Community in read only mode June 18 & 19
This community will be set in READ ONLY mode for a while on Tuesday June 18 into Wednesday June 19 while we import content and users from our Micro Focus Forums community site. MORE INFORMATION

A Wake-Up Call for CIOs

Security_Guest Frequent Contributor.
Frequent Contributor.
2 0 1,807

Guest post by Jyoti Prakash, country director at Micro Focus, Enterprise Security Business (Indo and SAARC Countries).

Are Indian Enterprises prepared to cope with cybersecurity threats posed by rapid automation and digitization?

Cybercrimes in India have risen five-fold in the past year. It is also among the top five most targeted countries for cyberattacks in the world. With data emerging as the new currency, India will need to learn valuable lessons from the European Union (EU), which has taken the lead in A Wake-Up Call for CIOs2.jpgdata security with its General Data Protection Regulation (GDPR) act. Australia, Singapore, Japan, Hong Kong, and several other countries are working on similar data protection standards.  

The Security Blanket 

India’s Data Protection Bill 2018, which makes individual consent mandatory for data sharing, is still underway. Meanwhile, Reserve Bank of India (RBI) and Securities and Exchange Board of India (SEBI) have upped the ante with cybersecurity and cyber resilience policies and frameworks. A few months ago, SEBI mandated Cyber Security Operation Centers (C-SOCs) for Market Infrastructure Institutions and registered intermediaries. SOCs give institutions the power to transform data chaos into security insights, enhance compliance, find and repair configuration errors, and respond quickly to actual or potential breaches.  

From data on the move to data at rest, it can all be easily breached. That’s where data masking solutions that can de-identify sensitive information play a big role. Recently, the RBI has permitted tokenization of debit cards, credit cards, and prepaid cards. With this move, service providers such as Visa, MasterCard, etc., can mask original data by assigning a random surrogate value or ‘token’ to it. 

Beyond Data Security 

From data security to application security, a weak link is emerging for highly secured businesses. Apps and websites regularly collect data and make updates. This makes them highly vulnerable to targeted cyberattacks. Applications need to be secure, from the development phase to the testing phase, and be continuously monitored and protected thereafter. 

In a rapidly expanding digital economy with no boundaries, security is an ever-evolving and time-consuming matter. Enterprises need to protect their precious data through policy as well as (predictive) analysis. It’s a complex, continuous, long-term task that can only be achieved with the right partner. The question that CIOs need to ask themselves is, “Are we doing enough?”

The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.