Skip to main content

Cyber Attacks and the Laws that Provide Protection

You’ve seen a spider web, right? Have you ever observed how it spreads in a day or two and soon it covers entire rooms?

Well, cyber-attacks have become a similar phenomenon, and it can be said that every other person and business is under attack.

Cybercrime investigation in India is trying its best to stay ahead of these threats and attacks, and yet various kinds of crimes keep popping up.

There are various cybercrime reports that suggest that Financial Services (FS) and Technology, Media & Telecommunication (TMT) sectors are two of the most attacked sectors in India.

Here’s what has been going on in India:
  • A malware known as Petya was used to attack a terminal in India.
  • In 2018, a bank was hit by a major cyber-attack using the ATM server. The hackers are known to steal details of several Rupay and Visa card owners.
Now, if such big names need to go through a cybercrime investigation in India, then what are the chances of a regular-sized business of surviving in such a harsh world?

Well, here’s what our government has been doing about it:
  • RBI released a notification related to Consumer Protection- Limiting Liability of Customers in Unauthorized Electronic Banking Transactions on July 6, 2017.
  • Cybercrime complaints can now be registered online through a centralized citizen portal that was brought in through Crime and Criminal Tracking Network and Systems (CCTNS).
  • A desktop-based application whitelisting solution known as “Samvid” has been introduced for the Windows Operating System. The desktop can be protected from random and suspicious applications being run since it only allows certain already approved executable files to run. This could reduce the number of cybercrime investigations in India.
  • The MEITY issued two measures to curb Child Sexual Abuse Material (CSAM) in India in April 2017, with the directions being:
  • It will be mandatory for ISPs that have cable landing station Gateways/International Long Distance Licenses in the nation to implement the Internet Watch Foundation (IWF) before July 31, 2017.
  • All of the requirements provided by the Central Government under the Information Technology Act, 2000, shall be followed by all ISPs with due diligence.
The government is trying their best to keep us safe from threats.

Now it is on us to ensure that we gain knowledge about these and implement measures that will save us from any sort of cybercrime investigation in India.

Cyber laws can provide help with dealing with the after-effects of a cybersecurity breach, but leaked information cannot be brought back. Techno Legal Consultants is a premier organization in cyberlaw advisory, cybercrime consultancy, cyber law compliance audit, cybersecurity services, cyber forensics services, cyber training, cybercrime investigation in India that could lend a helping hand. Contact us to know more!

Comments

Popular posts from this blog

Role of HR in Mitigating Cyber Security Threats- An Insight into Cyber HR Courses

Cyberattacks have wreaked havoc worldwide spurring billions of dollars in global economic loss. According to the Cisco 2018 Annual Cyber Security Report, cyberattacks have caused damages worth USD 500,000 to Indian firms in the past 1.5 years. With time, cybersecurity issues will become more complex with a massive increase in data breaches in the coming years. In today’s IT-enabled businesses, HR practices need to be implemented using several techno-legal controls. This will put a stop to various HR issues like data theft, source code misuse, client poaching, employee poaching, handover/exit formalities, digital reputation attacks using fake profiles, misuse of IT facilities, misuse of social media by employees and other similar issues. The next question is how HR helps in reducing cybersecurity threats. Head down as we throw some light on the best cybersecurity courses in India. Role of HR in preventing cyber attacks Several cybersecurity problems occur bec...

The Advent Of Cyber Crimes And Tips To Combat Them

To keep customer's money safe, financial institutions worldwide use two-factor authentication. We have used them for our bank accounts. How? Remember those short, 4 to 6-digit codes that you receive from your bank when you try to log in for the first time on a new device, or when you have to input to approve a transaction. Banks send these one-time passwords through SMS text messages. SMS is, unfortunately, one of the weakest ways to implement 2FA because text messages are interceptable, as agreed by cyber law firms in India . Are we being paranoid? No. Here is an incident that happened in the UK. Telecom protocol SS7 was hacked by crooks to steal banking two-factor authentication codes. Judging by the media headlines, it's the golden age for online scams. High payoffs and the moderately low risk of detection are an inspiration for criminals to "go online." Some groups break up or are caught by law enforcement, but newer groups pop...