9 Things to Keep in Mind while Choosing a SIEM Solution

Blog Today, cyber security is one of the biggest concerns for organizations across the board. Over the years, cyber threats have grown both in number and intensity. As per a study by the University of Maryland, a hacker attack happens every 39 seconds on average making cyber-attacks alarmingly common. Information security threats have become a… Continue reading 9 Things to Keep in Mind while Choosing a SIEM Solution

Two Massive Data Breaches in a Span of Two Weeks. What are the Lessons to Learn?

Blog In mid-July, news emerged that Russia’s Federal Security Service (FSB) lost 7.5 terabytes of data as a result of a successful hacking attempt. The breach exposed details about some secret FSB projects that included plans to de-anonymize Tor browsing, scrape social media, and enable the Russian Government to split its internet off from the… Continue reading Two Massive Data Breaches in a Span of Two Weeks. What are the Lessons to Learn?

Published
Categorized as Blogs

Ways to Reduce Rising Email Based Threats and Uphold Better Data Security

Blog Emails have occupied a prominent place in modern business communication. They have become the most widely adopted dissemination channels today and are acting as legal documents in any formal environment, with low cost. Every organization from IT and BPO to health, insurance, and hospitality is making use of emails. The dark side of the… Continue reading Ways to Reduce Rising Email Based Threats and Uphold Better Data Security

Published
Categorized as Blogs

Online Skimming – The Emerging Payment Card Fraud

Blog Cyber threats are ever growing elements in an era, where data is the most valuable asset. Even when several organizations are upgrading security posture to safeguard sensitive information, hackers are able to steal the data intelligently by tying minute vulnerabilities together, and making it turn out to be a potential attack. Another internet card… Continue reading Online Skimming – The Emerging Payment Card Fraud

Published
Categorized as Blogs

How Organizations can Safeguard Personal Identifiable Information (PII) Data

What is PII data and why should organizations care? Personal identifiable information comprises any data that can be used to identify an individual uniquely. This includes the name, address, social security number, phone number, email address, financial details, and more. Cybercriminals actively seek this information to commit fraudulent activities, leading to devastating consequences for the… Continue reading How Organizations can Safeguard Personal Identifiable Information (PII) Data

Everything you Wanted to Know About PCI SAQ (Self-Assessment Questionnaire)

Blog The growing popularity of card-based and online transactions has certainly been a boon for retail merchants since it has made it extremely convenient for consumers to conduct transactions. Yet, this convenience has come at a cost. With the growth of cashless transactions, we’ve seen a corresponding increase in the number of instances of fraud,… Continue reading Everything you Wanted to Know About PCI SAQ (Self-Assessment Questionnaire)

Published
Categorized as Blogs

How Data Discovery Tools Can Help Zero-in on Data Non-Compliance

In many organizations, traditional methods of data storage have been ad-hoc with data security procedures not being given due consideration. For instance, let’s take the example of banks and the payment card industry. During the process of enrollment, customers are often asked to fill out their data in a physical form. The information in these… Continue reading How Data Discovery Tools Can Help Zero-in on Data Non-Compliance

How to Protect your Organization from a Potential Data Breach

Blog Over the last few years, India has been in the midst of a digital payment revolution. The Government of India’s demonetization announcement in November 2016 provided a greater fillip to this trend. As per data from the Ministry of Electronics and Information Technology (MeitY), there has been a three-fold increase in digital transactions in… Continue reading How to Protect your Organization from a Potential Data Breach

Published
Categorized as Blogs
SISA’s Latest
close slider

Webinar

Infosec Report

The current query has no posts. Please make sure you have published items matching your query.