SlideShare a Scribd company logo
1 of 9
Why is National Cyber security
important?
Network Security
V E H E R E Copyright © 2022, Vehere. All rights reserved | CONFIDENTIAL
National cyber security becomes pivotal in the protection of
sensitive data like personally identifiable information (PII),
protected health information (PHI), personal information,
intellectual property, and governmental and industry
information systems from the rising breed of threat actors
using sophisticated attack methods.
U N D E R S T A N D I N G T H E I M P O R T A N C E
V E H E R E Copyright © 2022, Vehere. All rights reserved | CONFIDENTIAL
T H E R I S I N G M E N A C E
Source: Cert-In, Ministry of electronics and
information technology
1002000
1402000
212000
0
200000
400000
600000
800000
1000000
1200000
1400000
1600000
2020 2021 2022
Cyber
Attacks
Reported
In
Year
2020
2021
2022
V E H E R E Copyright © 2022, Vehere. All rights reserved | CONFIDENTIAL
M A J O R A T T A C K S O N I N D I A I N 2 0 2 1
Numbers
180 million customer data of a food giant was leaked on the darknet.
180 million customer data of a bank was exposed.
110 million KYC information leaked from a payment service provider.
100 million customer data leaked from a payment processing firm.
4.5 million data from a leading airline’s information directory leaked.
Source: Tech circle
V E H E R E Copyright © 2022, Vehere. All rights reserved | CONFIDENTIAL
I N D U S T R I E S A T R I S K
Business
Military
Healthcare
Education
BFSI
Energy
V E H E R E Copyright © 2022, Vehere. All rights reserved | CONFIDENTIAL
T H E M I G H T Y B L O W S
Ransomware attacks - Malware designed to deny a user or organization access to files on their
computer.
Cross-Site Scripting attacks - A type of injection, in which malicious scripts are injected into otherwise
benign and trusted websites.
Man-in-the-Middle attacks - A perpetrator positions himself between a user and an application
to eavesdrop or impersonate one of the parties.
SQL Injection Attacks - A common attack vector that uses malicious SQL code for backend database
manipulation to access information.
V E H E R E Copyright © 2022, Vehere. All rights reserved | CONFIDENTIAL
T H E N E E D F O R C Y B E R S E C U R I T Y
Protect to
Prevent
Attacks
Data protection from
unauthorized access,
loss or deletion.
Preventing financial
fraud and
embezzlement.
Protection of intellectual
property.
Prevention of cyber
espionage.
Prevention of fraud
through financial
transactions like wire
transfers etc.
Improves customer
confidence.
V E H E R E Copyright © 2022, Vehere. All rights reserved | CONFIDENTIAL
T O O L S A N D M E T H O D S F O R S E C U R I T Y
Firewalls
A network security device that monitors
and filters incoming and outgoing network
traffic.
Antivirus Software
is a computer program used to prevent,
detect, and remove malware.
Penetration Testing
an authorized simulated attack
performed on a computer system to
evaluate its security.
Network Detection and Response
A solution that continuously monitors
organizational network to detect threats
and anomalous behaviour.
Staff training
Providing staff members with the
necessary skills and knowledge on
cyber security.
Thank you!
www.vehere.com
E: info@vehere.com
P: +91 33 4054 5454
Social Media Links

More Related Content

Similar to Why is National Cyber Security important

Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustrySeqrite
 
What is network detection and response?
What is network detection and response?What is network detection and response?
What is network detection and response?Vehere
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSrausdeen anfas
 
COVID-19 Healthcare Cybersecurity: Best Practices for a Remote Workforce
COVID-19 Healthcare Cybersecurity: Best Practices for a Remote WorkforceCOVID-19 Healthcare Cybersecurity: Best Practices for a Remote Workforce
COVID-19 Healthcare Cybersecurity: Best Practices for a Remote WorkforceHealth Catalyst
 
Cybersecurity Threats in Financial Services Protection.pptx
Cybersecurity Threats in  Financial Services Protection.pptxCybersecurity Threats in  Financial Services Protection.pptx
Cybersecurity Threats in Financial Services Protection.pptxLumiverse Solutions Pvt Ltd
 
cyber security services | MasGlobal Services
cyber security services | MasGlobal Servicescyber security services | MasGlobal Services
cyber security services | MasGlobal ServicesMas Global Services
 
105 Common information security threats
105 Common information security threats105 Common information security threats
105 Common information security threatsSsendiSamuel
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisIRJET Journal
 
CTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptxCTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptxSophia Price
 
CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022SophiaPalmira1
 
Improving Cybersecurity Awareness In Advanced Payment Systems
Improving Cybersecurity Awareness In Advanced Payment SystemsImproving Cybersecurity Awareness In Advanced Payment Systems
Improving Cybersecurity Awareness In Advanced Payment SystemsITIO Innovex
 
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptjdenbryston
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxeresavenzon
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochureMark Gibson
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importancemanoharparakh
 

Similar to Why is National Cyber Security important (20)

Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
What is network detection and response?
What is network detection and response?What is network detection and response?
What is network detection and response?
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
COVID-19 Healthcare Cybersecurity: Best Practices for a Remote Workforce
COVID-19 Healthcare Cybersecurity: Best Practices for a Remote WorkforceCOVID-19 Healthcare Cybersecurity: Best Practices for a Remote Workforce
COVID-19 Healthcare Cybersecurity: Best Practices for a Remote Workforce
 
Cybersecurity Threats in Financial Services Protection.pptx
Cybersecurity Threats in  Financial Services Protection.pptxCybersecurity Threats in  Financial Services Protection.pptx
Cybersecurity Threats in Financial Services Protection.pptx
 
cyber security services | MasGlobal Services
cyber security services | MasGlobal Servicescyber security services | MasGlobal Services
cyber security services | MasGlobal Services
 
105 Common information security threats
105 Common information security threats105 Common information security threats
105 Common information security threats
 
cyber security
cyber securitycyber security
cyber security
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
 
CTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptxCTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptx
 
CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022
 
Improving Cybersecurity Awareness In Advanced Payment Systems
Improving Cybersecurity Awareness In Advanced Payment SystemsImproving Cybersecurity Awareness In Advanced Payment Systems
Improving Cybersecurity Awareness In Advanced Payment Systems
 
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.ppt
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptx
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 

Recently uploaded

How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfryanfarris8
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...software pro Development
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfVishalKumarJha10
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 

Recently uploaded (20)

How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 

Why is National Cyber Security important

  • 1. Why is National Cyber security important? Network Security
  • 2. V E H E R E Copyright © 2022, Vehere. All rights reserved | CONFIDENTIAL National cyber security becomes pivotal in the protection of sensitive data like personally identifiable information (PII), protected health information (PHI), personal information, intellectual property, and governmental and industry information systems from the rising breed of threat actors using sophisticated attack methods. U N D E R S T A N D I N G T H E I M P O R T A N C E
  • 3. V E H E R E Copyright © 2022, Vehere. All rights reserved | CONFIDENTIAL T H E R I S I N G M E N A C E Source: Cert-In, Ministry of electronics and information technology 1002000 1402000 212000 0 200000 400000 600000 800000 1000000 1200000 1400000 1600000 2020 2021 2022 Cyber Attacks Reported In Year 2020 2021 2022
  • 4. V E H E R E Copyright © 2022, Vehere. All rights reserved | CONFIDENTIAL M A J O R A T T A C K S O N I N D I A I N 2 0 2 1 Numbers 180 million customer data of a food giant was leaked on the darknet. 180 million customer data of a bank was exposed. 110 million KYC information leaked from a payment service provider. 100 million customer data leaked from a payment processing firm. 4.5 million data from a leading airline’s information directory leaked. Source: Tech circle
  • 5. V E H E R E Copyright © 2022, Vehere. All rights reserved | CONFIDENTIAL I N D U S T R I E S A T R I S K Business Military Healthcare Education BFSI Energy
  • 6. V E H E R E Copyright © 2022, Vehere. All rights reserved | CONFIDENTIAL T H E M I G H T Y B L O W S Ransomware attacks - Malware designed to deny a user or organization access to files on their computer. Cross-Site Scripting attacks - A type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. Man-in-the-Middle attacks - A perpetrator positions himself between a user and an application to eavesdrop or impersonate one of the parties. SQL Injection Attacks - A common attack vector that uses malicious SQL code for backend database manipulation to access information.
  • 7. V E H E R E Copyright © 2022, Vehere. All rights reserved | CONFIDENTIAL T H E N E E D F O R C Y B E R S E C U R I T Y Protect to Prevent Attacks Data protection from unauthorized access, loss or deletion. Preventing financial fraud and embezzlement. Protection of intellectual property. Prevention of cyber espionage. Prevention of fraud through financial transactions like wire transfers etc. Improves customer confidence.
  • 8. V E H E R E Copyright © 2022, Vehere. All rights reserved | CONFIDENTIAL T O O L S A N D M E T H O D S F O R S E C U R I T Y Firewalls A network security device that monitors and filters incoming and outgoing network traffic. Antivirus Software is a computer program used to prevent, detect, and remove malware. Penetration Testing an authorized simulated attack performed on a computer system to evaluate its security. Network Detection and Response A solution that continuously monitors organizational network to detect threats and anomalous behaviour. Staff training Providing staff members with the necessary skills and knowledge on cyber security.
  • 9. Thank you! www.vehere.com E: info@vehere.com P: +91 33 4054 5454 Social Media Links