RBI New Set of Cyber Security Guidelines for Banks

While Information Security focuses on protecting confidentiality, integrity, and availability of information, Cyber Security protects cyberspace environment from cyber attacks.  RBI (Reserve Bank of India) “Cyber Security Policy” guides the Banks in India for designing and implementing next generation cyber protection capabilities. As per RBI, banks should implement basic cyber security controls to improve their […]

How to Identify a Phishing Email?

Phishing is the malicious way to deceive and take advantage of users using different mediums. Phishing attacks are targeted at stealing important, confidential information such as usernames, passwords, credit card information, network token, and more. Both individuals and organizations are at risk. Virtually any kind of private or corporate information can be targeted, whether for […]

What is Vishing?

Vishing is phishing’s mobile counterpart. It is defined as the act of using the telephone in an attempt to scam the client for the surrender of private information to be used for identity theft. The scammer typically pretends to be a legitimate business and tricks the victim into believing he or she is going to […]

Mistakes while Implementing DMARC

DMARC, or Domain-based Message Authentication Reporting & Compliance, protects corporate trusted domains from email spoofing attacks. Due to the rapid expansion of Email fraud and the fact that domain spoofing attacks make up a large percentage of these attacks, it is no surprise that many organizations are looking to implement DMARC authentication to validate emails […]

Scroll to top