Bisinfotech Magazine March Issue 2021

Page 44

> BIG

PICTURTE

Q

. Why has cybersecurity become a major concern nowadays and how this issue can be resolved? With the onset of the pandemic, majority of the businesses have made the shift to online. With that shift, the use of virtual tools like cloud has evidently escalated. However, while remote working and trends like BYOD and IoT shape the current technology landscape, there arises a huge risk of vulnerability to cyber threats, putting sensitive data in danger. The increased interconnectivity at all levels, without sufficient and up- to-date security tools, provides an excellent opportunity for cyber criminals to easily break into your network/system. Thus, making it crucial to invest in cybersecurity for businesses and as well as for individuals.

Senior Member, IEEE

With the usage of advance mobile applications or getting anything in lesser time, sometimes unknowingly we fall ourselves in a trap of cyber-attack. With the increasing use of tech like Artificial Intelligence (AI), Machine Learning (ML), Internet of Things (IoT), Cloud Computing, and data analytics across various industries, Cybersecurity has become a necessity and a challenge. While talking with Nitisha from BISinfotech, Bala Prasad Peddigari, Senior Member, IEEE shared his thoughts about cyber-security and also emphasized the importance of upcoming opportunities in the same field.

Bala Prasad Peddigari

Cybersecurity Practices’ Awareness Necessity for All Digital Citizen

In the current scenario, the issues can be prevented by ensuring rigorous enforcement of the security policy in an organization and its partners by ensuring adequate training and awareness on data protection, implementation of appropriate security software and keeping them updated, data encryption and backing up data regularly. Cybercrimes and data breaches can be avoided by continuous risk assessment, audits and data security testing is a parallel activity that will help organizations proactively identify and plug gaps and secure data. In case of a data breach, mitigation actions need to begin to contain any further breaches - by taking systems off-line and limiting access, fixing the vulnerability, analyzing the damage for initiating reparative actions, reaching out to the affected parties with clear messages, contacting online sites to scrub off leaked data, initiating an audit and conducting data security tests.

Q

. Please share the challenges, opportunities in securing the cloud. The most important challenge today, is the lack

> MARCH 2021

44

•Vol - 03 / 03


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.