SlideShare ist ein Scribd-Unternehmen logo
1 von 3
wwww.etailingindiaexpo.com
India and Its Wall of Data Security
With recent developments in technology and increasing volumes of data now being stored and
used, organizations are under intense pressure to secure sensitive data from all types of external
and internal threats. The biggest challenge lies in being aware of the location and growth of basic
information, and the usage of their critical data assets.
But however disruptive and exciting your venture, there remains one area of concern:
compliance.
"The continuing proliferation of critical data across data stores, country boundaries and cloud,
along with the risks inherent to big data, necessitates a transformation in how these data assets
are safeguarded," said Amit Walia, executive vice president and chief product officer,
Informatica.
Breaches on a nation-wide scale, like the recent case where more than 30 lacs debit cards got
compromised, are very concerning. Organizations recognize that sensitive information can
potentially be at risk.
wwww.etailingindiaexpo.com
A possible domino effect of data breaches
No other country in the world is going through such a change as India is. With implementing
“Digital India”, one should take care on educating the masses on the importance of cyber
security. India is in the global top three when it comes to cyber attacks and data breaches caused
– a trend that is not only here to stay, but will increase as India’s digital citizens rise in numbers.
“One compromised device can affect the whole multi-tenant network of a company. In this,
cyber security becomes a must for both individual users and enterprises alike. Otherwise,
economic circles risk to be put in a situation similar to a recent case where a Middle East-based
hacker group extorted a staggering $10 million from two Indian companies,” says Mayukh of
PerfectCloud.
Another unfortified concept is of smart cities – a foundation of the future for Prime Minister
Modi. With devices connected with each other, sharing the cloud infrastructure, any data breach
will have a devastating domino effect. Battling illiteracy and empowering digital citizens through
knowledge – not only through innovative infrastructure and increased digital services, is a must.
Digital payments
Fear of fraud is high for any digital tool. And there's reliability; can internet players ensure that
there will be 100% uptime of the network? India adopting cashless economy will need a strong
defence mechanism from security breach.
RBI does not prescribe standards of ‘security’
On the issue of security, however, the circular only requires the wallets to have ‘adequate’ data
security infrastructure and systems, for the prevention and detection of frauds. The circular does
not prescribe any minimum standards of security to be followed by the wallets. Nor does it
establish liability in case of any fraud or loss that occurs due to the lack of security measures.
The RBI establishes these factors for banks, for example, through the Guidelines on Information
Security, Electronic Banking, Technology Risk Management and Cyber Fraud. With Indians
wwww.etailingindiaexpo.com
being forced to go cashless and turn to digital payments, the lack of such rules for non-banks like
Fintech corporations is not safe.
So, security experts got to work on:
 Safeguarding critical financial data from data breaches with maximum return and
minimum risk.
 Adjusting security postures as external attacks on financial infrastructure and online
properties increase and change.
· Meeting the need to protect from the traditional concerns with insiders and privileged
users, while also dealing with the additional hazards that compromise of these accounts may
bring.
Conclusion
Security and privacy should be widely discussed with private entities and experts, as well as
security providers in order to maintain a flawless data encryption model and eliminate data
breach risks.

Weitere ähnliche Inhalte

Was ist angesagt?

Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
Amit Kumar
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt
shaks9151
 

Was ist angesagt? (17)

Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Chapter 1 introduction to security
Chapter 1 introduction to securityChapter 1 introduction to security
Chapter 1 introduction to security
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
 
BCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsBCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 Threats
 
Cyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraCyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil Mehrotra
 
Informationsecurity
InformationsecurityInformationsecurity
Informationsecurity
 
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | SysforeSecurity and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
 
Cyber Insurance
Cyber InsuranceCyber Insurance
Cyber Insurance
 
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleDSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore?
 
Reinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security NowadaysReinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security Nowadays
 

Andere mochten auch (8)

JRIorion-STEMA-21stLit-NIR
JRIorion-STEMA-21stLit-NIRJRIorion-STEMA-21stLit-NIR
JRIorion-STEMA-21stLit-NIR
 
weekly report2
weekly report2weekly report2
weekly report2
 
DAMAGE SURVEY EXPERTS TO OCEAN SHIPPING ACCIDENTS AND INCIDENTS - 1.PDF
DAMAGE SURVEY EXPERTS TO OCEAN SHIPPING ACCIDENTS AND INCIDENTS - 1.PDFDAMAGE SURVEY EXPERTS TO OCEAN SHIPPING ACCIDENTS AND INCIDENTS - 1.PDF
DAMAGE SURVEY EXPERTS TO OCEAN SHIPPING ACCIDENTS AND INCIDENTS - 1.PDF
 
Georgian medical manuscripts
Georgian medical manuscriptsGeorgian medical manuscripts
Georgian medical manuscripts
 
Canon g12-p1
Canon g12-p1Canon g12-p1
Canon g12-p1
 
Capitulo ii
Capitulo iiCapitulo ii
Capitulo ii
 
C16 2016
C16 2016C16 2016
C16 2016
 
SwathiMabbu_BA
SwathiMabbu_BASwathiMabbu_BA
SwathiMabbu_BA
 

Ähnlich wie India and its wall of data security

5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
superintendingengine17
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
Adela Cocic
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
IJSRED
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
AnastaciaShadelb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
ChantellPantoja184
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdf
jasonuchiha2
 

Ähnlich wie India and its wall of data security (20)

5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
 
Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway
 
Top Cyber Security Course in India - GICSEH.pdf
Top Cyber Security Course in India - GICSEH.pdfTop Cyber Security Course in India - GICSEH.pdf
Top Cyber Security Course in India - GICSEH.pdf
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech
 
Cyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetCyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never Forget
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
Accenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsAccenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threats
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdf
 

Mehr von Ashish Jhalani

Mehr von Ashish Jhalani (20)

All eyes on india for global retail expansion
All eyes on india for global retail expansionAll eyes on india for global retail expansion
All eyes on india for global retail expansion
 
Sellers Seek Faster cash cycles from Retailers
Sellers Seek Faster cash cycles from RetailersSellers Seek Faster cash cycles from Retailers
Sellers Seek Faster cash cycles from Retailers
 
Learn the Role of Big Data in Retail Industry
Learn the Role of Big Data in Retail IndustryLearn the Role of Big Data in Retail Industry
Learn the Role of Big Data in Retail Industry
 
eCommerce and Retail lay stress on Disruptive Technology
eCommerce and Retail lay stress on Disruptive TechnologyeCommerce and Retail lay stress on Disruptive Technology
eCommerce and Retail lay stress on Disruptive Technology
 
Flipkart and Paytm to Play out Last eCommerce Festive Sales
Flipkart and Paytm to Play out Last eCommerce Festive SalesFlipkart and Paytm to Play out Last eCommerce Festive Sales
Flipkart and Paytm to Play out Last eCommerce Festive Sales
 
Healthcare Startups Grin at Growth Prospects in India
Healthcare Startups Grin at Growth Prospects in IndiaHealthcare Startups Grin at Growth Prospects in India
Healthcare Startups Grin at Growth Prospects in India
 
Key elements of transitioning from intrapreneur to entrepreneur
Key elements of transitioning from intrapreneur to entrepreneurKey elements of transitioning from intrapreneur to entrepreneur
Key elements of transitioning from intrapreneur to entrepreneur
 
Entrepreneurs in India india
Entrepreneurs in India indiaEntrepreneurs in India india
Entrepreneurs in India india
 
eCommerce Players Deliver Cash At Your Doorstep
eCommerce Players Deliver Cash At Your DoorstepeCommerce Players Deliver Cash At Your Doorstep
eCommerce Players Deliver Cash At Your Doorstep
 
India’s Startups through Thick and Thin in 2016
India’s Startups through Thick and Thin in 2016India’s Startups through Thick and Thin in 2016
India’s Startups through Thick and Thin in 2016
 
Ecommerce Provides A New Thrust To Shipping Industry
Ecommerce Provides A New Thrust To Shipping IndustryEcommerce Provides A New Thrust To Shipping Industry
Ecommerce Provides A New Thrust To Shipping Industry
 
Cloud Computing to Boost eCommerce
Cloud Computing to Boost eCommerceCloud Computing to Boost eCommerce
Cloud Computing to Boost eCommerce
 
Create Your eCommerce Photo Catalogue
Create Your eCommerce Photo CatalogueCreate Your eCommerce Photo Catalogue
Create Your eCommerce Photo Catalogue
 
Finally, Amazon Prime Video Launched in India
Finally, Amazon Prime Video Launched in IndiaFinally, Amazon Prime Video Launched in India
Finally, Amazon Prime Video Launched in India
 
Ola, Meru Seeks Govt. Intervention to Fight MNCs
Ola, Meru Seeks Govt. Intervention to Fight MNCsOla, Meru Seeks Govt. Intervention to Fight MNCs
Ola, Meru Seeks Govt. Intervention to Fight MNCs
 
Paytm sells off 1% stake for a mammoth $48.1 million
Paytm sells off 1% stake for a mammoth $48.1 millionPaytm sells off 1% stake for a mammoth $48.1 million
Paytm sells off 1% stake for a mammoth $48.1 million
 
Government banks on incentivising to boost digital payment
Government banks on incentivising to boost digital paymentGovernment banks on incentivising to boost digital payment
Government banks on incentivising to boost digital payment
 
Shop clues to ‘reach’ for offline merchants transactions
Shop clues to ‘reach’ for offline merchants transactionsShop clues to ‘reach’ for offline merchants transactions
Shop clues to ‘reach’ for offline merchants transactions
 
Flipkart’s voyage seeks e commerce harbour
Flipkart’s voyage seeks e commerce harbourFlipkart’s voyage seeks e commerce harbour
Flipkart’s voyage seeks e commerce harbour
 
Global firms eye on india’s e commerce pie
Global firms eye on india’s e commerce pieGlobal firms eye on india’s e commerce pie
Global firms eye on india’s e commerce pie
 

Kürzlich hochgeladen

Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Kürzlich hochgeladen (20)

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 

India and its wall of data security

  • 1. wwww.etailingindiaexpo.com India and Its Wall of Data Security With recent developments in technology and increasing volumes of data now being stored and used, organizations are under intense pressure to secure sensitive data from all types of external and internal threats. The biggest challenge lies in being aware of the location and growth of basic information, and the usage of their critical data assets. But however disruptive and exciting your venture, there remains one area of concern: compliance. "The continuing proliferation of critical data across data stores, country boundaries and cloud, along with the risks inherent to big data, necessitates a transformation in how these data assets are safeguarded," said Amit Walia, executive vice president and chief product officer, Informatica. Breaches on a nation-wide scale, like the recent case where more than 30 lacs debit cards got compromised, are very concerning. Organizations recognize that sensitive information can potentially be at risk.
  • 2. wwww.etailingindiaexpo.com A possible domino effect of data breaches No other country in the world is going through such a change as India is. With implementing “Digital India”, one should take care on educating the masses on the importance of cyber security. India is in the global top three when it comes to cyber attacks and data breaches caused – a trend that is not only here to stay, but will increase as India’s digital citizens rise in numbers. “One compromised device can affect the whole multi-tenant network of a company. In this, cyber security becomes a must for both individual users and enterprises alike. Otherwise, economic circles risk to be put in a situation similar to a recent case where a Middle East-based hacker group extorted a staggering $10 million from two Indian companies,” says Mayukh of PerfectCloud. Another unfortified concept is of smart cities – a foundation of the future for Prime Minister Modi. With devices connected with each other, sharing the cloud infrastructure, any data breach will have a devastating domino effect. Battling illiteracy and empowering digital citizens through knowledge – not only through innovative infrastructure and increased digital services, is a must. Digital payments Fear of fraud is high for any digital tool. And there's reliability; can internet players ensure that there will be 100% uptime of the network? India adopting cashless economy will need a strong defence mechanism from security breach. RBI does not prescribe standards of ‘security’ On the issue of security, however, the circular only requires the wallets to have ‘adequate’ data security infrastructure and systems, for the prevention and detection of frauds. The circular does not prescribe any minimum standards of security to be followed by the wallets. Nor does it establish liability in case of any fraud or loss that occurs due to the lack of security measures. The RBI establishes these factors for banks, for example, through the Guidelines on Information Security, Electronic Banking, Technology Risk Management and Cyber Fraud. With Indians
  • 3. wwww.etailingindiaexpo.com being forced to go cashless and turn to digital payments, the lack of such rules for non-banks like Fintech corporations is not safe. So, security experts got to work on:  Safeguarding critical financial data from data breaches with maximum return and minimum risk.  Adjusting security postures as external attacks on financial infrastructure and online properties increase and change. · Meeting the need to protect from the traditional concerns with insiders and privileged users, while also dealing with the additional hazards that compromise of these accounts may bring. Conclusion Security and privacy should be widely discussed with private entities and experts, as well as security providers in order to maintain a flawless data encryption model and eliminate data breach risks.