Saturday, 20 Apr, 2024

+91-9899775880

011-47044510

011-49075396

Fill the Gap to Connect Dot, the Cyber Intelligence

Journal of Network and Information Security

Volume 10 Issue 1

Published: 2022
Author(s) Name: Vinit Thakur | Author(s) Affiliation: SME - Information and Cyber Security, Barclays Investment Bank, United States of America.
Locked Subscribed Available for All

Abstract

As we all are aware of from the recent headlines, hackers routinely steal intellectual property, privileged information, financial data, social security numbers, email addresses - which they sell on the black market for obscene profits and not the last but least costly ransomware attack. In 2020, more than 550 security breaches were reported to the U.S. Privacy Rights Clearinghouse, and 1.1 billion individual records were compromised or stolen since 2005 [1]. Regardless of their industry vertical or scale most organizations are vulnerable to cyber attacks, and yet continue to gamble with their reputations because they are not taking cyber security seriously. It is just a matter of time before they join the countless other firms who have suffered embarrassing and costly privacy and security breaches due to weak process or lack of visibility. Because cyber threats and vulnerabilities constantly evolve, many organizations may not be as effective at managing the associated risk as they might be in managing risk in other areas of the business. Cyber threats are on the rise and growing exponentially in complexity, at the same time, the economy is forcing organizations to drive down their operational costs while still maintaining an aggressive, productive and agile business model.

Keywords: Cyber security, DDOS attack, Incident response, Security awareness, Threat management.

View PDF

Refund policy | Privacy policy | Copyright Information | Contact Us | Feedback © Publishingindia.com, All rights reserved