Astronaut loading animation Circular loading bar

Try : Insurtech, Application Development

AgriTech(1)

Augmented Reality(20)

Clean Tech(5)

Customer Journey(12)

Design(35)

Solar Industry(6)

User Experience(55)

Edtech(10)

Events(34)

HR Tech(2)

Interviews(10)

Life@mantra(11)

Logistics(5)

Strategy(17)

Testing(9)

Android(47)

Backend(30)

Dev Ops(7)

Enterprise Solution(27)

Technology Modernization(2)

Frontend(28)

iOS(43)

Javascript(15)

AI in Insurance(34)

Insurtech(62)

Product Innovation(47)

Solutions(19)

E-health(8)

HealthTech(19)

mHealth(4)

Telehealth Care(3)

Telemedicine(3)

Artificial Intelligence(129)

Bitcoin(8)

Blockchain(19)

Cognitive Computing(7)

Computer Vision(8)

Data Science(16)

FinTech(50)

Banking(7)

Intelligent Automation(26)

Machine Learning(46)

Natural Language Processing(14)

expand Menu Filters

The ‘Cyber Attacks’ Winter is Coming — straight for small firms in India Inc.

5 minutes read

Cyber intrusions and attacks have increased exponentially over the last decade approximately, exposing sensitive information pertaining to people and businesses, thus disrupting critical operations, and imposing huge liabilities on the economy. 

Cybersecurity is a responsibility that employees and leaders across functions must shoulder simply because it is the gospel truth – you cannot protect what you cannot see. As organizations have shifted to the work-from-home model due to the outbreak of the COVID-19 pandemic, it’s increasingly important to keep your company’s data secure. 

While the pandemic has led to near or complete digitalization of operations amongst financial institutions, it’s also increased the potential for cyberattacks that lead to adverse financial, reputational, and/or regulatory implications for organizations. 

According to Accenture, cybercrime is said to cost businesses $5.2 trillion worldwide within five years. “With 43% of online attacks now aimed at small businesses, a favorite target of high-tech villains, yet only 14% prepared to defend themselves, owners increasingly need to start making high-tech security a top priority,” the report continues.

A recent McAfee study shows global cybercrime costs crossed US$1 trillion dollars in 2020, up almost 50% from 2018.

India too saw an exponential rise in cybersecurity incidents amid the coronavirus pandemic. Information tracked by the Indian Computer Emergency Response Team (CERT-In) showed that cybersecurity attacks saw a four-fold jump in 2018, and recorded an 89 percent growth in 2019.

The government has set up a Cyber Crisis Management Plan for countering cyber-attacks effectively, while also operating the Cyber Swachhta Kendra (Botnet Cleaning and Malware Analysis Centre)

Banks and Financial Institutions (FIs) are some of the highest targeted market sectors. An analysis by FitchRatings in collaboration with SecurityScorecard reveals that banks with higher credit ratings exhibited better cybersecurity scores than banks with lower credit ratings. 

Bharti Airtel’s chief executive officer for India, Gopal Vittal, in a letter to the telco’s 307.9 million subscribers, detailed out how Airtel is carrying out home delivery of SIM cards and cautioned subscribers from falling prey to cyber frauds. He cautioned them against the rapid rise in cyber frauds, highly likely via digital payments. “There has been a massive increase in cyber frauds. And as usual, fraudsters are always finding new ways to trick you,” he added in the letter. 

Barcelona-based Glovo, valued at over $1 billion, that delivers everything from food to household supplies to some 10 million users across 20 countries, came under attack recently when the “hacker gained access to a system on April 29 via an old administrator platform but was ejected as soon as the intrusion was detected”, according to the company.

The attack came less than a month after Glovo raised 450 million euros ($541 million) in funding. 

According to Kaspersky’s telemetry, close on the heels of coronavirus-led pandemic and subsequent lockdown in March 2020, saw a total number of meticulously planned attacks against remote desktop protocol (RDP) jumped from 93.1 million worldwide in February 2020 to 277.4 million 2020 in March — a whopping 197 percent increase. In India, the numbers went from 1.3 million in February 2020 to 3.3 million in March 2020. In July 2020, India recorded its highest number of cyberattacks at 4.5 million.

The recent data breach at the payment firm Mobikwik, affected 3.5 million users, exposing Know Your Customer (KYC) documents such as addresses, phone numbers, Aadhaar card details, PAN card numbers, and so on. The company, however, still maintains that there was no such data breach. It was only after the Reserve Bank of India’s intervention that Mobikwik got a forensic audit conducted immediately by a CERT-IN empaneled auditor and submitted the report. 

Security experts have observed a 500% rise in the number of cyber attacks and security breaches and a 3 to 4 times rise in the number of phishing attacks from March until June 2020.

These attacks, however, are not just pertaining to the BFSI sector, but also the healthcare sector, and the education sector.

Image Source: BusinessStandard.com

What motivates hackers to target SMBs? 

Hackers essentially target SMBs because it’s a source of easy money. From inadequate cyber defenses to lower budgets and/or resources, smaller businesses often lack strong security policies, cybersecurity education programs, and more, making them soft targets. 

SMBs can also be a ‘gateway’ to larger organizations. As many SMBs are usually connected electronically to the IT systems of larger partner organizations, it becomes an inroad to the bigger organizations and their data. 

How can companies shield themselves from a potential cyberattack: 

As a response to the rising number of attacks in cyberspace, the Home Ministry of India issued an advisory with suggestions on the prevention of cyber thefts, especially for the large number of people working from home. Organizations and key decision-makers in a company can also create an effective cybersecurity strategy that’s flexible for adaptation in a changing climate too. Here are a few use cases: 

  • CERT-In conducted ‘Black Swan – Cyber Security Breach Tabletop Exercise’, in order to deal with cyber crisis and incidents emerging amid the COVID-19 pandemic, resulting from lowered security controls. 
  • To counter fraudulent behavior in the finance sector, the government is also considering setting up a Computer Emergency Response Team for the Financial Sector or CERT-Fin.
  • Several tech companies have come forth to address cybersecurity threats by building secure systems and software to mitigate issues like these in the foreseeable future. For example, IBM Security has collaborated with HCL Technologies to streamline threat management for clients through a modernized security operation center (SOC) platform called HCL’s Cybersecurity Fusion Centres. 

Some of the ways through which companies can mitigate potential risks include: 

  • Informing users of hacker tactics and possible attacks
  • Establish security rules, create policies, and an incident response plan to cover the entire gamut of their operations
  • Basic security measures such as regularly updating applications and systems
  • Following a two-factor authentication method for accounts and more

While these measures are some of the ways to be on top of your game in the cybersecurity space, they will also help in sound threat detection while helping gain better insights into attacks and prioritizing security alerts so that India is better prepared for an oncoming attack and battling any unforeseen circumstance that might result in huge loss of data, resources and more. 

Cancel

Knowledge thats worth delivered in your inbox

The Essence of User-Centered Design: A Dive into Fundamental Principles

In a digital world where user experience reigns supreme, crafting designs that resonate has become a mission. Enter User-Centered Design (UCD), a philosophy placing users at the core of the creative process. In this exploration, we’ll delve into the fundamental principles of User-Centered Design and understand why they are the keystones of successful interfaces.

User-Centered Design

Introduction:

Imagine navigating a website seamlessly, effortlessly finding what you need. That experience is no accident but the result of intentional design. User-centered design (UCD) is the compass guiding designers toward creating interfaces that users not only navigate but embrace.

1. Empathy is Key:

  • Incorporate for a better approach: Start by stepping into the shoes of your users. What are their pain points? What delights them? By empathizing, designers gain insights that drive user-focused design decisions.

2. User Involvement Throughout the Design Process:

  • Real-life example or statistic: Apple’s iterative design process involves user testing at every stage. This constant involvement ensures that their products align precisely with user needs.

3. Holistic Approach to Design:

  • Visual content: Picture your design not as isolated screens but as a cohesive journey. Use diagrams to illustrate how each component fits into the larger user experience ecosystem.

4. Usability is Non-Negotiable:

  • Case studies or examples: Consider the success of Google’s homepage. Its simplicity and efficiency showcase the power of a user-centered approach, emphasizing usability.

5. Accessibility for All:

  • End with a clear call-to-action: Make your designs accessible. It’s not just a legal obligation; it’s an ethical imperative. Ensure your interfaces are usable by everyone, regardless of ability.

6. Consistency Across the Interface:

  • Formatting for readability: Consistency is not just a design principle; it’s a readability strategy. Use bullet points for clarity and short paragraphs for easy consumption.

7. Flexibility and Customization:

  • Inclusive language: Users are diverse, so should your designs be. Incorporate flexibility and customization options. This ensures your interface caters to a broad range of preferences.

Why User-Centered Design Matters:

A. Enhanced User Satisfaction:

  • Feedback mechanism: Prioritize user satisfaction. A satisfied user is an engaged user. Welcome reader input and questions to keep the conversation alive.

B. Reduced Learning Curve:

  • Clear call-to-action: Minimize frustration. Make your interfaces intuitive, reducing the learning curve. Invite users to explore with a clear call-to-action.

C. Increased Engagement and Retention:

  • Visual content: Engaging interfaces retain users. Visualize engagement with appealing images or infographics. Showcase how user-centered designs reduce bounce rates.

D. Effective Problem Solving:

  • Tangible proof: Case studies offer tangible proof. Explore how UCD’s iterative process allows for effective problem-solving. Real-world examples bring these concepts to life.

Conclusion:

In the grand tapestry of digital design, User-Centered Design is the thread weaving functionality, aesthetics, and user satisfaction into a seamless whole. By embracing these principles, designers transform mere interfaces into user-centric experiences. So, as you embark on your design journey, remember: User-centered design isn’t just a philosophy; it’s a commitment to excellence. Design with the user in mind, and success will follow.

About the Author: Mehul Chauhan is a seasoned Senior UI/UX Designer at Mantra Labs. With a deep understanding of design principles and a keen eye for detail, he brings creativity and innovation to every project he touches. When he’s not busy perfecting digital interfaces, you can find him seeking inspiration in art galleries or exploring the latest design trends across various industries.

Further Reading: Unveiling the Art of Emotional Design

Cancel

Knowledge thats worth delivered in your inbox

Loading More Posts ...
Go Top
ml floating chatbot