/cybersecurity.php

Read More
Cybersecurity in Post-COVID Environment: Time for C-Level Executives to Devise New Strategy

As COVID-19 restrictions have started slackening, people are transitioning back to their offices and social calendar. Unfortunately, this shift is expected to introduce an increased threat of malicious activities. The risk is comparatively higher for those organizations who have not provided their remote employees with adequate VPN and regular software updates. Employees of such organizations exposed to a variety of threats as they were connected to their home network, which lacks required security measures.

Glance through some common risks that employees may have experienced while working from home. 

Risk of Dormant Malware

Threat actors have largely exploited the remote workforce during the lockdown with COVID-themed phishing emails containing malevolent URLs and attachments to get access to victim’s sensitive personal and corporate information. They have also infected systems with different strains of malware that have stayed dormant and may get active once those systems are reconnected to the office networks. Post successful execution, such malware may trigger dreadful cybersecurity incidents and cause massive loss to an organization, both financially and reputationally.

Improper Security Configuration

Lack of proper security configuration is another element that has fueled the growing momentum of cyber-attacks globally. For several organizations, the remote management of employees’ computer systems has been challenging so far. For instance, providing VPN to such a great extent was not feasible for every organization. Also, it cannot be overlooked that employees may not have given sufficient attention to update their work devices or install required security patches while working from home. Linking those devices back to the corporate network may permit malicious activists to exploit the security loopholes in the systems and bring an organization to its knees.


Ransomware, data breaches, social engineering, phishing and malware attacks have surged exponentially during COVID times and impacted organizations globally, irrespective of their vertical. Now, when the employees are returning to the offices, all the C-level executives and security teams must collaborate and work closely to define a new strategy to use technology, tools, people and processes smartly. Gartner has also predicted that cyber-physical security incidents will result in personal liability for 75% of CEOs by 2024. So, they need to remain more cautious than ever before while defending the digital assets of their organization.

Here, we will look at some important steps that can be employed to address potential cyber threats and reduce the chances for threat actors to infiltrate.

  • Security Assessment of IT Infrastructure

The first step towards resumption of work from offices should be a thorough assessment of the entire IT infrastructure. The C-level executives, including CISOs and CIOs, must have a clear understanding of the organization’s current cybersecurity posture as the prolonged inactivity may have surfaced some unpatched vulnerabilities.


  • Expand Cybersecurity Budget

Spending on information security and risk assessment will help organizations to create a robust and resilient infrastructure, repel complex cyber-attacks and minimize the chances of data breaches and leaks. Not long ago, Gartner has also predicted that information security spending is expected to grow 2.4% to reach $123.8 billion in 2020.


  • Examine Employees’ Devices for Vulnerabilities

A majority of organizations have provided their employees with laptops and desktops to continue work from home during the lockdown. It is possible that those systems may get infected with some virus or trojans since they were not connected to the office network. This could be potentially dangerous when those devices will be reconnected to the corporate network as threat actors might exploit the hidden vulnerabilities to cause damage to the organization. Ideally, all such devices should be submitted to the IT team for virus scan and security patches before usage.


  • Allow Sufficient Resources Only

Organizations can identify and allow resources that have privileged access to critical business data and are at increased risk of being exploited by the cybercriminals to resume work from offices. This can help in removing pressure from IT teams working to patch employees’ work devices and mitigating the risk of cybersecurity incidents.


  • Conduct Security Awareness Training

Security awareness training is supposed to be the most important practice towards ensuring cybersecurity as employees have been accustomed to certain habits while working from home, which may pose risks to an organization’s security. Such awareness programs will help in educating employees about the security obligations that they need to follow at the workplace and in staying aware of the new emerging cyber threats.


  • Implement a Zero Trust Model

Zero Trust model is based on the principle – Trust no one, verify all. Since the number of endpoints has continued to rise, it is increasingly becoming difficult to define a security perimeter. An ideal approach would be to adopt a Zero Trust model which ensures that the business-critical applications and information are accessible only to authenticated users and devices.


In the post-COVID environment, organizations, especially their C-level executives need to remain vigilant to different complex cyber threats and vulnerabilities that could arise when employees start working from the workplace. Security teams need to take the opportunity to recheck the efficacy of existing security controls and implement good cyber hygienic activities like virus scans and network traffic monitoring to prevent unauthorised users from accessing the company’s network. To redefine the cybersecurity infrastructure of your organization, connect with us at contactcs@tataadvancedsystems.com


Read More
Awareness – Key To Protection Against Cyber Attacks

Are you aware that 99% of cyber-attacks require human interaction?

Nearly, all cybersecurity incidents start with the exploitation of the human tendency to make errors. Phishing and Social Engineering are the most common methods used by cybercriminals to lure victims and gain a foothold in the targeted system, network or infrastructure. As per the Phishing Activity Trends Report 2020, around 146,994 phishing sites were detected in the Q2 of the current year. This study is quite sufficient to explain the ever-evolving nature and techniques of cybercrimes. A people-centric cybersecurity approach encompassing effective Security Awareness Training is the need of the hour to overturn the growing spike of such cyber-attacks and make organizations more resilient than ever before.

Importance of Cybersecurity Awareness Program for Businesses

While being an important asset for an organization, humans are one of the most vulnerable resources as well. Threat actors target people, rather than systems because of the low levels of security awareness among them. As per the Cyber Risk Survey 2019, less than one-third (31%) of employees receive annual, companywide training from their organizations. Lack of knowledge and awareness concerning cybersecurity among the workforce could result in a major breach or cyber-attack. Cybersecurity Ventures has also predicted that the cost of cybercrimes will exceed $6 trillion annually by 2021. So, the best way to contain the cost and strengthen the defence is to create awareness among employees.

Cybersecurity awareness training helps organizations to inform their employees about how to maintain good cyber hygiene. This may include (but not limited to) propagating knowledge regarding the evolving cyber threat landscape, best practices to identify potential threats like malware and phishing emails, and adherence to applicable compliance and data protection regulations.

Creating such a culture reduces the possibility of a successful cybersecurity incident to a great extent. Also, it helps employees to understand the potential impact that a cyber-attack can make on the organization.

Recommendations for organizations to increase cybersecurity:

  • Perform a thorough audit and identify your valuable assets, which may include critical data like PII, financial information, intellectual property, etc. Figure out who has access to them and what functions they can perform.
  • Focus on high-risk users with escalated privileges. For example, CISO, CIO, CFO and CEO as they have access to high-value data.
  • Review the efficacy of existing security solutions and identify areas of weakness.
  • Automate repetitive tasks to reduce manual efforts, which minimizes the chances of errors.
  • Implement a data recovery strategy to back up data in case of a successful security incident.
  • Establish an incident response plan to take appropriate actions when security is breached.
  • Disseminate strong password policy to all the employees.

Benefits of Implementing Security Awareness Training

Security awareness training is one of the most preferred methods to tackle the growing concern of cyber-attacks. It yields multiple advantages for an organization, including:

  • Reduces the percentage of human errors & minimizes the likelihood of data breaches and cyber-attacks
  • Encourages employees’ to work in a security-focused atmosphere
  • Improves brand reputation and trustworthiness among clients and partners
  • Prevents downtime, which badly affects an organization’s workflow and targets
  • Demonstrates compliance with industry regulations

How Individual Users Can Ensure Cyber Safety?

Some useful security practices recommended for users to remain guarded against malicious activities include:

  • Keep systems and applications up-to-date as updates are designed to patch the existing vulnerabilities.
  • Pay sufficient attention while accessing emails from unidentified sources. Look for red flags and do not click on suspicious URLs, as well as download attachments from such emails.
  • Avoid using identical passwords for different applications.
  • Implement multi-factor authentication as it adds an additional layer of protection.
  • Always enable firewall protection to protect the network against incoming malicious web traffic.
  • Avoid using public wi-fi for internet banking, accessing corporate data, sending critical information, etc.
  • Always prepare a backup of your data at regular intervals to avoid data loss in case of a cyber-attack.

Remember, ensuring cybersecurity is not a one-time process. It is a continual activity that must be maintained and followed by each individual associated with the organization. Cyber awareness helps people to take accurate decisions while confronting an adverse situation, which ultimately strengthens the cyber defence of the company. Always engage yourself in safe online behaviour by implementing recommended security practices.

Read More
Mobile Applications – Intensifying Risks to Data Security & Privacy

Mobile applications are now surfacing as a new feeble link when it comes to user’s information security and privacy. Threat actors are utilizing advanced techniques to evade detection while deploying malicious applications on official app stores. This constantly rising complexity of associated cyber threats, accompanied by growing data breach incidents is keeping CISOs up at night. We have also seen nations prohibiting several mobile applications for infringing data security and privacy regulations.

Impact of COVID-19

The risk of privacy breach has increased manifolds with the growing popularity of mobile applications in the current pandemic when people are asked to self-isolate and work remotely. Mobile devices have become a core tool to play down stress, manage daily tasks, access business-critical data, etc. Video conferencing and collaboration applications like Zoom, Skype, Microsoft Teams, Google Meet, etc. observed a massive surge in usage across the web and mobile platforms.  

As per App Annie, a trusted mobile data and analytics platform, users spent around 1.6 trillion hours on mobile devices in the first half of 2020 with a 220% increase in time spent on business applications.

Besides popularity, the COVID-19 outbreak has contributed phenomenally in letting threat actors capitalize the global disruptions through new cyber threat campaigns. They are distributing fake mobile applications embedded with trojans or virus, which upon execution steal host device’s information that may include (but not limited to) contact information, financial details, username and passwords, device details, etc.

Third-party App Stores

Google Play and App store are the two leading distribution channels for mobile applications. This fact is not concealed from cybercriminals. Hence, they have started focusing on third-party stores that lie outside the boundaries of official app stores. According to the Symantec’s report, third-party app stores host 99% of discovered mobile malware. There are more than 300 third-party app stores across the globe, and the number is still growing.

Users who download mobile apps from such stores face increased security risks as third-party stores do not have stringent application review processes in place like official app stores. According to the 2020 Mobile Threat Report by Wandera, 5.8% and 1.1% of iOS and Android devices, respectively, have at least one sideloaded apps installed. 

Increased Mobile Apps Usage – A Sign of Digital Transformation or Cyber Risk

Certainly, mobile apps have supported organizations to speed up their digital transformation and deliver a great experience to employees and customers. However, on the contrary, cybersecurity is still a major concern when it comes to mobile applications. We often see mobile applications asking for more than sufficient permissions, which are not required for them to function. These permissions pose a huge risk to users’ privacy as they allow an application to access users’ sensitive information.

Let’s go through both dimensions of mobile applications usage i.e. the digital transformation and cybersecurity risk.

 Digital Transformation

Cybersecurity Risk

  1. Strengthen customer engagement for businesses
  2. Quick access to corporate resources/emails/social media accounts
  3. Growth of e-commerce industry
  4. Increase brand reputation and awareness
  5. Enables geo-targeting marketing
  6. Increase in digital payments
  7. Medium of entertainment
  1. Lack of secure data storage
  2. Insufficient data layer protection
  3. Client-side code injection
  4. Improper session handling
  5. Reverse Engineering
  6. Insufficient encryption
  7. Lack of multi-factor authentication



Some recent findings highlighting the risks related to mobile applications:

  • High-risk vulnerabilities were found in 38% of iOS applications and 43% of Android applications. (Source: Positive Technologies)
  • The percentage of fraudulent transactions originating from a mobile application increased from 13% in Q4 2019 to 26% in Q1 2020. (Source: RSA Fraud Report Q1 2020)
  • Rogue mobile apps were accounted for 15% of fraud attacks in Q1 2020. (Source: RSA Fraud Report Q1 2020)
  • The average value of a fraudulent payment transaction in the mobile channel has increased by 60% (from USD 480 to 767) in Q1 2020. (Source: RSA Fraud Report Q1 2020)

Need For Stringent Obligations

As the world is constantly updating its digital footprints, the need for data protection has become more crucial than ever. For developing countries, the growing volume of personal data and adoption of smartphones is continually increasing the demand for a strict and firm data protection obligations that can regulate the use of data collected by mobile applications and give users a sense of security.

As a user, we need to be more vigilant while installing applications and granting permissions keeping in mind the task for which the app is downloaded. We can follow the practice of reading terms and conditions before logging onto any mobile applications to reduce the chances of getting compromised.


Read More
Data Protection Officer (DPO): A Guide to Foster Data Security Culture in Organizations

Need for DPOs is gaining momentum with the rising spike of data breaches globally. As per the Internation Association of Privacy Professionals (IAPP), around half-million organizations registered data protection officers across Europe in 2019. Businesses are experiencing the necessity to secure their corporate data, revamp security approaches, and align themselves with different data protection laws governing the collection, utilization and disclosure of personal data.

Data Protection Officer (DPO) is an expert responsible for ensuring compliance with data protection laws, like GDPR and PDPA, and nurturing the tradition of data protection within an organization. The DPO works together with other functional units engrossed in the processing of personal data as it helps in attaining detailed visibility into the regulatory and data segment of an organization.

Explore more about the responsibilities, challenges and other important aspects of a DPO.

What functions does a DPO perform?

A DPO executes a myriad of tasks to ensure that the organization fulfils all the requirements of protecting business-critical data. Following are some primary functions of a DPO that will help you understand the importance of its role:

  • Designing and implementing policies and processes for managing personal data to ensure compliance with data protection laws such as GDPR and PDPA.
  • Guiding organizations and their employees on data protection obligations.
  • Reviewing organizations’ internal data security strategies, which may include (but not limited to) allocation of responsibilities, internet audits, training of individuals engaged in the processing of personal information, etc.
  • Handling issues (raised by data subjects, public authorities or relevant supervisory authorities) related to data protection, data breach, Data Subject Access Requests (DSARs), etc.
  • Regular evaluation of data processing activities to monitor compliance with data protection laws.
  • Reporting to concerned authorities in case of security risks that might occur concerning sensitive personal information.

Who Needs to Appoint DPO?

An organization is required to hire a DPO if:

  • It is a public institution or body (except for courts).
  • Its core activities require large scale, regular and systematic monitoring of data subjects (such as employees and customers).
  • Its core activities include processing of sensitive, personal information that may include (but not limited to) health information, criminal records, etc.

Besides above-mentioned factors, an organization can voluntarily hire a DPO as a matter of good practice. Also, the DPO doesn't need to be hired internally. Organizations can also outsource the role of a DPO to address the compliance demands of the data protection laws.

What challenges does a DPO face?

While addressing the requirements for an organization to achieve compliance with data protection laws and create a safe environment for data processing, a DPO has to go through several challenges including (but not limited to):

  • Cooperation from other organizational units
  • Finding the right talent to prepare the privacy team
  • Insufficient privacy budget of the organizations
  • Lack of support from principal actors of the organizations
  • Conflict of interest between DPO responsibilities and other duties
  • Unavailability of DPO tools

Why choose us?

  • Vast array of working experience with different sectors
  • Result-oriented and customer-centric approach to data protection
  • Pool of professionals having extensive experience in data security and privacy


To start your data protection journey, connect with us at contactcs@tataadvancedsystems.com

Read More
Ensuring Data Protection in times of COVID-19 using DLP Solutions

Data security and privacy are no longer viewed as just a part of compliance or regulations. Remote working has shattered the situation as organizations are facing unusual hindrances in restricting malicious insiders and outsiders from exfiltrating company’s data. Accordingly, businesses are compelled to adopt advanced security controls to prevent critical information from going outside the corporate perimeter. Data Leakage Prevention (DLP) solutions are one of those controls that are growing in popularity as organisations are looking to minimize the risk of data leaks. It can deal with problems, which fall out of the perimeter of conventional security measures like firewalls, intrusion detection systems, anti-viruses, etc. that aims at external threats only.

Let’s inspect how DLP solutions help organisations to ensure the security and confidentiality of business-critical data.

  • Identify & Manage Critical Data

DLP solutions allow users/administrators to establish specific policies that help in identifying confidential information residing at different locations such as databases, repositories and endpoints throughout the organization. Then, customised policies can be applied against which identified data can be evaluated to detect and prevent data leaks.

  • Provide Improved Visibility

DLP solutions provide a comprehensive insight into how sensitive information within the organization is stored, utilized and shared. It helps in monitoring how the company’s internal members deal with confidential information, which further allows administrators/privileged users to identify suspicious behaviour patterns (malicious insiders) that could put the organization’s data security at risk.

  • Monitor Data Leakage Vectors

Emails are the most common channels of data leakage and widely exposed by threat actors to compromise legitimate accounts and gain access to sensitive information. DLP solutions apply specific policies (like content-aware policies) to identify and alert users while entering sensitive information in the mail body or attachments. Based on the configuration of policies, multiple actions can be taken to prevent data from leaving the organization, including creating alerts for risky behaviour, blocking such emails and quarantine email messages for further review. These solutions also allow users/administrators to apply controls to prevent other data leakage vectors such as portable storage devices and web communications (like file upload and Web mails).

  • Reporting

DLP solutions also provide reports to meet internal or external auditing requirements and determine areas of improvement, which further helps in taking corrective measures. These solutions can also be triggered to provide real-time incident reports in case of a suspicious event.

  • Achieve Compliance with Emerging Data Protection Regulations

Growing data breach incidents are getting the attention of regulatory bodies, pushing them to encourage organizations to embrace required data security controls. Organizations that store customers’ data, including Personally Identifiable Information (PII), Protected Health Information and Payment Card Information (PCI) need to redefine policies and create a framework that secures the information being stored and processed throughout its lifecycle. DLP solutions assist enterprises to review and administer their compliance risks for multiple regulations including (but not limited to) GDPR, PCI, HIPAA, PDPA, etc.

DLP Solutions Getting Attention Globally

According to Mordor Intelligence report, the DLP solution market was estimated at USD 1.21 billion in 2019 and is likely to reach USD 3.75 billion by 2025, at a CAGR of 23.59% during the forecasted period. The contributing factors behind this tremendous growth rate include the rising crest of data breaches amid COVID-19 outbreak, sharing of data across cloud platforms, increasing volumes of data, etc. Asia-Pacific region is expected to receive the highest market share during the forecast period. Explore Image 1 for more details about other regions.


Image 1: DLP Solution Market Growth Rate by Region


Embracing data protection is not a one-time activity. Threats originating from malicious insiders, nation-backed and independent cybercriminals groups will continue to evolve and target global businesses. Organizations need to remain vigilant and keep updating to advanced security practices, just like DLP, to ensure that their crown jewels (sensitive information and critical assets) are safe.

For more information on DLP solution, connect with our cybersecurity experts at contactcs@tataadvancedsystems.com


Read More
Digging Out the Most Common Ransomware Vectors in 2020
“How” is probably the first thing that comes to our mind when we witness our systems getting infected with ransomware. Cybercriminals make use of a variety of techniques to inject malicious code into targeted systems and encrypt/exfiltrate sensitive data. Watch out the most common ransomware vectors utilized by hackers in 2020 so far.
Remote Desktop Protocol (RDP) Compromise: RDP is a network communication protocol designed by Microsoft that allows users to remotely access the other computers. It has now become a very popular means of infecting networks and deploying ransomware. Nearly 60% of all ransomware attacks are a result of poorly secured RDP access points/ports. SamSam, GandCrab, CryptON and CrySIS are some examples of ransomware variants that spread via RDP. The security of the RDP is majorly impacted due to the poor password practice among users, making it easy for attackers to intrude and harvest credentials. Hackers utilise credential stuffing and brute-force attacks to crack the login credentials and gain access to the target machine. But now, attackers can also purchase RDP credentials for a very low cost on the dark web. Post getting the credentials, an attacker can easily circumvent existing security controls and start causing damage, including deleting/encrypting data backups, deploying ransomware, leaving a backdoor for future attacks, etc.
Some best practices to boost the security of the RDP include:
    • Use strong password
    • Change the default RDP port from 3389 to any other
    • Implement two-factor authentication
    • Conduct regular vulnerability scans
    • Maintaining logs and monitoring RDP
Phishing Emails: Transmitting emails containing malicious URLs and attachments has been the most preferred attack vector of ransomware operators for years. So far, in 2020, threat actors have remained successful in tempting victims to click on a malicious link redirecting to an infected website or download a malicious attachment after which ransomware automatically begins downloading. Attackers have improvised email subjects to catch the victims’ attention and make them believe that the mail is genuine. For instance, some common strains of ransomware have found using email subjects like overdue invoices, account discontinuation, and undelivered packages. In addition to email subjects, some ransomware operators have also noticed using geography-specific language in their emails to target the victims.
Glance through some preventive tips that may help you avoid falling victim to phishing:
    • Conduct a security awareness program to educate employees about evolving cyber threats and attack vectors
    • Follow good cyber hygiene
    • Open attachments from trusted users
    • Hover over the embedded link before clicking
    • Check sender’s email address first, if found anything suspicious
Software Vulnerabilities: Software vulnerabilities are the third most common vector used by attackers to deploy ransomware. Unpatched software is similar to a door without security that welcomes hackers and allows them to inject malware into the connected applications and network. They can easily exfiltrate data and cause maximum damage to the targeted systems. Regular vulnerability and threat scans are the best methods to discover and eliminate the known and unknown vulnerabilities in the applications/software.
Along with these three most common ransomware vectors, there are some other methods as well through which cybercriminals target victims. These methods include Drive-by Downloads, Malvertisements, Exploit Kits, Infected Mobile Applications, etc. Threat actors are making huge benefits by targeting industries across all verticals while implementing these above-mentioned methods. So, to minimise the risk of infection and safeguard your organization from growing ransomware attacks, it is essential to understand how ransomware commonly propagates. This will also help you identify the best security controls that can be placed to prevent ransomware attacks.
For comprehensive information about ransomware protection, connect with us at contactcs@tataadvancedsystems.com
Read More
How Ransomware has Marked its Presence in 2020?

Are you aware that ransomware attacks1 have increased by 25% in the first quarter of 2020, as compared to Q4 2019? Financial institutions, followed by healthcare and manufacturing sectors, reported the maximum number of incidents during the period. From Travelex to Garmin, we have witnessed companies falling victim to ransomware attacks and paying a million-dollar ransom to attackers. A recent report2 revealed significant growth of 72% in new samples of file-encrypting malware in the first six months of 2020. It shows that threat actors are discovering new methods to execute cyber-attacks and extort entities for their sensitive data. Consequently, the global average cost3 to remediate a ransomware attack has also increased to USD 761,106.

Contributing Factors
Some of the key factors that have influenced the amplification of ransomware attacks across the world include:
  • Remote Working: The tide of ransomware rose when a majority of organizations globally opted for remote working (work from home) due to the COVID-19 pandemic. This transition brought new vulnerabilities and risks, along with continued business productivity. Lack of appropriate security controls like VPN, web-application firewall and anti-phishing solutions accompanied by the use of weak passwords have provided cybercriminals with an array of opportunities to penetrate the network and steal business-critical information. 
  • Ransomware-as-a-Service: Ransomware-as-a-Service (RaaS) is another major factor that has taken ransomware attacks to a whole new level. In this new ransomware delivery model, malware developers offer their tools and services to help novice cybercriminals (with little or no technical expertise) launch their ransomware attacks at a wide scale without much difficulty. Satan RaaS Platform is a perfect example of this new delivery model that is available over the dark web and offering services to allow its customers to initiate customizable ransomware attacks.
  • Cryptocurrency Revolution: Cryptocurrency revolution has shifted hackers’ focus from relying on bank accounts or credit cards for ransom collection to mine cryptocurrencies directly as they are untraceable and make incident difficult to resolve for security professionals. Some of the prominent cryptocurrencies available across the world include Bitcoin, Monero, Zcash, Ether, Litecoin etc. These digital currencies are increasing in number as well as value, making them a profitable target for cybercriminals.
  • Lack of Regular Security Assessment: Known and unknown vulnerabilities lurking in the organization’s networks, workstations or applications enables threats actors to inject malware and damage business-critical data and resources. Also, the lack of security awareness among employees aids threat actors to exploit human vulnerability and get access to sensitive data.

Are SMBs Isolated from Ransomware?
The answer is No. Ransomware attacks are targeting small- to large-scale enterprises globally. A recent survey3 uncovers that ransomware is no longer an unusual activity in the SMB community. It indicates that 46% of such businesses have already been hit by ransomware attacks, and 73% of those have paid the ransom to recover their data. Among those who had suffered a ransomware attack, 43% of SMBs have paid ransom between $10,000 and $50,000 while 13% were forced to pay more than $100,000.
For SMBs, it is imperative to implement effective security measures in place to mitigate the chances and implications of ransomware as a successful attack might end up in devasting loss to such organizations. Also, recovering from ransomware attacks becomes difficult especially when a company has no safeguards like proper data backup.

Threat actors are utilizing different attack vectors including social engineering and phishing attacks at a broad scale to inject malware into targeted systems and get hold of the underlying data. They are found using a variety of ransomware strains such as Maze, Sodinokibi, DoppelPaymer, Nemty, CLOP, Sekhmet, etc. to execute attacks. Thus, organizations need to keep assessing the effectiveness of their security ecosystem at regular intervals. Moreover, they should archive data at different but secured locations to successfully recover data in the event of a ransomware attack.

The Cyber Security Practice of Tata Advanced Systems Limited is dedicated to providing advanced and industry-best security solutions to safeguard organizations from disastrous ransomware attacks. We help you quickly detect and remediate the loopholes within your organization’s security posture and mitigate the likelihood of experiencing a cyber-attack.
For more details, connect with us at contactcs@tataadvancedsystems.com 
1 - Beazley Breach Insight Report
2 - Skybox Security 2020 Vulnerability and Threat Trends Report
3 - The State of Ransomware 2020, Sophos
4 - Infrascale Survey
Read More