securitylinkindia

Enterprise CISOs converge at InfoSec Foundation Security Symposium 2018

After the conclusion of two city security symposiums in Bangalore and Kolkata, Enterprise IT along with InfoSec Foundation, organized its third City Security Symposium and Awards 2018 in hotel The Lalit, Delhi on 9 August 2018. Designed for the CISO, the event was aimed at bridging the knowledge gap among the CISOs. The main feature of the events was the convergence of leading cyber security thought leaders under one roof to exchange knowledge, discuss challenges and widen the cyber security solutions landscape for Indian enterprises. The daylong summit featured tech talks and panel discussions focusing on the current security landscape in the country, present and future threats, and the future of information security technologies. Besides, cyber security roadmap for financial sector, Industry 4.0, AI and blockchain, startups in IT security ecosystem, agility and flexibility in adopting cyber security for telecom, cloud, infra providers etc., were among the key topics discussed during the event. The theme of the event was ‘Evolving Roles and Responsibilities for CISO in Protecting Digital World.’ The event was inaugurated by the Chief Editor of Enterprise IT World Sanjay Mohapatra along with eminent personalities including Sushobhan Mukherjee, Chairman, InfoSec Foundation & CEO, Prime Infoserv; Dr. Sanjay Bahl, Director General, Indian Computer Emergency Response Team (CERT-In); Dr. Ajeet Bajpai, DG, National Critical Information Infrastructure Protection Centre, Govt. of India; Dr. J S Sodhi, Group CIO & SVP, Amity Education Group & Executive Director-Cyborg Cyber-Forensics & Info Security. Dr. Bahl said, “In order to monitor, hunt and detect, apart from issuing alerts and advisories, we also give you the implementation of the best security practices and standards. We have in place the Cyber Swatchta Kendra – the botnet cleaning and malware analysis Kendra. This centre provides you information about whether any of your devices in your organizations have botnets, or malware or any vulnerable services. If you share your external IP range with us, we will be able to give you this information on a daily basis so that you can start taking action. This is a citizencentric service and we also provide free tools to downloading and cleaning your systems.” Prof. Triveni Singh (IPS), Additional Superintendent of Police, Cyber Crime, STF, UP Police, said, “Uttar Pradesh Govt. is more focused on cybersecurity. We have created two cyber crime police stations with jurisdiction area of the entire state. It has 23 cyber labs. We are working on capacity and ecosystem building in order to fight cybercrime. We also have got our trainers trained by various organizations including the premier organizations like CBI and NCRP. Last year we have recorded more than 3000 cases. Now we are thinking of creating a separate vertical to deal with cybercrime. The government of Uttar Pradesh is also thinking of setting up Cybercrime University in Lucknow. In order to tackle the social media spreading wrong news, we are also contrastingly monitoring the social media.” Regarding this event, he said, “It is a good event for spreading awareness. Besides, it is also a place where a lot of solutions are available from the vendors. I would suggest, apart from the Tier-1 cities, you need to do in Tier-2 cities.” Dr. Sodhi said, “Technology and Information have become the new mantra of the digital transformation. We are witnessing a connected world with new business and culture orientation. Business is being transacted at the speed of light and billions of dollars are transferred across the globe. This transition from the industrial to the information era has created a new security paradigm – new threats to national and human security. With large scale of automation and rapid penetration of ICT, developed nations are enjoying a much better-quality life but this also makes them more vulnerable to cyber interventions. On the other hand, the rising aspirations, easy access and low cost of ICT of the developing nations have created different kinds of security issues. New threats of cybercrime and cyber terrorism, cyber espionage and Cyberwar have emerged making Cybersecurity a strategic imperative at the regional, national and international levels.” The highlight of the evening, however, was Cyber Sentinels Awards 2018 which were given to recognize the work of leading CISOs and security leaders from across sectors for being an able custodian to their organization’s data by implementing the right security tools and policies. The award winners had been finalized by a jury consisting of eminent cyber security experts, veteran CISOs, and information security journalists. This event was concluded by Sanjib Mohapatra, Publisher, Accent Infomedia Group who gave away the vote of thanks. He concluded by saying, “It was a matter of pride to see the large amount of Cyber Security leaders that formed a part of the event. The event was designed to address the challenges faced by India’s Cyber Security community today and reinforce the infrastructure and domain knowledge through insightful tech talks and panel discussions featuring renowned Enterprise CISOs and Security Experts.”  

Read More

Vehant Technologies X-Ray Baggage Scanners – A Must Have for Premise Security

Globalization has not only brought people together, it has also introduced extremism at our door steps. The storm of terrorism challenges the current trends of public safety. The places which are accessible to general public such as public transport system, temples, mosques and churches etc., are highly vulnerable in the hands of anti social elements who want to create an atmosphere of terror and social unrest. This gives rise to the need of identifying these malicious activities beforehand. Technology renders a solution in the form of X-ray scanning equipment which has come as a boon to the security staff making baggage scanning, and explosives and weapon detection a cake walk. Apart from security and surveillance, X-ray baggage scanning also plays a crucial role in anti-narcotics, keeping a check on illicit trading and smuggling at international and national borders, to name a few. X-ray baggage scanner is a technological genius which smartly classifies the material scanned on the basis of its composition. It displays either black and white or colour images. The different colors reflected by the machine on the screen are determined by the atomic number of the materials scanned. This helps the operator to easily differentiate between the types of material inside the baggage such as metals, powder, plastic, liquid etc. The main challenge for the operators is to determine what is it that they are looking at, and color imaging helps them do that in a better way. New technologies in X-ray baggage scanners Traditional baggage scanners are based on X-ray attenuation tech nology whereby the detection of the threat objects relies on how various objects differently attenuate the X-ray beam going through them. But, in recent times this capability is enhanced by the use of dual-energy/ view X-ray scanners. Dual view technology produces two screening perspectives that enhance the operator’s ability to identify potential security threats with increased accuracy and speed. It generates a horizontal and vertical (multi-dimensional) view of the object under inspection, which helps in enhanced detection of contraband objects. It is a compact Xray baggage scanning system ideal for checkpoints and small baggage scanning at high security premises such as airports, government offices, railways, MRTS and other baggage scanning applications. Further, numerous optional features such as threat image projection (TIP), network supervisory workstation (NSW), and video management for effective operation can be linked with these new age X-ray baggage scanning systems. Future X-ray baggage scanners Technology has taken giant strides over the last few years, paving the way for innovations in every field. 3D and artificial intelligence (AI) are some of the new technologies which are rapidly driving changes in many domains like health-care, defence, architecture and entertainment (VR). However, the field of security and surveillance is still in its nascent phase in adopting these new technologies. One such example is the usage of 3D technology. X-ray baggage scanners have shown promising advances for enhanced inspection by providing extra visibility using 3D technology. Vehant offerings Vehant offers two promising X-ray baggage scanners with 3D technology – KritiScan™ 6040R and KritiScan™ 6040DV. KritiScan™ 6040R provides highly accurate virtual images, with isometric view of the scanned baggage by generating three dimensional image of the object resulting into detailed images for enhanced detection capabilities. This enables the security and surveillance personal to view and inspect minute details in baggage scanning. KritiScan™ 6040DV on the other hand has been designed and developed in tunnel size – 600(W)x400(H)mm2 . It uses innovative dual view technology to generate a horizontal and vertical view of the object under inspection. Dual view system provide multi-dimensional view of the save object which helps in enhanced detection of contraband objects. KritiScan offers numerous optional features such as threat image projection (TIP), network supervisory workstation (NSW) and video management for effective operation. Technological advancement and standard industry practices have effectively managed to keep security threats at bay. However, it must also be borne in mind that technology is just an aid and in itself, it is a puppet in the hands of its operator. In order to ensure a full-proof security system, the credentials and track record of the equipment manufacturer must be cross verified. Moreover, the installed base of the equipment and service network of the OEM are some of the underlying factors that need to be taken into consideration while choosing and procuring security equipment.

Read More

COM-SUR Helps Protect Bosch, Bengaluru

After great success in Chennai, COM-SUR has once again joined hands with Bosch India to help protect their Bengaluru factory. COM-SUR, the CCTV video footage auditing, smart backup and intelligent reporting software, has been deployed by Bosch India for the second time to complete workflow of video surveillance. “This is a great honour for us at COM-SUR that Bosch which is a camera manufacturer themselves has once again recognised the value and potential of our technology. The ability to audit their video footage regularly with such ease and efficiency was of prime importance to them. It has been a pleasure working with their team, who also share our philosophy,” says Gautam Goradia, CEO & MD, COM-SUR. With the regular and dedicated use of COM-SUR, Bosch has far greater prospects of: Achieving crime, fraud and loss prevention. Solving crime faster. Improving processes, compliance, safety. Improving employee performance, customer satisfaction, and sales. Gaining situational awareness, actionable intelligence. Reducing data size and remote storage. Standardizing multiple activities related to CCTV/ surveillance. Besides, they shall also be able to audit hours of video footage from multiple cameras in minutes; remotely store huge amounts of relevant data; search, tag and retrieve data easily, quickly create videos from multiple cameras in single MP4 file; create and share intelligent audit/ incident reports and gain business intelligence based on patterns etc.  

Read More

Fortinet Signs Cyber Threat Information Sharing Agreement with IBM

Fortinet and IBM Security will collaborate through the bi-directional sharing of cyber threat information. The goal of the agreement is to proactively combat cyberthreats and threats to privacy globally through the sharing of contextual threat information generated by the Fortinet FortiGuard Labs threat research team and IBM Security’s X-Force research team. IBM Security and Fortinet will directly collaborate through bi-directional sharing of threat intelligence using secure channels. Joint threat information sharing will deliver deep security research expertise and global threat intelligence for increased protection for the customers of each company. IBM Security and Fortinet global threat research teams monitor and analyze security threats from a variety of sources, providing valuable and near real-time threat intelligence. By integrating the threat intelligence feeds from each company, customers will now benefit from more thorough data being available. Ongoing cooperation between Fortinet & IBM While the agreement formalizes the cooperation between Fortinet and IBM Security in regards to threat information sharing, both organizations have already been working together in regards to comprehensive security protections. IBM Security has been a Fortinet fabric-ready partner since 2017. Fortinet’s open approach extends the broad visibility, integrated threat prevention, and automated response of its security fabric architecture through well-defined APIs to IBM for unified security management and security incident response. In addition, Fortinet earlier this year announced collaboration with IBM on its IBM X-Force Threat Management Services. Working with IBM Security on X-Force Threat Management Services enables both organizations to further provide mutual customers with threat insight, attack detection and prevention, and an integrated defensein-depth strategy designed to seamlessly span across an organization’s entire attack surface. Caleb Barlow, Vice President threat intelligence, IBM Security said, “By entering relationships with trusted partners like Fortinet, IBM is able to construct a clearer picture of the global threat landscape. Today, threat actors are highly skilled, organized, well resourced, and able to operate globally and swiftly. In order to defend effectively, we must operate with that same speed and develop informed, accurate counter-measures. The kind of collective defense we’ve formed with Fortinet helps IBM better protect clients and communities by equipping us with additional intelligence that enables us to respond to emerging threats more quickly and more completely.”  

Read More

Latest 18-Series of Products in India

Synology has launches their latest series of products in India; adding to its existing 18-series. The series includes DS118, DS218, DS218play, DS1618+, RS818(RP)+, RS2418(RP)+, RS2818RP+, RS3618xs and RX418. “Following on from the success of the first batch of 18-series release in April, we are elated to announce the launch of latest 18-series products in India. This launch will diversify our product range of 18-series in the market, especially for enterprise models, and therefore can provide customers with more choices for suitable storage solution,” said Mike Shay, Sales Manager of Synology Inc. New 18-series Synology NAS products DS118, DS218: These 1 and 2 bay 18-series entry-level NAS servers are ideal for small offices and home users. Equipped with Intel®quad-core 1.4 GHz processor, these versatile yet budget-friendly NAS servers can provide good performance for not only personal cloud storage but also data backup and synchronization, media streaming, photo management, file sharing, and other tasks. The intuitive interface of DSM allows you to manage, protect and share all your digital assets easily and efficiently. DS218play: DS218play supports real-time transcoding of 4K Ultra HD source content, which made it ideal for serving as the home multimedia center. With the availability of centralized management, DS218play is ideal for fast file sharing and reliable backup for all types of devices. Besides, DS218play is an ecofriendly solution with the consumption of only 16.79 W in regular operation. RS818(RP)+, RX418, RS2418(RP)+, RS2818RP+: These three high-performance and scalable plus series rack stations are specifically engineered for growing small- and medium-sized businesses. RS818+/ RS818RP+ comes with a quad-core processor with the AESNI hardware encryption engine, quad 1GbE LAN ports, and optional 10GbE NIC support. The storage capacity of RS818+/ RS818RP+ can be further expanded with Synology expansion unit RX418, providing up to 8 drives for flexible data management and backup. Powered by Intel® Atom® C3538 CPU, RS2418+/ RS2418RP+ offers great flexibility in terms of expandable storage capacity (up to 24 drives with one RX1217/ RX1217RP) and upgradable memory (built-in 4GB DDR4 UDIMM, up to 64GB). Equipped with a PCIe 3.0 slot, RS2418+ supports installing an M.2 SSD adapter card or 10GbE NIC for a high-IOPS system cache and ultra-fast data transmission. RS2818RP+ is Synology’s first 3U RackStation NAS in the Plus Series product line. RS2818RP+ is powered by an Intel® Xeon® D-1521 quad-core CPU and 4GB DDR4 non-ECC UDIMM RAM (expandable up to 64GB). The four plug-and-play Gigabit Ethernet LAN ports can be expanded with higher performance 10GbE NICs. The 3U chassis design accommodates up to 16 drives and the storage capacity can be further scaled up to 28 drives when connected to one expansion unit RX1217(RP). RS3618xs: Synology RS3618xs is a 12-bay rackmount NAS providing excellent performance, effortless capacity scaling and optimized virtualization solutions for expanding businesses with demanding business applications. Features an Intel® Xeon® D-1521 quad-core CPU and 8GB DDR4 ECC UDIMM RAM (expandable up to 64GB), RS3618xs has high scalability with up to 36 drives. Complete virtualization solution with Synology Virtual Machine Manager is supported in this model too.

Read More

Ozone Enterprise Acquires WallCam

Ozone Enterprise Group, an Everstone PE Capital funded company and leading player in the Architectural Hardware industry, announced its acquisition of ‘WallCam,’ a company engaged in security and surveillance business in India. The acquisition will make ‘WallCam’ a fully owned subsidiary of Ozone. The acquisition process, which is in its final stage, will be completed soon. Ozone sees a lot of synergies in the business with its existing business lines, and will accelerate and strengthen WallCam’s model of working through its R&D, manufacturing and re-seller partners. Ozone has a diversified presence in architectural hardware, safes & vaults, locks, fire & safety doors and urban furniture. The brand is among the top 3 players in safes and locks in the country. The group has been actively exploring options to diversify into new businesses, security and surveillance being one of them. Talking about its business aspirations, with its aggressive growth and diversification plans, the group is eyeing Rs.1,000Cr turnover by FY 2021. The company plans to invest over Rs.100Cr in next 2 years on diversification primarily on building manufacturing capability for CCTV cameras and other security and surveillance products and IoT in India. Ozone Group already has international tie ups for product and software and are also looking at fresh equity influx to fund expansion in electronic security and surveillance business. A significant amount of this equity influx will be dedicated for a greenfield manufacturing unit for electronic security and surveillance under the ‘Make in India’ initiative of the Government. “Security and surveillance is one of the fastest growing industry in India. The market size of the industry from the current $1Bn is likely to grow 2.5 to 3 folds by the end of 2021. We have been actively exploring options to diversify into this industry and after contemplating both organic and inorganic options, we finally narrowed down on taking the inorganic route with the WallCam acquisition. We are all geared up to make the most of the market opportunity and will soon be seen as one of the prominent players in the market,” said Mr Aggarwal. Ozone’s solution centric approach has enabled them to grow from a start-up to becoming India’s most popular architectural hardware solution provider, which has been able to prove its worth in international markets. The company has a global presence across 15 countries, 4 R&D centres in Israel, Korea, China and India, and 4 state-ofthe-art factories in India and China. Ozone offers internationally certified products & solutions through its product portfolio of more than 3000 SKUs across various product categories. Ozone has strong presence internationally with offices in India, Canada, Australia, Dubai and distributor’s network in Poland and Saudi Arabia. “The idea behind acquiring WallCam was to give a head-start to our diversification plans, get accesses to WallCam’s existing business, the brand, sales & distribution network. We are excited about this new move as it is in synergy with our growth ambitions and abilities” – Alok Aggarwal Founder & Managing Director, Ozone Enterprise Group  

Read More

eInfochips Eragon 660 and 625 Modules

Infochips (an Arrow Company) has launched Eragon 660 and 625 modules for companies to accelerate the time-to-market for products using the Qualcomm SDA660 and Qualcomm APQ8053 processors, respectively. The addition of these Qualcomm Technologies’ processors to the Eragon 600 series allows eInfochips to address the growing demand in advanced computing and video processing on handheld devices. “This work with eInfochips allows large numbers of innovators to create exciting products and solutions using the technologies that transform how the world connects, computes and communicates,” said Joseph Bousaba, Vice President of product management at Qualcomm Technologies, Inc., “These Eragon 660 and 625 modules from eInfochips deliver new and advanced capabilities that developers can use to participate in the large and growing IoT opportunity.” Eragon 660 and Eragon 625 modules can work as building blocks for embedded products requiring solutions for gaming, 4K camera, smart HMI, digital signage, medical imaging, and more using on-device AI. The Qualcomm SDA660 processor at the heart of Eragon 600 is a powerful processor, featuring the Qualcomm® AI Engine, Qualcomm Spectra™ 160 ISP, Qualcomm® Kryo™ 260 CPU and Qualcomm® Hexagon™ 680 DSP with vector extensions. At the same time, the Qualcomm APQ8053 which powers Eragon 625 is designed to provide fast connectivity, vibrant visuals, and exceptional performance for immersive experiences. The Eragon 660 and 625 modules come pre-integrated with Android, making them ideal for prototyping and parallel development of hardware and software solutions. “eInfochips offers custom hardware design and manufacturing solutions, based on Qualcomm Technologies’ processors, by leveraging comprehensive experience of 200+ designs and a strong ecosystem of contract manufacturers associated with Arrow Electronics. As an early adopter of technology, eInfochips is already engaged with its customers in the design and development of Smart HMI and IoT solutions based on the Qualcomm SDA660 processor,” said Parag Mehta, Chief Business Development Officer at eInfochips. eInfochips, an Arrow company, is a leading global provider of product engineering and semiconductor design services. The company’s service offerings include digital transformation and connected IoT solutions across various cloud platforms, including AWS and Azure.

Read More

India as One of the Most Vulnerable to SamSam Ransomware

A new report from Sophos says that since its first appearance in December 2015, the SamSam ransomware has raked in almost $6 million by targeting organisations and individuals around the world, including those in India. According to the 47-page report, 74 percent of the known victims are based in the United States. Other regions known to have suffered attacks include Canada, the U.K. and the Middle East, with India ranking sixth among the top victim countries across the world. The cybersecurity firm also revealed in a separate survey that 90 percent of the businesses in India have been either hit or expected to be hit by ransomware, and it’s expecting that Indian business will see an increase in cyber attacks in the near future, and SamSam ransomware could be one of them. One is not like the others Different from the traditional ransomware attacks, SamSam’s thorough encryption renders not only personal and work data files unusable but also any program nonessential to Windows operation, most of which are not routinely backed up. Unlike nearly all other ransomware attacks, much of the attack process is manual. Once inside a system, the attacker spread a payload laterally across the network; a sleeper cell awaits instructions to begin encrypting. The result of SamSam attacks is often that numerous victims are unable to recover adequately or quickly enough, and therefore decide to pay the ransom. You can’t secure what you can’t see While the infection method of the SamSam ransomware is still unclear, as always, cyber hygiene practic es should be the first line of defense. Preventing an attack (or being able to respond and isolate it quickly) requires a strong security foundation that is built on the complete visibility of the network. This pervasive visibility gives IT teams the ability to quickly identify potential exposures and attack paths. Skybox gives that visibility by consolidating data from more than 120 networking and security technologies that organizations have in use. The Skybox® SecuritySuite uses this information to create a dynamic model of an attack surface including physical, multi-cloud and OT networks where needed. The model provides context around all of the ingress/ egress points and complexities of the network and assets, thereby giving a detailed understanding of what a user is trying to defend. After building the model of the environment, Skybox will conduct a risk analysis to identify and prioritize weaknesses and vulnerabilities such as unprotected ingress/ egress points, misconfigured network devices, firewalls with overly permissive rules, exposed assets, exploitable attack vectors etc. Following the initial resilience assessment, the riskiest characteristics of the environment can be remediated to reduce risk quickly and in a demonstrable way – for example by addressing parts of the infrastructure for which there are no firewalls or where these are configured incorrectly; filling in vulnerability scanning blind spots; and recommending remediation and mitigation for high-risk vulnerabilities. Acting on this insight, the environment will immediately be more secure and resilient. If an attack or malware outbreak does occur, the user has a greater context to contain the attack quickly and eliminate the vectors.  

Read More

Bosch Perfectly Keyless App Makes Car Keys a Thing of the Past

The key of the future is digital, and it offers more features than its analog predecessors – impossible to lose or steal, and there is never a need to search for it. That is because it is stored securely and specifically for each user in a smartphone app. “Our Perfectly Keyless app is making conventional vehicle keys a thing of the past. Bosch is taking the car key into the digital realm and making it available anywhere, anytime,” says Harald Kröger, President of the Bosch Automotive Electronics division. With Perfectly Keyless, the smartphone replaces the analog vehicle key. This concept can offer owners of private vehicles increased convenience, but where it really shines is in vehicle fleets with multiple drivers. No more key handovers – fleet managers and logistics providers simply use the app to give drivers access to the vehicles. “Bosch’s digital vehicle key gives fleets a boost towards greater connectivity,” Kröger says. The company believes there is a huge market for its solution, which is making its world debut at the IAA Commercial Vehicles in Hannover. The potential customers include some 15,000 logistics providers in Germany alone. Most of them manage at least a dozen vehicles and drivers. A keyless journey Row upon row of hundreds of keys hanging on large boards – logistics providers still often use this method to organize the keys to their fleet vehicles. A missing key triggers a massive search operation. But every minute counts, especially with commercial vehicles. After all, if a truck isn’t moving, it’s not making any money. At the core of the new system is an app that dispatchers and truck drivers both have on their phones. This makes it possible to grant vehicle access with just a few clicks. In the future, the Bosch solution will also allow logistics providers to completely integrate digital key management into their dispatch and scheduling systems. As soon as dispatch is assigned drivers and trucks to a route, the system automatically generates digital keys for the vehicles and sends them to the drivers’ smartphones. If the route scheduling changes, the software adjusts the keys accordingly. “Thanks to Bosch’s fully digital key management, logistics providers enjoy both security and flexibility in their planning. This is the only way the logistics of the future will be able to function efficiently,” Kröger says. Secure key management with app and cloud Bosch digital key management connects trucks and the smartphone app via the cloud. Dispatchers or fleet managers use the app to assign a truck to a driver for a particular route. Perfectly Keyless generates a personal, secure digital key and sends it via the cloud to the truck and to the driver’s smartphone. As the driver approaches the assigned truck, the sensors installed in the truck detect the smartphone via a wireless connection. The vehicle doors will open only if the key on the phone ‘fits’ the digital lock in the vehicle. These sensors can also tell when the driver is in the driver’s seat, and the engine starts up as soon as the driver presses the start-stop button. When the driver gets out of the car at the end of the journey, the system detects this and automatically locks the doors. Battery dead – No problem But what happens if the smartphone’s battery dies, or the device has gone missing? In the future, the vehicle key in the smartphone will work even if the phone battery is dead. In that case, the phone and truck will communicate using near-field communication (NFC), a wireless protocol for sharing data over short distances. Bosch plans to make it the ‘double hull’ of its solution. If the smartphone is lost or stolen, and the app with it, the digital key can be simply deactivated online, thus blocking access to the vehicle. It cannot be opened and started until the fleet manager uses the app to provide another driver or a new phone with access to the truck.

Read More

The Importance of Being Earnest

Oscar Wild in 18th century, wrote a play called, ‘Importance of being Earnest.’ The play talks about a wealthy gentleman called Jack, who uses the name of Earnest when visiting a different town. Jack’s friend Algernon (Algy) also christens an imaginary friend Bunbury. The author clearly points towards the different lifestyle that Jack lives when he switches the name. Both the characters indulge in deception, created by the two names, or the imaginary friend as per their convenience highlighting the importance of being Earnest. Earnest in English language is defined as a thing intended or regarded as a sign or promise of what is to come. The intended satire of this English classic, although first performed in 18th century fits in modern day cookie world also. The websites or the web tools use cookies to predict what you would like to see. Cookies are actually given to a browser by the server. These cookies, then help the website to determine your interests, your likes, your dislikes etc. So if you have searched for a thing on the web and find ads related to it when you are visiting social media platforms, it’s just your cookies telling your social media about your likes and dislikes. The social media is a small part of our daily life. We are living in a globalised world, where the distance is just a number. IT has revolutionised the way we communicate, the way we spend our time, the way we shop, and most importantly the way we work. We are living a data driven life, making data an important tool. Imagine, if just like our social media platforms, our work and related data are also used to predict what we wish to do. The indication in itself has two faces. One points towards Business Intelligence (BI) wherein the data is used to automate our daily process and the other points towards data access provided to users without our consent, commonly known as data leakage. The problem is exactly as has been raised in the play. Can we trust the web resources we have been relying upon? For BI the data moves in order to generate meaningful analysis, which can support business decisions, but the business is aware of the data movement and expects it to be turned into meaningful results. Apart from BI also, a huge amount of data flows from and within the organization. Be it through mail, phone calls, messages or marketing brochures. We are sharing the data, and if we are sharing the data, then what harm would a web portal sharing the data do? The answer to the dilemma is simple – when we share the data or the information, we are in total control. We can control the level of information that we share, as well as decide the receiver of the information. But in the case of our tool sharing the information, there is no control over what will be shared or how much would be shared. Recently, a social media giant was questioned for data privacy in the US. The organisation under question has a user base of millions and is a global brand. The brand is famous for not generating its own content, but has been accused of selling the customers’ information to a third party. The case for now seems to be confined to just social media, but if a similar thing happens with the web tool that we use for our official purpose, it will be a nightmares for business stakeholders. The impact of the harm from data leakage is hard to anticipate, and when we look at private security organisations the scenario turns into a complex equation. The organisation’s biggest resource is manpower which is exposed to high attrition. The manpower moves from agency to agency, and agencies are looking for guards. Hiring new guards brings training cost with it, making new hiring an expensive business. Along with the industry specific risk, the industry also faces the generic risk of exposing their contract/ tender value which can pose a direct danger to the agency’s income. The damage is not restricted to the private security organisation only but to the customer also. The customers hire private security agencies in order to protect their premises, but if the information such as guard allocation is out it can jeopardise customer’s security also. Specific to private security industry, a contradictory statement that is often heard in the industry is that the private security industry in India is highly unorganised. The ‘unorganised’ in the statement refers to the minimal usage of process solutions streamlining daily operations of the industry. But the statement is deceiving in its own terms. Most of the private security agencies rely readily upon available solutions. The commonly used solutions do not have any encryption and generate data in a format which can be easily transferred. The lack of encryption and easy availability of the solution makes the data prone to leakage. Some of the agencies have opted for offline solutions which, unlike the readily available solutions, are agency specific. These solutions need to be maintained in-house only. The private security agency has its expertise in manned guarding, and for an agency to invest in their solution maintenance is more of a cost than investment. Moreover, the technology changes rapidly, and the in-house software are often found lagging behind the latest technology, turning them into a burden for the agency rather than a solution. Cloud computing has revolutionised the world and looks like a perfect solution to the needs of the industry. Private security agencies should be able to relate to cloud computing more than any industry. Cloud computing is like giving our data to an expert to keep it secure and provide the authorised access whenever requested. Cloud solution providers deal in data and thus are well equipped to secure the data. There are solutions in the market which can work as a bridge between the agencies’ daily operations and cloud servers. These solutions…

Read More