Indian Tech Firms Vulnerable to Cyber Attacks Due to Usage of Unregulated Software


Indian Tech Firms Vulnerable to Cyber Attacks: As we know that there was a cyber attack for Ransomware which made everyone a victim in over 150 countries, Indian Tech firms uses Unregulated Software which may increase the vulnerability of those systems further more. A report from EY Advisory Services cyber security on Sunday stated that 60 percent of Indian tech firms are vulnerable due to the use of Unregulated Software which may even grow.

They also adviced that Indian Tech firms need to upgrade the cyber security infrastructure or they will have to prepare for a cyber attack in the coming days. Maya Ramachandran, Partner, Advisory Services Practice, EY, said that, Many organisations secure their hardware. However, they do not pay attention to the software used, which could be unregulated.

Over 60 Percent Indian Tech Firms Vulnerable to Cyber Attacks:

Indian Computer Emergency Response Team (CERT-In) report said, Prior to last month’s WannaCry ransomware episode, over 50,300 cyber security incidents like phishing, website intrusions and defacements, virus and denial of service attacks were observed in the country during 2016.

According to a recent EY survey, over 49 per cent of chief information officers identified security threats from malware as a major threat posed by unlicensed software, while 26 per cent employees admitted to installing outside software on work computers. Ramachandran also added that, Several large corporations and multinational companies have started setting up software asset management offices that would look into the leading best practices of using software including compliance and licensing terms to the software vendor.

Software asset management would address inadvertent downloads of malware through unauthorised software, or software of unknown vendors and use of removable media to download software that is not supported in a corporate environment. It would also address issues like use of older versions of software, the unauthorised connection of personal devices to corporate networks, among others.

For More Latest Updates: Follow PressKS