Stop before you Click!

This article highlights various ways in which cyber criminals use and create  different methods & scenario’s to launch cyber attacks on individuals and through them on organisations and how they can be safe by using some safe cyber security practices.   In todays dynamic environment where Internet has become the ubiquitous part of our daily lives cybersecurity has taken the driving seat. Internet can become a live time bomb one…

Read More

Step 2 – Create the Security Architecture

Hello All. Here is wishing everyone a very Happy and Safe Diwali. Diwali is a festival of lights, and this is a time to get together and celebrate. As we celebrate, we also say a silent prayer of thanks to the countless police, defense forces and cybersecurity specialists who are holding the fort and letting us celebrate through their continuous effort to keep us safe. This series is dedicated to…

Read More

The World this Fortnight in CyberSecurity – SMB – Issue 2

Hello All! Welcome to another edition of “The World This Fortnight”! J October has been declared as the National Cyber Security Awareness Month (NCSAM). We sincerely hope you all will do everything you can to stay safe and stay secure. And you know where to reach us for any concerns. We have curated some more articles here, in our continued quest for improving cybersecurity within the SMB realm. We are…

Read More

The World this Fortnight in CyberSecurity – SMB – Issue 1

The Equifax Breach is one of the largest data breaches in history has left 143 million people wondering if their highly personal data has been exposed to hackers. Read More: Everything you need to know about Equifax breach This incident has generated a lot of concern and discussion globally. The impact has us reeling, and there are staff within Equifax who have lost their jobs. Such a breach for the SMB business will…

Read More

Malware Trends – 2017

2017 has proved to be a lucrative year for cybercrime. Prominent malware and attack methods continue to evolve at a frightening pace, creatively bypassing existing security solutions. 2017 is shedding light on a new trend – simple, yet highly effective malware families are causing rapid destruction globally. So far, in 2017 cyber-attacks are occurring at a higher frequency than previous years. Recent infiltrations have demonstrated the agility, scale and persistence…

Read More

Step 1 – Define the Policy (for both Digital and Cyber/ Information Security)

Thank you for reading through this and as I had mentioned earlier, this is a series. This article is the next in the series. Your feedback means a lot and I appreciate the comments coming my way. In case you have missed the earlier articles, the links are below. Article 1 – http://arrka.com/index.php/2017/07/12/exploring-the-ciso-role-especially-for-the-smb/ Article 2 – http://arrka.com/index.php/2017/08/13/smb-ciso-series-article-2-going-digital-what-dangers-are-you-walking-into/ A policy document, for all practical purposes, is a statement of intent of…

Read More

SMB CISO Series – Article 2 – Going Digital – What dangers are you walking into?

Going Digital is no longer the world of the rich and the famous and the Fortune 500 ones! Going Digital is the mantra for the future scale. Digital means many things, and among the more common ones is about getting information into the electronic age. This requires transformation. For a bank, this means instead of filling forms; have a kiosk where customers can scan their credentials and auto-fill. For Manufacturing…

Read More