Average data breach cost hits Rs 12.8 crore in India: IBM

Agencies
July 23, 2019

The average cost of data breach in India grew 7.29 per cent year-over-year to reach Rs 12.8 crore from Rs 11.9 crore last year, said a new study by IBM on Tuesday.

Per capita cost per lost or stolen record reached Rs 5,019, which represents an increase of 9.76 per cent from the prior year, said the "Cost of a Data Breach" report. 

The root cause for 51 per cent of data breaches was malicious or criminal attacks, system glitches contributed to 27 per cent of breaches and human error led to 22 per cent of breaches in India, the findings showed.

"India is witnessing a significant change in the nature of cyber-crimes, it is now extremely organised and collaborative," Vaidyanathan Iyer, Security Software Leader, IBM India/South Asia, said in a statement.

"Organisations need to significantly invest in three core areas when it comes to cyber security -- risk assessment based on business objectives, cognitive threat management and ensuring digital trust," Iyer added.

The findings are based on in-depth interviews with more than 500 companies around the world that suffered a breach over the past year. 

The study also examined the cost of data breaches in different industries and regions, finding that data breaches in the US are vastly more expensive - costing $8.19 million, or more than double the average for worldwide companies in the study. 

Costs for data breaches in the U.S. increased by 130 per cent over the past 14 years of the study; up from $3.54 million in the 2006 study.

For the ninth year in a row, healthcare organisations had the highest cost of a breach - nearly $6.5 million on average - over 60 per cent more than other industries in the study.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 10,2020

New Delhi, Mar 10: Crisis-hit Yes Bank on Tuesday said that it has enabled inward IMPS and NEFT services.

The move allows people to send money from other bank accounts to their Yes Bank account through IMPS (Immediate Payment Service) and NEFT (National Electronic Funds Transfer) mode.

In a tweet, the bank also said that Yes Bank customers can pay their credit card dues and loan obligations from other bank accounts.

"Inward IMPS/NEFT services have now been enabled. You can make payments towards YES BANK Credit Card dues and loan obligations from other bank accounts. Thank you for your co-operation. @RBIA @FinMinIndia," said tweet.

Last week Yes Bank was placed under moratorium and a withdrawal cap of Rs 50,000 was imposed till April 3.

The administrator of Yes Bank, Prashant Kumar and Rajnish Kumar, the Chairman of the State Bank of India are hopeful that moratorium would be lifted within a week.

As per the Reserve Bank of India (RBI) draft reconstruction scheme for the crisis-hit private lender, the SBI will take up 49 per cent in the bank by investing Rs 2,450 crore.

The new board of directors will stand constituted from the appointed date. It will comprise a CEO and MD, non-executive chairman and non-executive directors. The SBI will have nominee directors appointed on the board of the reconstructed bank.

The RBI may appoint additional directors to the board, who shall continue in office for one year, or until an alternate board is constituted by Yes Bank.

The SBI will not reduce its holding below 26 per cent before completion of three years from the date of infusion of the capital.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 16,2020

While Google is still working on a coronavirus screening and tracking website, Microsoft Bing team has already launched a web portal for tracking COVID-19 infections worldwide.

The website, accessible at bing.com/covid, provides up-to-date infection statistics for each country.

The COVID-19 Tracker currently lists 168,835 as total confirmed cases, 84,558 active cases, 77,761 recovered cases and 6,516 deaths.

There are at least 3,244 confirmed cases of novel coronavirus in the US and at least 61 deaths.

"Lots of Bing folks worked (from home) this past week to create a mapping and authoritative news resource for COVID19 info," Michael Schechter, General Manager for Bing Growth and Distribution at Microsoft, was quoted as saying in a ZDNet report on Sunday.

An interactive map allows site visitors to click on the country to see the specific number of cases and related articles from a variety of publishers.

Data is being aggregated from sources like the World Health Organization (WHO), the US Centers for Disease Control and Prevention (CDC), and the European Centre for Disease Prevention and Control (ECDC).

Microsoft announced the website two days after US President Donald Trump said Google has begun working on COVID-19-related portal for US citizens.

Google's website is being built by Verily, a subsidiary of Alphabet focused on healthcare services.

"More than 1,700 engineers are currently working on the site", Trump said during a press briefing last week.

The tool will triage people who are concerned about their COVID-19 risk into testing sites based on guidance from public health officials and test availability.

Initially, there was some confusion on Google's coronavirus portal but the company later announced that it is "partnering with the US Government in developing a nationwide website that includes information about COVID-19 symptoms, risk, and testing information."

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 22,2020

Kochi, May 22: During the nationwide COVID-19 lockdown, Kerala recorded the highest number of cyber attacks followed by Punjab and Tamil Nadu, a study by anti-virus software firm K7 Computing said on Thursday.

In a statement issued in Chennai, the company said its K7 Computing's Cyber Threat Report, a comprehensive analysis of cyber attacks during the lockdown has found that Kerala recorded the highest number of cyber attacks during this period. The report analyses various cyber attacks within India during the pandemic and reveals that threat actors targeted the state with COVID-themed attacks aimed at exploiting user trust.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period - the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu with 184 attacks, the company said.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level.

These attacks aimed to compromise computers and mobile devices to gain access to users' confidential data, banking details, and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users' sensitive data. Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better. Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost 6 and 4 times the number of attacks as Bengaluru users.

According to the statement, a majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users. These attacks were aimed at heightening users' fears and creating a sense of urgency to take action.

K7 Labs noticed phishing attacks where scamsters posed as representatives of the United States Department of Treasury, the World Health Organization (WHO), and the Centres for Disease Control and Prevention (CDC), the company said.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus.

"Covid-19 has created an ideal situation for various threat actors to target individuals and enterprises alike. The panic caused by the stringent lockdown measures and rapid spread of this virus has left many people looking for more information on the situation," J. Kesavardhanan, Founder and CEO of K7 Computing was quoted as saying in the statement.

"Threat actors exploit this fear to their advantage and scam users into downloading malicious software and divulging sensitive information like banking codes. The need to be cyber cautious has never been greater. This is more so in the case of corporates who have adopted a work from home policy hurriedly without adequate cyber hygiene. We have seen an increase in attacks on enterprises and SME employees as well," he added.

Such attacks are expected to continue till normalcy returns. Social engineering attacks targeted at winning users' trust will gain momentum.

Healthcare institutions, well-known government offices, and international organisations will continue to be a prime target throughout the pandemic, the statement said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.