Stop before you Click!

This article highlights various ways in which cyber criminals use and create  different methods & scenario’s to launch cyber attacks on individuals and through them on organisations and how they can be safe by using some safe cyber security practices.   In todays dynamic environment where Internet has become the ubiquitous part of our daily lives cybersecurity has taken the driving seat. Internet can become a live time bomb one…

Read More

Step 1 – Define the Policy (for both Digital and Cyber/ Information Security)

Thank you for reading through this and as I had mentioned earlier, this is a series. This article is the next in the series. Your feedback means a lot and I appreciate the comments coming my way. In case you have missed the earlier articles, the links are below. Article 1 – http://arrka.com/index.php/2017/07/12/exploring-the-ciso-role-especially-for-the-smb/ Article 2 – http://arrka.com/index.php/2017/08/13/smb-ciso-series-article-2-going-digital-what-dangers-are-you-walking-into/ A policy document, for all practical purposes, is a statement of intent of…

Read More