Is your organization prepared for a preemptive strike against IT threats?
October 06, 2020 | Secure Access, Insider Threats
The world is observing the National Cybersecurity Awareness Month in October. And the message is loud and clear: adopt best security practices within and outside
Insider threat: The most dreaded IT disruption is preventable
September 11, 2020 | Behavior Anomalies, Privileged Users
Some of the most high profile data breach incidents from recent times have originated from malicious corporate insiders. Financial gains, military intelligence,
Five Major Pitfalls to Privileged Access due to Remote Work Culture
September 04, 2020 | Remote Access, VPN
Protecting data is always one of the most critical issues for any enterprise. Thousands of end-users access critical information on a daily basis. Any
DDoS Attack on your Privileged Accounts might create mayhem
August 31, 2020 | DDoS Attack, Privileged Access Management
The National Stock Exchange from one of the APAC countries was recently struck by DDoS (Distributed Denial of Service) attack. The incident happened twice on two consecutive days
Why is government data extremely vulnerable to breach?
August 21, 2020 | Sensitive Data, Passwords
The US Presidential election is just a few months away. Cybersecurity would be on top of the mind of the authorities. Do you remember how the Presidential election became a target of organized
Are security patches securely stored?
July 24, 2020 | security patches, business secrets
Cyber threats and vulnerabilities have increased significantly in the last few months. Organized cybercriminals are becoming increasingly canny and the nature of cyber risks are getting more and more advanced. Despite a considerable increase
Password: A major security vulnerability
July 10, 2020 | Passwords, Data Breach
Just think of our day-to-day life. Typically, we all have common passwords for email accounts, social media accounts and bank accounts, which can result in a nightmare, if compromised. On a personal level, if a password breach can
Excessive Standing Privileges: A gateway to IT disaster
June 26, 2020 | Just-In-Time Privileges, Access Control
Organizations adopt privileged access security practices with a well-defined framework as to people and policies to ensure restricted access to privileged accounts. Privileged accounts have elevated
Real-time threat detection in digital workplace
June 12, 2020 | User Behaviour Analytics, Remote security
Monitoring ‘trust’ is very important in the Zero Trust IT framework. This is critical because human nature is unpredictable. Human intent moves towards whatever is favourable in the
Targeted Attacks on confidential data
May 29, 2020 | Privileged Credentials, Cybersecurity
A popular European budget airline has recently revealed that it had suffered a “highly sophisticated” cyberattack exposing names, email addresses and travel details of almost 9 million customers. This incident has shaken the world of
Two Fatal Mistakes in Privileged Access Management
April 24, 2020 | Just-in-time-privileges, Remote Access
During this critical hour of COVID-19 pandemic, global organizations are counting on Work From Home strategy to
Data Privacy amid rising Insider Threats
April 09, 2020 | Insider Threats, Data Privacy
One of the largest banks in India became an easy target of malicious insiders. A massive data breach yet again due to lack of confidential data security controls has brought to the forefront an urgent need for robust security solutions like
Covid 19: New Paradigms and Cyber Security for Enterprises
March 20, 2020 | Corona Virus, Cyber security
The global economy is in turmoil. The novel Covid 19 syndrome or Coronavirus has plunged the world order in chaos and uncertainty. If the stock markets are any barometer then we stare at troubled times ahead. With trillions of
Cyber Insurance: A must for today’s organizations
March 12, 2020 | Cyber Insurance, Cybersecurity
The importance of cyber insurance was first acknowledged by global enterprises way back in 2003 just after the California Security Breach and Information Act came into effect. Major
Managing ‘Trust’ is critical in a distributed IT environment
Feb, 17 2020 | Trusted Privileges, DevOps
Gone are those days when the core of IT security used to be confined within data centers. The concentration of the IT security officials is no longer restricted towards securing
Are healthcare chains doing enough to protect data privacy?
Feb, 07 2020 | Data Privacy, Data Breach
Recently, an exclusive report from The Economic Times has unveiled that almost one million medical files of Indian patients were openly accessed online. With zero security measures for
What can we learn from this massive IoT breach?
Feb, 06 2020 | Digital Ecosystem, Data
In a recent shocking incident, an organized cyber criminal group hacked the usernames and passwords of servers and routers of over 5 lakhs Internet of Things (IoT) devices. It has shocked the entire IT security community of the USA and the rest of
Unguarded Servers: Major reason behind data breaches of 2019
Jan, 24 2020 | Privileged Accounts, Data Breach
A good number of alarming data breach incidents in 2019 have emphasized on the fact that unmonitored or uncontrolled servers are the biggest reasons behind organizations’ financial
Data Breach: Time to identify Inherent Risks and adopt preventive measures
Dec, 27 2019 | Granular Access Control, MFA
(Continuing from Part - 1)
While we discussed rising cyber-threats and financial costs associated with those in the previous article, ARCON identifies the
Data Breach: Time to identify Inherent Risks and adopt preventive measures
Dec, 20 2019 | DevOps, Cloud
The cyber world continued to witness sophisticated attacks this year as well. Some alarming statistics highlights that the state of cyber- security preparedness is not up to the
How PAM can work wonders in the Media/ Entertainment industry
Dec, 06 2019 | Media Industry, Secured Access
(Continues from Part - 1)
How did this happen and why?
There is extensive data flow in the media industry.
How PAM can work wonders in the Media/ Entertainment industry
Dec, 02 2019 | Media Industry, User Authorization
Note: We have split the article into 2 halves. In Part -1 , we have discussed Media industry and what kind of cyber threats this industry has already faced. In Part - 2, we have discussed
How ARCON Privileged Access Management could have averted this Nuclear Plant disaster
Nov, 26 2019 | Malware attack, Privileged Access
Cyber criminals have turned their eyes on nuclear power plants now. Another malware attack struch hard in one of the nuclear plants in the southern part
Why your enterprise requires an adaptive authentication?
Nov, 15 2019 | Authentication, Data Security
Far too often, security lapses around privileged identities happen in the absence of restrictive access to critical systems or if there is no implementation of least privilege principle. With
Five mistakes that often leads to compromise of endpoints
Nov, 12 2019 | Privileges, Endpoints
Some of the most grave IT risks arise due to inadequate endpoint privilege management. As we discussed in our previous article, a lackadaisical attitude in controlling and monitoring endpoint
The significance of Endpoint Privilege Management
Nov, 4 2019 | Endpoints, Data exfiltration
Every organization has suspicious IT users. And it goes without saying. How many times do we uncover that John Doe working let’s say as a business consultant with lots of expectations, climbing up the corporate
Is your manufacturing plant robust enough to protect Operational Technologies?
Oct, 24 2019 | Operational Technologies, SCADA
Organized cybercriminals are leaving no stone unturned to inflict huge losses to organizations. The financial impact of
Malicious Insiders: The Biggest threat to Privileged accounts
Oct, 14 2019 | Malicious Insiders, Privileged misuse
Digital revolution-- Big Data Analytics, Cloud Computing-- has helped improving IT operational efficiency, decision-making as well as return on investments (ROI). However, with every passing
How to Overcome the Privileged Access Challenge?
September 19, 2019 | Virtualization, DevOps
Enterprise IT security team often face challenges to maintain a control over privileged users. And it has to do with the rapid pace of digitization and virtualization, which in turn has increased the number of
Pharma Industry Data Breach Challenge: Beyond usual Industry Risks
September 16, 2019 | Data Breach, Intellectual Property
Most pharmaceutical companies agree that the losses from cyber attacks could be escalating alarmingly in the coming days. According to the latest research report of The
Are you monitoring your IT end users to mitigate suspicious behavior?
September 06, 2019 | User Behavior, Malicious Insiders
Do you remember the infamous data breach incident of Desjardin three months back? According to the statement of the officials, the entire
Some Common Mistakes Leading to Privileged Access Misuse
August 30, 2019 | Data Breach, Third Party Threats, Access Control
In the age of digitization, while organizations are busy with the digital transformation, cyber crooks take this as an opportunity to look out for loopholes in the security of
Strengthen Access Control Mechanism to Mitigate Third Party Risks
August 23, 2019 | Data Breach, Third Party Threats, Access Control
Banks continue to be the most targeted organizations by data-greedy hackers in this digital economy. While several reports show that the compliance framework among
Cyber Criminals Target Data, not Industry
August 09, 2019 | Data Breach, Cyber Threats, Dark Web
Today, data breach incidents have become common news headlines across the globe. A layman’s psychological traits drive the idea of any data breach incident towards financial institutions. According to the trends and our findings, we come
Protecting Passwords: The key to securely lock enterprise digital assets
August 02, 2019 | Privileged Credentials, Password Vaulting
A few months back, Facebook, the social media giant, acquired the headlines of cyber security news due to poor password management. Millions of users’ private credentials were
Are Government Organizations Ready to Tackle Cyber Warfare?
July 26, 2019 | Cyber Warfare, Cyber Espionage, Governments
Government data of any nation across the globe is a gold mine for hackers. This data normally consists of sensitive information and strategic blueprints including
Strengthen Compliance Framework to Avoid Hefty Regulatory Fines
July 22, 2019 | Compliance, GDPR, Privileged Access
British Airways has been slapped with a record fine of lump sum £183m for last year's information breach of 380,000 customers. This aviation giant has already
This Massive Information Breach should be an Eye-Opener
July 12, 2019 | Data Breach, Privileged Identities
The National Aeronautics and Space Administration (NASA) must have been embarrassed to be in the news of being a victim of data breach. However, the fact is, this “unexpected” incident has reminded the cyber world
Half-baked Measures to control Privileged Access can Jeopardize IT Infra
July 05, 2019 | Privileged Accounts, SSO
ARCON recently came across a very interesting use case. Our pre-sales team was asked by one of the leading manufacturing organizations to provide a demo to understand the benefits of ARCON
Track Privileged Accounts to Avoid Catastrophe
June 07, 2019 | Cloud Computing, Auto-discovery
The advancement in information technology has brought forth boon on one hand and bane on the other. While technology advancements like cloud computing and big data have created IT operational efficiencies, a large pool of data created out
Is your organization controlling access to critical systems?
May 24, 2019 | Granular, Access Control
In the wake of numerous incidents involving abuse of privileged credentials and data breach, organizations are looking for more robust technology that could monitor privileged user activities in real-time and at
How robust is your Password Management?
April 26, 2019 | Password, User Data
Do we ever forget or share security numbers of our safety lockers in banks where we keep our precious and valuable items for security? Or do we ever share ATM pins or internet banking credentials with anyone? Then why can’t we keep the same habit
IOTs: Serious cyber risks but we can secure those
Feb 22, 2019 | IOT, Cyber Defense
IoT (Internet of Things) has made our lives comfortable, easy, smart, exciting and it has spurred innovation too. The boom of IoT in the recent past is expected to have a huge amount of monetary involvement that can
Protecting health information: Time to be proactive not reactive
Feb 08, 2019 | GDPR, HIPPA
More than a week back, Singapore National Public Health Authority revealed that almost 14,000 health records of people from Singapore and other foreign nationals were compromised and leaked online.
The Importance of Privileged Access Management knows no bounds
Feb 01, 2019 | Access Management, Data Security
A young man named Sumit joined an organization as a junior sales associate. The company allotted him a laptop for his daily work activities. Sumit found that the laptop was used by the
Privileged Access Management: A Remedy for Data Security
Dec 24, 2018 | Digital Identities, Insider Threats
There was a recent data breach incident in one of the global E-commerce giants. Immediately after the news turned epidemic, the management dished out the queries and criticism and
Secure Passwords, Save your Digital Assets
Dec 14, 2018 | Password Vault, Digital Data
Who can forget the infamous data breach incident of one of the popular file hosting service providers where more than 60 million users’ email addresses and passwords got affected? An employee just reused a password at work and
Role of PAM in meeting Regulatory Compliance
Dec 03, 2018 | Password Management , Password Vault
Facebook could face penalties worth in billions under GDPR (General Data Protection Act) compliance act for not following the basic policies. It happened because more than 50 million accounts were compromised due to
How to mitigate misuse of Privileged Accounts
Nov 16, 2018 | Password Management , Password Vault
Misuse of privileged accounts is one of the burning threats for enterprises today. The detection process is time-consuming. Even if the organizations try to calculate the amount of loss
Healthcare Industry: Time to reinforce privileged access control
Oct 24, 2018 | Healthcare , Authentication
IT security awareness has become a crying need for the CIOs, CISOs and CTOs of global enterprises. After BFSI, Government, Manufacturing, IT and Pharmaceuticals industry, now Healthcare industry
Proper Password Management: A big concern till today
Oct 9, 2018 | Privileged accounts , Password Policy
A recent audit on Western Australian Government has revealed that almost 1500 employees are using same password for more than six thousand five hundred accounts. From the point of view of data security, this news has
Alarming Rise of Privileged Account Breaches
Sep 19, 2018 | Cyber Security , Malicious Activitied
Digital security breaches happening globally have not spared any industry from its fangs. These breach incidents mostly take place with the help of external malefactors or malicious insiders. The ever-existing
Data Breach Prevention: Focus of Modern Business Entrepreneurs
Aug 24, 2018 | Digital Threats , Access Management
It has become quite rare today that we are not coming across any news of data breach incident irrespective of small or large organizations. This has forced the new and young entrepreneurs to take adequate preventive measures rather than paying
University Students’ Data are at stake
Aug 20, 2018 | Privileged Accounts , Authentication
It is definitely unruly and obnoxious to learn that the cyber crooks are not sparing education sector from their target zone. Few months back, some unethical hackers (suspected to be from Iran) made an alleged spree of malicious attacks
Data Theft: Still a Major Concern
July 19, 2018 | User Credentials , Sensitive Data
As more than one hundred Government websites were compromised between April 2017 to January 2018, another hair-raising incident of Provident Fund portal hack in April 2018, has put the data of 2.7 crore people at stake. With this, the revolutionary
Is your enterprise security compliant?
July 12, 2018 | Compliance, Data Policy
With mandatory GDPR (General Data Protection Regulation) and PCI DSS (Payment Card Industry Data Security Standard) compliances already making its way to protect the personal data and digital assets of late, any kind of non-compliance could cost
Malicious Insider: Tame your Worry
July 05, 2018 | Insider threats, Data Security
Historically and traditionally, outsiders pose bigger threats to organizations as far as data security is concerned. However, of late, it has been a subject of debate where many security professionals are of the opinion that insiders pose bigger threats to modern
Identity and Access Control: Must for Digitization
June 25, 2018 | BYOD, Passwords, Identity Breaches
The global digital workspace is expanding at rapid pace and by 2020 most of the organizations would take the path of digitization worldwide. Simultaneously, types of security breaches are getting
Is your fitness app secure?
June 20, 2018 | Authetication, Lifestyle, Identities
While Oliver was jogging down the track and took a halt to adjust his snickers, little did he knew that the fitness app he installed in his smartphone to monitor his heartbeat is being accessed by some malefactor unlawfully. This has happened to
The awakening of IT security boom in Africa
June 13, 2018 | IOT, Access Control, Cyber Incidents
The abundance of cloud computing, Artificial Intelligence (AI) and Internet of Things (IoT)are driving massive growth in IT opportunities in Africa off late. The IT sector in South Africa is expected to reach R175 billion by
Email Compromise Scam hits hard in Aussie real estate
June 11, 2018 | real estate sector, User Data
During the end of 2017 in Australia, cybercriminals started to target the real estate sector which is considered as a comparatively weak industry in terms of IT security.
According to a
Smart City: Are we secured?
June 06, 2018 | digital security, Artificial Intelligence
With the advent of AI (Artificial Intelligence) and IoT (Internet of Things), technological advancements are reaching a different high to offer newer comfort to mankind. The latest and brightest inclusion is Smart City, which is ready to change the definition of
Access Control: A Must for Government organizations
May 14, 2018 | User Data, Digitization
A couple of months back there was a piece of news flashing in Indian channels that Aadhar details of uncountable citizens have been compromised badly. Fortunately, that turned out to be a rumour and
Evade these fatal Data Security blunders at any cost
April 18, 2018 | Authentication, Data Threat
With the impending execution of GDPR (General Data Protection Regulation), any potentially wrong data security decisions could lead to disastrous consequences for your business. Let us peruse some common data security mistakes that should be
Is your organization GDPR compliant?
February 22, 2018 | compliance, Audit
The compliance landscape with regard to data security is getting more and more stringent. Come May 2018, the General Data Protection Regulation (GDPR) comes into an effect. The regulation would make it mandatory for organizations-- doesn’t matter large or
Privileged accounts security: Addressing the most common pain point for an enterprise
February 16, 2018 | Corporate Confidential , Data Breach
Organizations , in order to scale up operations and boost efficiency, have been adapting to newer technologies. The pace at which modern day enterprise is streamlining IT
Managing Privileged Accounts to fulfill compliance requirements
February 08, 2018 | Compliance, Policies
The legal framework supporting cyber security is becoming increasingly stringent as modern day enterprises turn more digitized. Indeed, while digitization of business boosts operational efficiency, it also
How Secure is your Data in Managed Service Environment?
February 02, 2018 | Business Risk, MSP
Innovation in technology is yielding significant results. Enterprises are gaining efficiency, operational flexibility along with cost reduction as cloud and Managed Service Provider (MSP) provides an alternative service space.
Data: Identifying threats
November 14, 2017 | Network Security, User Monitoring
Technology advancement has enabled organizations to gain efficiencies especially with respect to storing and processing data. Since there are multiple resources to store data, its security management is a big challenge. Indeed, what makes data vulnerable is its
Why enterprises need behavior analytics?
October 25, 2017 | Network Security, User Monitoring
Modern day organizations face recurrent risks from cyber space. Information systems, as witnessed during the recent wave of advanced ransomware attacks, can be thrown out of gear, if the underlying security is not up to the
Revisiting security framework
October 08, 2017 | information assets, Cyber incidents
When one of the world’s biggest internet companies reported a series of hacks that compromised confidentiality of hundreds of millions of users, it gave a sober warning to cyber community: organizations irrespective of their sizes are extremely vulnerable to
Protecting data in IOT era
September 06, 2017 | Digital revolution, Vulnerabilities
To add value proposition and boost productivity for business, organizations have been transforming their day-to-day operations by investing more on the internet of things (IOTs).
Microprocessors and sensors connected to the internet add immense value to
Is your organization equipped for timely detection?
August 23, 2017 | Data breach, Session monitoring
Theft or misuse of critical information assets from compromised insiders, in most cases, occurs as organizations fail to timely detect unusual or suspicious activities around privileged accounts— gateway to highly
Why it is essential to build resilience around privileged accounts?
August 16, 2017 | User behavior analytics, Access authorization
Would you ever leave your home unlocked? Unless you have a lost the key or it’s an unintended blunder, keeping our home safe and secure is always of utmost importance for
From emails to admin passwords leaks: rising vulnerability of media companies
August 09, 2017 | Passwords Leaks, Cyber Crooks
Sophisticated cyber-attacks aimed at stealing confidential data and disabling IT systems are not just confined to banking, health care industry or government
Protecting privileged accounts … beyond the perimeter security
July 17, 2017 | Firewalls, Malware and Ransomware Attacks
Perimeter security is receiving the utmost attention nowadays as advanced cyber threats originating from rogue state actors, hackers and cyber criminals targeting critical information
WannaCry attack: Time to shore up data and cyber security
June 01, 2017 | Ransomware, Bitcoins, Data loss
The recent ransomware attack dubbed as WannaCry brings to the forefront one of the most recurrent challenges global organizations are confronting today: safeguarding business data from cyber crooks.
Privileged Access Misuse: Four common mistakes firms make
April 27, 2017 | Critical Accounts, Authentication
Any modern-day enterprise’s information systems setup is not static. It grows as business expands. And as business goes through a transition period amidst rising amount of workloads shifting to cloud, the
How secured are you against data extrusion threat?
April 18, 2017 | BYOD, Data Breach, Identity Thefts
Having at the forefront of information risk management industry for more than a decade now, we have observed that enterprises remain most vulnerable in protecting their highly critical asset—data. Our
Are datacenters fortified to pevent the misuse of shared privileged accounts?
February 27, 2017 | Privileged Login Credentials, Datacenter, Biometrics
Amidst rising threat of cyber crime, enterprises today maintain datacenters with more robust security measures. To thwart and detect advanced
How malicious activities around privileged accounts go undetected?
February 17, 2017 | Privilege Misuse, Database Layers, Identity and Access control
Structuring IT infrastructure in multiple layers of devices and applications brings many benefits.
As we discussed earlier, multiple layers of devices allow
How multiple IT set-up layers compromise privileged accounts?
February 14, 2017 | Root Accounts, Administrative Logins
In this digital age, data is the most valued asset for organizations. What we observe today is a quantum leap forward in the way organizations collate and manage data to comprehend business and
Are Fintech startups prepared to endure cyber risks?
February 10, 2017 | Digital Payment Gateways, Regulatory Compliance
Probably the only startup fad that came any near to match present-day thrill surrounding the Fintech startup scene waswitnessed at the end of last decade when young motivated engineering and MBA grads presented exciting
Do you have a security net for Privileged Accounts?
February 03, 2017 | Privileged Credentials, Insider Threats
Innovation drives growth, which in turn, requires global enterprises to cultivate IT ecosystems for collating, comprehending, and managing a growing amount of vital information (data) to stay ahead of the
Be mindful of your online footprints
January 29, 2017 | Browsing pattern, Algorithms, Big Data
Those powerful sets of algorithms coded by search engine and social media giants have made human interaction on internet more purposeful and fruitful. Plan a holiday in remote foothills of Himalayas or sunny beaches in Spain or surf online any popular
Slack cyber security readiness can bloat insurance policies
January 16, 2017 | Cyber Insurance, DOS
That a failure to prevent cyber-attack can destabilize a business has led global CIOs and CISOs to up the ante against ever looming cybercrime in the last couple of years amidst a spate of highly sophisticated
Are you monitoring user behavior?
January 10, 2017 | Biometrics, Access Authentication
The year 2016 saw some of the biggest cybercrimes of our times. From the Central Bank of Bangladesh getting stolen in a multimillion online fraud to hackers intruding a bitcoin exchange and from cyber crook hacking a baby monitor to Mark Zuckerberg falling prey
Cyber Vulnerability: Five Common Mistakes Firms Make
December 06, 2016 | Data Backup, Phishing, Malware
Notwithstanding big IT security budgets, global organizations are up to a big challenge. Incidents of hacking and data breaches surface far too often, undermining growing cyber vulnerabilities of companies.
From startups to
Cashless Transactions: Great concept but are we prepared?
November 29, 2016 | Demonetization, Access Authentication, Mobile Wallets
On November 8th2016, the government of India, in a very surprising but bold move, announced a very far-reaching decision to void all 500 rupee and 1000 rupee notes in the circulation.
The decision is seen as a major crackdown on
Datacenter: Maintain it like a fort
November 16, 2016 | Datacenter, Sandboxing, Intrusion Detection System
Since prehistoric times, forts have a special significance in our lives. From medieval castles in Scotland to ancients forts built by Greeks, Romans, pre-independence princely states of India, and Egyptians-- these garrisons have played a crucial
Rising cyber thefts underscore banks’ fragile online defenses
November 9, 2016 | Computer Systems, Identity & Access Control
Typically, a bank’s customers throng in front of its gates when they fear that their hard-earned money might get disappeared due to financial institution’s irregularities. On so many occasions, as recently as the EU
Thefts of Digital Assets are Spiraling
November 6, 2016 | Digital Assets, Privileged Identities
In an increasingly digitized business world,organizations are now measured by their ability to maintain a digital trust among investors, customers, and other stakeholders.
Data Security: Where global organizations err
November 4, 2016 | Firewall, Data Detection Systems, Secure Configuration
As global firms grapple with increased cybercrimes, compliance managers are paying more heed to cyber security, especially the data.
Organizations now follow a strong IT security and governance policy, leading to more investments on
Is your Firm Prepared to Identify Data breach?
October 19, 2016 | Identify Thefts, Data Security, Malicious Insider
Data Breach-- one of those excruciating costs which are keeping compliance managers and top managements on tenterhooks--is preventable, if firms possess necessary tools to identify malicious attempts to steal information, at the right
Compromised Digital Security Can Break Business Deals
October 17, 2016 | Digital Security, Identity & Access Control Management
In an ever-expanding and integrated global economy, firms get assessed by their ability to adapt to changing dynamics in the business landscape.
Investors look at how fast and effectively firms innovate to grow—organically or