Showing posts with label IT. Show all posts
Showing posts with label IT. Show all posts

Saturday, 27 June 2015

Be Smarter Than Technology, If Want to Defeat Cyber Crime

Information Technology(IT) is the driving force of almost all industry. Global markets and business are dependent on this huge and vast world of unseen intelligent radio waves which is practically running our lives today.
Think about those times when there was hardly anything called the internet, networking, mobile, Wi-Fi, GPS, GPRS, Cloud etc a whole new world around us so called virtual real world, in a nutshell IT has given a all new meaning to this global civilization.
Today no more distances matters neither time, with the ever growing technology the focus is getting sharper and clearer, we are one world, every one of us is under one roof, we are connected now.
Discovery of any new earth shattering innovations brings certain disturbances too. We the intelligent minds who thrive and drive our lives today primarily on technology are we safe enough? Do we really always thank this unseen intelligent friend or sometimes this friend gives us real problems?

Yes it does, with the ever increasing tools of communication we get more and more vulnerable to access, today saying hi to someone at north pole is as simple as knocking your next door neighbor. World today is enjoying the advancement of IT but along with that is also facing a battle against piracy and duplicity or rather cyber crime.
Countries across the world are setting up cyber laws to check crime but how effective are these laws are? Or is the thief smarter than the law?
We need to realize and counter this new wave of crime through the unseen radio waves, with the ever growing technology we are doomed to face new challenges but to balance a smart technology you have to be smarter.
Crime Files brings to light the growing online lottery frauds which is getting visible day by day with increase in cases registered. On a normal mail box you will find thousand of offers including strange messages. 
This same format is also used via mobile SMSs Such messages might not work or may not be able to fool people at large but, yes still there are people from small town who get trapped in this net or racket of cheaters and land up paying money in the name of huge gift.
To learn about identity theft, visit www.cibilconsultants.com

Source: Secondary

Wednesday, 24 June 2015

Study says, Effective coordination is the key to contain cyber attacks.

PUNE: Better communication and information about cyber security, right investment in skilled personnel and enabling technologies together with adoption of security measures will minimize the risk of current and emerging cyber threats, says a Websense - Ponemon Institute US report. 
The report: "Exposing the Cyber security Cracks: Roadblocks, Refresh and Raising the Human Security IQ," has focused on challenges IT executives face in dealing with cyber risks, amid communication issues between IT security professionals and executives, a desire to overhaul current security systems and limited security knowledge among executives and employees. 
The findings assume importance in the wake of rise in data thefts and the eventual financial losses suffered by customers of different business organizations such as banks that are encouraging use of IT and mobile technology driven services. 
Based on a survey of nearly 5,000 global IT security professionals (including 545 in India), the report reveals a knowledge and resource gap in the enterprise - leading to an increased level of vulnerability and risk of data security breaches. 
Web sense, Inc. is engaged in protecting organizations from cyber attacks and data theft while Ponemon Institute is dedicated to advancing responsible information and privacy management practices in business and government. 

Globally, 29% of respondents would do a complete overhaul of their current enterprise security system if they had the resources and opportunity, the survey showed. It said nearly half (47%) the respondents felt frequently disappointed with the level of protection a security solution they had procured while only 12% had never been disappointed in their security solutions. 
The report indicated that advanced persistent threats (APTs) and data exfiltration attacks rank among top fears for IT security professionals and 56% believed a data breach would trigger a change of security vendors. Encouragingly, 49% say they are planning to make significant investments and adjustments to their cyber security defenses in the next 12 months. 
Despite these concerns, a high 52% of companies do not provide cyber security education to their employees and less than half (42%) the employees have undergone a cyber threat modelling process in their present role, the report says, adding that of those that did, nearly all, (94%) found it to be important in terms of managing their cyber risk. 
"Advanced persistent threats and data exfiltration attacks rank the top fears for IT security professionals," said Larry Ponemon, chairman and founder of the Ponemon Institute. "These fears manifest because they believe their technology is in need of an overhaul and there is a widening gap in the knowledge and resource sharing among IT security professionals and executive staff. Encouragingly, the survey revealed plans for technology and education investment in place for the future," he added. 
Communication roadblocks are barriers to reducing the risk of a cyber attack, the survey said highlighting that 25% of cyber security teams never speak with their executive team about cyber security. Of those that did, 25% speak once a year and 18% speak twice while only one percent spoke weekly. 
Creating higher awareness among employee about IT threats and investing in training to help them combat such threats however seems to be a low priority for organizations the survey noted. Only 32% of respondents believe their company is investing enough in skilled personnel and technologies to be effective in executing its cyber security objectives or mission. In fact, 45% of companies represented in the research do not provide cyber security education to their employees, the survey revealed. 
Cyber law expert Vaishali Bhagwat told ToI that the human dimension in information security is almost ignored, yet the first to be blamed in case of a security breach incident. "Organisations run security awareness programmes to demonstrate compliance rather than deliver genuine behavior change in end users," Bhagwat said. "Security is never baked in as it is nobody's priority. In a market that is kind to the one who reaches there first, security is bound to go on the back burner unless some sanctions are imposed on organisations that release insecure products," Bhagwat said, adding, "Technology is pushed on to users without giving due consideration to human behavior and no significant efforts are being made to change human behavior so that it readily absorbs new technology to ensure its appropriate use." 
"This Ponemon Institute security survey highlights that a lack of communication, education and inadequate security systems is making it possible for cyber criminals to attack organizations across the globe," said John McCormack, Websense chief executive officer. "It's not surprising that many security professionals are disappointed with the level of protection their current solutions provide, as many still use legacy solutions that cannot disrupt the kill chain to prevent data theft." 

To learn about Identity theft visit: www.cibilconsultants.com

Source: Secondary

Wednesday, 17 June 2015

IT department look into Credit history and loan repayment pattern of taxpayers

Prioritize cases for recovery of past dues based on a defaulter’s ability to pay.
To recover maximum tax arrears with the optimum use of manpower, the income-tax department has decided to look into the credit history and loan repayment pattern of taxpayers and prioritize cases for recovery of past dues based on a defaulter’s ability to pay.
For this, the department would consult the Credit Information Bureau of India (CIBIL) that assigns credit scores and maintains details of loans taken by individuals, partnerships and corporations, along with their PAN.



Sources said tax officials would be able to get an idea of the assets and the financial health of an assesses against which a tax arrears recovery demand has to be pursued vigorously.
The IT department which claims a massive Rs 6.74 lakh crore in arrears to be recovered is able to pursue cases accounting for only a small part of it every year due to appeals pending in various courts, inadequate assets to recover from defaulters and due to non-traceability of assesses. For FY15, it has set a target of recovering about Rs 42,000 crore of arrears, about 6% of the R7.4 lakh crore the government wants to collect this year by way of corporation tax, personal income tax and wealth tax, 15% more than what it raised last fiscal.
However, IT will vigorously pursue recovery of arrears from defaulting partnerships and large corporations even via attaching the assets of partners and directors. In the case of individual taxpayers who have expired, it intends to reach out to their legal heirs, said a field officer, who asked not to be named.
The tax authority wants to cut down the quantum of arrears to be recovered and would consider writing off smaller demands.

Source: Secondary