Top 15 Cyber Attacks in 2020 and Way forward

January 2nd, 2021 / Sushobhan Mukherjee / Comments Off on Top 15 Cyber Attacks in 2020 and Way forward

The year 2020 has become exceptional in many ways, particularly once it involves the surge in cyber-attacks as evolved due to the global pandemic Covid-19. As Home had become our New office and the security gap between the house and workplace network has attributed to the increase of cyber-attacks. In fact, 80% of the organizations… View Article

TRAI mandate and statutory compliance for MSOs and ISPs

December 19th, 2020 / Prime Research Team / Comments Off on TRAI mandate and statutory compliance for MSOs and ISPs

As more and more private service providers made an entry into the Telecommunication industry, the market felt that there was an immediate need for an independent regulatory body. In 1997, the Central Government in India felt that the responsibilities of regulating Telecom services which till then was under their supervision would be best managed by… View Article

10 Reasons to Adapt Managed Services

December 19th, 2020 / Paroma Bhattacharya / Comments Off on 10 Reasons to Adapt Managed Services

Any enterprise, however small is bound to have an IT infrastructure as an enabler to their business in the era of digital transformation. In effect, IT and Cyber security issues are bound to impact enterprise’s daily operations. Hence Managed IT and Security Services have become extremely essential in order to monitor and resolve issues proactively…. View Article

Phishing #103

Whaling Attacks

December 9th, 2020 / Prime Research Team / Comments Off on Whaling Attacks

A whaling attack is not in stark contrast with that of a business email compromise or a BEC attack, the basic plot at the root of the attack is the same – a hacker tries to posit himself as a employee of the company to inflict monetary harm or otherwise on an organization. However, in… View Article

SIEM managed Security Systems

November 6th, 2020 / Prime Research Team / Comments Off on SIEM managed Security Systems

In the modern world, there is an ever increasing demand for security solutions to ensure that an enterprise’s system is protected at all times. Security Information and Event Management (SIEM) is software that allows security professionals of an organization to have a keen insight of the operations that usually take place in their IT environment…. View Article

Cyber Security: A necessity during a pandemic

October 28th, 2020 / Prime Research Team / Comments Off on Cyber Security: A necessity during a pandemic

Global Pandemic like COVID19 has transformed almost all possible aspects of life and business. In effect, Work from Home (WFH) has become the new norm of the day. With this change in culture, it is evident that securely working from home setup would surely be a challenge. Most IT teams failed to predict or analyze… View Article

Bijoya Greetings and Time to rethink on Infrastructure

October 28th, 2020 / Prime Research Team / Comments Off on Bijoya Greetings and Time to rethink on Infrastructure

Wish you all the greetings of “Subho Bijoya”. May Goddess Durga brings best of health, happiness, peace & prosperity to you, your family and loved ones. As Maa Durga Departs for her Home, May she leave behind her blessings & love to fill your heart and home with happiness & sweet moments.  Lets start a… View Article

Business Email Compromise (BEC)

October 9th, 2020 / Prime Research Team / Comments Off on Business Email Compromise (BEC)

A Business email compromise (BEC) is an exploit in which the attacker gains access to a corporate email account and spoofs the owner’s identity to defraud the company or its employees, customers or partners of money. Business Email Compromise or BEC is a sort of phishing attack that is on the rise. In this type… View Article

Phishing safety

Phishing #101 – Staying Safe In Digital World

September 17th, 2020 / Prime Research Team / Comments Off on Phishing #101 – Staying Safe In Digital World

Phishing refers to any attempt to obtain sensitive information such as usernames, passwords, or banking details, often for malicious reasons, by impersonating a trustworthy entity in an electronic communication. Phishing is an example of a social engineering technique used to mislead users and exploit their weaknesses in network security. Various attempts have been made to… View Article

The rise of Face Recognition System due to COVID19 Outbreak

May 6th, 2020 / Prime Research Team / Comments Off on The rise of Face Recognition System due to COVID19 Outbreak

PREFACE Confronted with a deadly “crowd” disease, the public health authorities are trying to implement social distancing norms at an unprecedented level of intensity to stop its spread. Recent reports from authentic sources suggest that early and sustained imposition of gathering bans, school closures, official closures, and other social-distancing measures might reduce mortality and affected… View Article

×
WhatsApp WhatsApp us