SlideShare a Scribd company logo
wwww.etailingindiaexpo.com
India and Its Wall of Data Security
With recent developments in technology and increasing volumes of data now being stored and
used, organizations are under intense pressure to secure sensitive data from all types of external
and internal threats. The biggest challenge lies in being aware of the location and growth of basic
information, and the usage of their critical data assets.
But however disruptive and exciting your venture, there remains one area of concern:
compliance.
"The continuing proliferation of critical data across data stores, country boundaries and cloud,
along with the risks inherent to big data, necessitates a transformation in how these data assets
are safeguarded," said Amit Walia, executive vice president and chief product officer,
Informatica.
Breaches on a nation-wide scale, like the recent case where more than 30 lacs debit cards got
compromised, are very concerning. Organizations recognize that sensitive information can
potentially be at risk.
wwww.etailingindiaexpo.com
A possible domino effect of data breaches
No other country in the world is going through such a change as India is. With implementing
“Digital India”, one should take care on educating the masses on the importance of cyber
security. India is in the global top three when it comes to cyber attacks and data breaches caused
– a trend that is not only here to stay, but will increase as India’s digital citizens rise in numbers.
“One compromised device can affect the whole multi-tenant network of a company. In this,
cyber security becomes a must for both individual users and enterprises alike. Otherwise,
economic circles risk to be put in a situation similar to a recent case where a Middle East-based
hacker group extorted a staggering $10 million from two Indian companies,” says Mayukh of
PerfectCloud.
Another unfortified concept is of smart cities – a foundation of the future for Prime Minister
Modi. With devices connected with each other, sharing the cloud infrastructure, any data breach
will have a devastating domino effect. Battling illiteracy and empowering digital citizens through
knowledge – not only through innovative infrastructure and increased digital services, is a must.
Digital payments
Fear of fraud is high for any digital tool. And there's reliability; can internet players ensure that
there will be 100% uptime of the network? India adopting cashless economy will need a strong
defence mechanism from security breach.
RBI does not prescribe standards of ‘security’
On the issue of security, however, the circular only requires the wallets to have ‘adequate’ data
security infrastructure and systems, for the prevention and detection of frauds. The circular does
not prescribe any minimum standards of security to be followed by the wallets. Nor does it
establish liability in case of any fraud or loss that occurs due to the lack of security measures.
The RBI establishes these factors for banks, for example, through the Guidelines on Information
Security, Electronic Banking, Technology Risk Management and Cyber Fraud. With Indians
wwww.etailingindiaexpo.com
being forced to go cashless and turn to digital payments, the lack of such rules for non-banks like
Fintech corporations is not safe.
So, security experts got to work on:
 Safeguarding critical financial data from data breaches with maximum return and
minimum risk.
 Adjusting security postures as external attacks on financial infrastructure and online
properties increase and change.
· Meeting the need to protect from the traditional concerns with insiders and privileged
users, while also dealing with the additional hazards that compromise of these accounts may
bring.
Conclusion
Security and privacy should be widely discussed with private entities and experts, as well as
security providers in order to maintain a flawless data encryption model and eliminate data
breach risks.

More Related Content

What's hot

Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
Chapter 1 introduction to security
Chapter 1 introduction to securityChapter 1 introduction to security
Chapter 1 introduction to securitynewbie2019
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-statusRama Reddy
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Netpluz Asia Pte Ltd
 
BCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsBCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsGareth Niblett
 
Cyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraCyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraKapil Mehrotra
 
Informationsecurity
InformationsecurityInformationsecurity
InformationsecurityUmme habiba
 
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | SysforeSecurity and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | SysforeSysfore Technologies
 
Cyber Insurance
Cyber InsuranceCyber Insurance
Cyber InsuranceClubHack
 
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01guest446b00
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurityMark Albala
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.pptshaks9151
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoTAmy Daly
 
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleDSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleAndris Soroka
 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? Abraham Vergis
 
Reinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security NowadaysReinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security NowadaysGoutama Bachtiar
 

What's hot (17)

Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Chapter 1 introduction to security
Chapter 1 introduction to securityChapter 1 introduction to security
Chapter 1 introduction to security
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
 
BCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsBCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 Threats
 
Cyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraCyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil Mehrotra
 
Informationsecurity
InformationsecurityInformationsecurity
Informationsecurity
 
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | SysforeSecurity and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
 
Cyber Insurance
Cyber InsuranceCyber Insurance
Cyber Insurance
 
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleDSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore?
 
Reinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security NowadaysReinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security Nowadays
 

Viewers also liked

Viewers also liked (8)

JRIorion-STEMA-21stLit-NIR
JRIorion-STEMA-21stLit-NIRJRIorion-STEMA-21stLit-NIR
JRIorion-STEMA-21stLit-NIR
 
weekly report2
weekly report2weekly report2
weekly report2
 
DAMAGE SURVEY EXPERTS TO OCEAN SHIPPING ACCIDENTS AND INCIDENTS - 1.PDF
DAMAGE SURVEY EXPERTS TO OCEAN SHIPPING ACCIDENTS AND INCIDENTS - 1.PDFDAMAGE SURVEY EXPERTS TO OCEAN SHIPPING ACCIDENTS AND INCIDENTS - 1.PDF
DAMAGE SURVEY EXPERTS TO OCEAN SHIPPING ACCIDENTS AND INCIDENTS - 1.PDF
 
Georgian medical manuscripts
Georgian medical manuscriptsGeorgian medical manuscripts
Georgian medical manuscripts
 
Canon g12-p1
Canon g12-p1Canon g12-p1
Canon g12-p1
 
Capitulo ii
Capitulo iiCapitulo ii
Capitulo ii
 
C16 2016
C16 2016C16 2016
C16 2016
 
SwathiMabbu_BA
SwathiMabbu_BASwathiMabbu_BA
SwathiMabbu_BA
 

Similar to India and its wall of data security

5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internetsuperintendingengine17
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksIRJET Journal
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Dr. Amarjeet Singh
 
Top Cyber Security Course in India - GICSEH.pdf
Top Cyber Security Course in India - GICSEH.pdfTop Cyber Security Course in India - GICSEH.pdf
Top Cyber Security Course in India - GICSEH.pdfGICSEH
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingIJSRED
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In IndiaIRJET Journal
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268xosap
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docxMarcusBrown87
 
Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech Harshit Verma
 
Cyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetCyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetTechugo
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
Accenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsAccenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsLapman Lee ✔
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfjasonuchiha2
 

Similar to India and its wall of data security (20)

5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
 
Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway
 
Top Cyber Security Course in India - GICSEH.pdf
Top Cyber Security Course in India - GICSEH.pdfTop Cyber Security Course in India - GICSEH.pdf
Top Cyber Security Course in India - GICSEH.pdf
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech
 
Cyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetCyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never Forget
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
Accenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsAccenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threats
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdf
 

More from Ashish Jhalani

All eyes on india for global retail expansion
All eyes on india for global retail expansionAll eyes on india for global retail expansion
All eyes on india for global retail expansionAshish Jhalani
 
Sellers Seek Faster cash cycles from Retailers
Sellers Seek Faster cash cycles from RetailersSellers Seek Faster cash cycles from Retailers
Sellers Seek Faster cash cycles from RetailersAshish Jhalani
 
Learn the Role of Big Data in Retail Industry
Learn the Role of Big Data in Retail IndustryLearn the Role of Big Data in Retail Industry
Learn the Role of Big Data in Retail IndustryAshish Jhalani
 
eCommerce and Retail lay stress on Disruptive Technology
eCommerce and Retail lay stress on Disruptive TechnologyeCommerce and Retail lay stress on Disruptive Technology
eCommerce and Retail lay stress on Disruptive TechnologyAshish Jhalani
 
Flipkart and Paytm to Play out Last eCommerce Festive Sales
Flipkart and Paytm to Play out Last eCommerce Festive SalesFlipkart and Paytm to Play out Last eCommerce Festive Sales
Flipkart and Paytm to Play out Last eCommerce Festive SalesAshish Jhalani
 
Healthcare Startups Grin at Growth Prospects in India
Healthcare Startups Grin at Growth Prospects in IndiaHealthcare Startups Grin at Growth Prospects in India
Healthcare Startups Grin at Growth Prospects in IndiaAshish Jhalani
 
Key elements of transitioning from intrapreneur to entrepreneur
Key elements of transitioning from intrapreneur to entrepreneurKey elements of transitioning from intrapreneur to entrepreneur
Key elements of transitioning from intrapreneur to entrepreneurAshish Jhalani
 
Entrepreneurs in India india
Entrepreneurs in India indiaEntrepreneurs in India india
Entrepreneurs in India indiaAshish Jhalani
 
eCommerce Players Deliver Cash At Your Doorstep
eCommerce Players Deliver Cash At Your DoorstepeCommerce Players Deliver Cash At Your Doorstep
eCommerce Players Deliver Cash At Your DoorstepAshish Jhalani
 
India’s Startups through Thick and Thin in 2016
India’s Startups through Thick and Thin in 2016India’s Startups through Thick and Thin in 2016
India’s Startups through Thick and Thin in 2016Ashish Jhalani
 
Ecommerce Provides A New Thrust To Shipping Industry
Ecommerce Provides A New Thrust To Shipping IndustryEcommerce Provides A New Thrust To Shipping Industry
Ecommerce Provides A New Thrust To Shipping IndustryAshish Jhalani
 
Cloud Computing to Boost eCommerce
Cloud Computing to Boost eCommerceCloud Computing to Boost eCommerce
Cloud Computing to Boost eCommerceAshish Jhalani
 
Create Your eCommerce Photo Catalogue
Create Your eCommerce Photo CatalogueCreate Your eCommerce Photo Catalogue
Create Your eCommerce Photo CatalogueAshish Jhalani
 
Finally, Amazon Prime Video Launched in India
Finally, Amazon Prime Video Launched in IndiaFinally, Amazon Prime Video Launched in India
Finally, Amazon Prime Video Launched in IndiaAshish Jhalani
 
Ola, Meru Seeks Govt. Intervention to Fight MNCs
Ola, Meru Seeks Govt. Intervention to Fight MNCsOla, Meru Seeks Govt. Intervention to Fight MNCs
Ola, Meru Seeks Govt. Intervention to Fight MNCsAshish Jhalani
 
Paytm sells off 1% stake for a mammoth $48.1 million
Paytm sells off 1% stake for a mammoth $48.1 millionPaytm sells off 1% stake for a mammoth $48.1 million
Paytm sells off 1% stake for a mammoth $48.1 millionAshish Jhalani
 
Government banks on incentivising to boost digital payment
Government banks on incentivising to boost digital paymentGovernment banks on incentivising to boost digital payment
Government banks on incentivising to boost digital paymentAshish Jhalani
 
Shop clues to ‘reach’ for offline merchants transactions
Shop clues to ‘reach’ for offline merchants transactionsShop clues to ‘reach’ for offline merchants transactions
Shop clues to ‘reach’ for offline merchants transactionsAshish Jhalani
 
Flipkart’s voyage seeks e commerce harbour
Flipkart’s voyage seeks e commerce harbourFlipkart’s voyage seeks e commerce harbour
Flipkart’s voyage seeks e commerce harbourAshish Jhalani
 
Global firms eye on india’s e commerce pie
Global firms eye on india’s e commerce pieGlobal firms eye on india’s e commerce pie
Global firms eye on india’s e commerce pieAshish Jhalani
 

More from Ashish Jhalani (20)

All eyes on india for global retail expansion
All eyes on india for global retail expansionAll eyes on india for global retail expansion
All eyes on india for global retail expansion
 
Sellers Seek Faster cash cycles from Retailers
Sellers Seek Faster cash cycles from RetailersSellers Seek Faster cash cycles from Retailers
Sellers Seek Faster cash cycles from Retailers
 
Learn the Role of Big Data in Retail Industry
Learn the Role of Big Data in Retail IndustryLearn the Role of Big Data in Retail Industry
Learn the Role of Big Data in Retail Industry
 
eCommerce and Retail lay stress on Disruptive Technology
eCommerce and Retail lay stress on Disruptive TechnologyeCommerce and Retail lay stress on Disruptive Technology
eCommerce and Retail lay stress on Disruptive Technology
 
Flipkart and Paytm to Play out Last eCommerce Festive Sales
Flipkart and Paytm to Play out Last eCommerce Festive SalesFlipkart and Paytm to Play out Last eCommerce Festive Sales
Flipkart and Paytm to Play out Last eCommerce Festive Sales
 
Healthcare Startups Grin at Growth Prospects in India
Healthcare Startups Grin at Growth Prospects in IndiaHealthcare Startups Grin at Growth Prospects in India
Healthcare Startups Grin at Growth Prospects in India
 
Key elements of transitioning from intrapreneur to entrepreneur
Key elements of transitioning from intrapreneur to entrepreneurKey elements of transitioning from intrapreneur to entrepreneur
Key elements of transitioning from intrapreneur to entrepreneur
 
Entrepreneurs in India india
Entrepreneurs in India indiaEntrepreneurs in India india
Entrepreneurs in India india
 
eCommerce Players Deliver Cash At Your Doorstep
eCommerce Players Deliver Cash At Your DoorstepeCommerce Players Deliver Cash At Your Doorstep
eCommerce Players Deliver Cash At Your Doorstep
 
India’s Startups through Thick and Thin in 2016
India’s Startups through Thick and Thin in 2016India’s Startups through Thick and Thin in 2016
India’s Startups through Thick and Thin in 2016
 
Ecommerce Provides A New Thrust To Shipping Industry
Ecommerce Provides A New Thrust To Shipping IndustryEcommerce Provides A New Thrust To Shipping Industry
Ecommerce Provides A New Thrust To Shipping Industry
 
Cloud Computing to Boost eCommerce
Cloud Computing to Boost eCommerceCloud Computing to Boost eCommerce
Cloud Computing to Boost eCommerce
 
Create Your eCommerce Photo Catalogue
Create Your eCommerce Photo CatalogueCreate Your eCommerce Photo Catalogue
Create Your eCommerce Photo Catalogue
 
Finally, Amazon Prime Video Launched in India
Finally, Amazon Prime Video Launched in IndiaFinally, Amazon Prime Video Launched in India
Finally, Amazon Prime Video Launched in India
 
Ola, Meru Seeks Govt. Intervention to Fight MNCs
Ola, Meru Seeks Govt. Intervention to Fight MNCsOla, Meru Seeks Govt. Intervention to Fight MNCs
Ola, Meru Seeks Govt. Intervention to Fight MNCs
 
Paytm sells off 1% stake for a mammoth $48.1 million
Paytm sells off 1% stake for a mammoth $48.1 millionPaytm sells off 1% stake for a mammoth $48.1 million
Paytm sells off 1% stake for a mammoth $48.1 million
 
Government banks on incentivising to boost digital payment
Government banks on incentivising to boost digital paymentGovernment banks on incentivising to boost digital payment
Government banks on incentivising to boost digital payment
 
Shop clues to ‘reach’ for offline merchants transactions
Shop clues to ‘reach’ for offline merchants transactionsShop clues to ‘reach’ for offline merchants transactions
Shop clues to ‘reach’ for offline merchants transactions
 
Flipkart’s voyage seeks e commerce harbour
Flipkart’s voyage seeks e commerce harbourFlipkart’s voyage seeks e commerce harbour
Flipkart’s voyage seeks e commerce harbour
 
Global firms eye on india’s e commerce pie
Global firms eye on india’s e commerce pieGlobal firms eye on india’s e commerce pie
Global firms eye on india’s e commerce pie
 

Recently uploaded

PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePedroFerreira53928
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...Denish Jangid
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfbu07226
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesRased Khan
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleCeline George
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxricssacare
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resourcesaileywriter
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfTamralipta Mahavidyalaya
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...Nguyen Thanh Tu Collection
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chipsGeoBlogs
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXMIRIAMSALINAS13
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPCeline George
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfYibeltalNibretu
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxakshayaramakrishnan21
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxssuserbdd3e8
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxJenilouCasareno
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...Sayali Powar
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxShibin Azad
 

Recently uploaded (20)

PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 

India and its wall of data security

  • 1. wwww.etailingindiaexpo.com India and Its Wall of Data Security With recent developments in technology and increasing volumes of data now being stored and used, organizations are under intense pressure to secure sensitive data from all types of external and internal threats. The biggest challenge lies in being aware of the location and growth of basic information, and the usage of their critical data assets. But however disruptive and exciting your venture, there remains one area of concern: compliance. "The continuing proliferation of critical data across data stores, country boundaries and cloud, along with the risks inherent to big data, necessitates a transformation in how these data assets are safeguarded," said Amit Walia, executive vice president and chief product officer, Informatica. Breaches on a nation-wide scale, like the recent case where more than 30 lacs debit cards got compromised, are very concerning. Organizations recognize that sensitive information can potentially be at risk.
  • 2. wwww.etailingindiaexpo.com A possible domino effect of data breaches No other country in the world is going through such a change as India is. With implementing “Digital India”, one should take care on educating the masses on the importance of cyber security. India is in the global top three when it comes to cyber attacks and data breaches caused – a trend that is not only here to stay, but will increase as India’s digital citizens rise in numbers. “One compromised device can affect the whole multi-tenant network of a company. In this, cyber security becomes a must for both individual users and enterprises alike. Otherwise, economic circles risk to be put in a situation similar to a recent case where a Middle East-based hacker group extorted a staggering $10 million from two Indian companies,” says Mayukh of PerfectCloud. Another unfortified concept is of smart cities – a foundation of the future for Prime Minister Modi. With devices connected with each other, sharing the cloud infrastructure, any data breach will have a devastating domino effect. Battling illiteracy and empowering digital citizens through knowledge – not only through innovative infrastructure and increased digital services, is a must. Digital payments Fear of fraud is high for any digital tool. And there's reliability; can internet players ensure that there will be 100% uptime of the network? India adopting cashless economy will need a strong defence mechanism from security breach. RBI does not prescribe standards of ‘security’ On the issue of security, however, the circular only requires the wallets to have ‘adequate’ data security infrastructure and systems, for the prevention and detection of frauds. The circular does not prescribe any minimum standards of security to be followed by the wallets. Nor does it establish liability in case of any fraud or loss that occurs due to the lack of security measures. The RBI establishes these factors for banks, for example, through the Guidelines on Information Security, Electronic Banking, Technology Risk Management and Cyber Fraud. With Indians
  • 3. wwww.etailingindiaexpo.com being forced to go cashless and turn to digital payments, the lack of such rules for non-banks like Fintech corporations is not safe. So, security experts got to work on:  Safeguarding critical financial data from data breaches with maximum return and minimum risk.  Adjusting security postures as external attacks on financial infrastructure and online properties increase and change. · Meeting the need to protect from the traditional concerns with insiders and privileged users, while also dealing with the additional hazards that compromise of these accounts may bring. Conclusion Security and privacy should be widely discussed with private entities and experts, as well as security providers in order to maintain a flawless data encryption model and eliminate data breach risks.