Take the pledge to vote

For a better tommorow#AajSawaroApnaKal
  • I agree to receive emails from News18

  • I promise to vote in this year's elections no matter what the odds are.
  • Please check above checkbox.


Thank you for
taking the pledge

Vote responsibly as each vote counts
and makes a diffrence


Issued in public interest by HDFC Life. HDFC Life Insurance Company Limited (Formerly HDFC Standard Life Insurance Company Limited) (“HDFC Life”). CIN: L65110MH2000PLC128245, IRDAI Reg. No. 101 . The name/letters "HDFC" in the name/logo of the company belongs to Housing Development Finance Corporation Limited ("HDFC Limited") and is used by HDFC Life under an agreement entered into with HDFC Limited. ARN EU/04/19/13618
2-min read

Hackers Now Masquerading as 'Compromised' Employees: Forcepoint

According to Surendra Singh, Country Director, Forcepoint, The human-centric security framework is very important to ward off cyber attacks.


Updated:November 20, 2017, 6:43 PM IST
Hackers Now Masquerading as 'Compromised' Employees: Forcepoint
Representative image

Hackers are no longer going for traditional security breaches but are attacking individual machines via spam emails -- thus masquerading as "compromised" employees to enter the organisation and hold the whole system to ransom, a top executive from global cybersecurity firm Forcepoint has emphasised. According to Surendra Singh, Country Director, Forcepoint, The human-centric security framework is very important to ward off cyber attacks. "Hackers are no longer going after traditional security like firewall and are actually attacking the employees through official emails. Once done compromising the machine, the hacker is now masquerading as an employee and his behaviour is very, very different," Singh told IANS.

Watch: India's 1st Tech And Auto Show Awards 2017 | Vote And Win a Smartphone


"Hackers are enticing subjects accounts and ask you to click upon a link. You click the link, the machine gets compromised and then, you become a kind of breach head for that hacker to enter the organisation," he noted. One way to prevent such a crime is to closely monitor the behaviour of employees -- the IT usage patterns once the employee has been compromised. The risks get bigger with the faster adoption of Internet of Things (IoT) devices, Singh said. "IoT can become Disruption of Things. We may face industrial disasters because of IoT process controls getting compromised. This is a very scary scenario," Singh told IANS.

Forcepoint on Monday launched its 2018 Security Predictions Report, emphasising that the traditional security perimeters are eroding or becoming obsolete.

Understanding how, when and why people interact with critical data, no matter where it is located, is crucial. Critical data continues to move to the Cloud, malware is constantly evolving, and despite growing investments in defensive technologies, traditional security controls prove ineffective, the report said. "At the heart of our predictions is a requirement to understand the intersection of people with critical data and intellectual property," said Dr Richard Ford, Chief Scientist at Forcepoint.

"By placing cyber-behaviour and intent at the centre of security, the industry has a fighting chance of keeping up with the massive rate of change in the threat environment," Ford noted. Forcepoint predicted that 2018 will ignite a broad and polarising privacy debate, not just within governments, but between ordinary people. As cryptocurrencies grow in importance, including as a method of extracting revenue from cybercrime, Forcepoint forecasts that the systems surrounding such currencies will increasingly come under attack.

"Attackers will target vulnerabilities in systems which implement blockchain technology," the report said, adding that IoT will not be held to ransom but will become a target for mass disruption". A new threat that will emerge in 2018 is the disruption of things. As the IoT offers access to both disruptive possibilities and massive amounts of critical data, we will see attacks in this area, and may also see the integration of a man-in-the-middle (MITM) attack, the report cautioned. "In case of a compromise, you have to involve legal teams, you have to involve your CFOs -- you must notify all the people impacted. So there has to be a robust plan in place as a reactive measure," Singh said.

Also Watch: Apple iPhone X Review | Should You Pay Rs 1,02,000 For It?

| Edited by: ---
Read full article
Next Story
Next Story

Also Watch


Live TV

Countdown To Elections Results
  • 01 d
  • 12 h
  • 38 m
  • 09 s
To Assembly Elections 2018 Results