• Solving Business Challenges with Technology
LanguageBtn

Cyber Security

Cybersecurity is the body of knowledge that defines the guidelines, frameworks, policies, best practices, and measures to safeguard information technology assets in cyberspace. In a broader perspective, this is termed information security which encompasses the protection of both physical and logical information assets. Securing the computers from virus attacks are of bygone days. Both evolving technology and ever-increasing digitisation keep the security threat landscape always rattled. Machine learning and artificial intelligence continue to add new dimensions to both threat perception and defence mechanisms.

Cybersecurity breach is not limited to loss of critical information but extended to disruption of service, theft, money extortion, damage to enterprise reputation and even committing larger crime and conspiracy using the stolen data. Cyberspace is a new front of global warfare with all leading countries ready with a separate cyber warfare command centre to monitor, prevent and foil cybercrimes.

Extrapolix Cybersecurity Practice

The zero trust principle is the cornerstone of the cybersecurity apparatus. The CS is built around people, processes, and technology on the principles of (CIA) Confidentiality, Integrity, and Availability, to ensure that only authorized users have access to accurate and complete information when required.

Cybersecurity implementation is a continuous process, every process cycle starts with fresh evaluation and ends with renewed objectives. Every minute new vulnerabilities are discovered along with brand new attack vectors. So our team is always on the war front defining new security objectives, ensuring compliance, and monitoring the performance.

Evaluate: Formulating Policies, and Frameworks

Every business enterprise has its own unique organisation hierarchy, process flow, technology used, information asset, risk, threat landscape, vulnerability and security need. As part of the evaluating process we study all those aspects that influence their security requirement. Based on the requirement study security objectives are set with the formulation of security policies and frameworks. Enterprise-specific customised Information Technology Policy, Information Security Policy, Cyber Security Framework, Cyber Crisis Management Plan are prepared by us and approved by the Board of Directors. These policy documents are periodically reviewed, revised, and approved for the entire organisation to follow and practice.

Execute: Conducting Awareness, Training, and Compliance

Information Security or Cyber security per se is still a very new domain for the common people. People still fail to appreciate the impact of many of their acts of omission or commission which has a severe security implication e.g. sharing information casually on social media, or carelessly managing passwords. Hence awareness and training about the company policy is very imperative for compliance requirements. Known vulnerabilities are too addressed as a part of executing process.

Monitor: Vulnerability Assessment, Security Auditing, and Penetration Testing:

Monitoring is a very crucial activity to ensure business continuity. This is similar to the fire drill conducted by administrative department. The purpose of a fire drill is to assess the enterprise’s readiness to deal with actual fire if that happens. But monitoring process goes a few steps ahead by ensuring that the root cause of fire too is addressed. The Vulnerability Assessment and Penetration Testing (VAPT), Information Security Auditing (ISA) aims at discovering the vulnerability, in the people, processes, and technologies. These discoveries lead to renewed security objectives and revised security policies and frameworks.

Additionally, the monitoring process pre-empts any malicious attempt to take advantage of any security vulnerability.

.