1. Continuous monitoring can check hacking of websites

Continuous monitoring can check hacking of websites

Trishneet Arora, CEO, TAC Security Solutions, said that according to CERT-In, a total of 371, 189, 155 and 128 government websites were hacked in 2012, 2013, 2014 and 2015 (up to October), respectively.

By: | Chandigarh | Published: December 11, 2015 11:57 PM
TAC Security Solutions

Trishneet Arora, CEO, TAC Security Solutions, said that according to CERT-In, a total of 371, 189, 155 and 128 government websites were hacked in 2012, 2013, 2014 and 2015 (up to October), respectively.

A Cyber Security Expert and CEO of TAC Security Solutions, Trishneet Arora has suggested “continuous monitoring and assessment of information technology infrastructure” to safeguard any backdoor entries to information systems against hackers.

Taking cognisance of the startling reports that a good number of government websites were hacked in the last few years, Trishneet Arora, CEO, TAC Security Solutions, cyber security expert, an ethical hacker and author said here today that as per the Indian Computer Emergency Response Team (CERT-In), a total of 371, 189, 155 and 128 government websites were hacked in 2012, 2013, 2014 and 2015 (up to October), respectively.

Trishneet said that “in today’s world where we are depending on technology more and more for sharing our information both on official front and personal, including data, personal and otherwise, it is very important to identify and understand our information system weaknesses and strengthen our defences with comprehensive vulnerability assessment and penetration testing (VAPT) of these information systems.”

A vulnerability assessment, he says, is the process of identifying, quantifying, and prioritizing the vulnerabilities in network while Penetration Testing is a proactive and authorized attempt to evaluate the security of an IT infrastructure by safely attempting to exploit network and web vulnerabilities.

Besides installing secure and dedicated communication networks against data theft including deployment of security solutions, including firewall, intrusion and prevention systems and anti-virus solutions, Trishneet stressed that it is of utmost importance to keep close track of such Cyber- attacks through VAPT to discover the security loopholes present in organization’s information systems, to plug them in time.

Trishneet said that “the concept of engaging services of professional hackers to track, identify and plug security loopholes in the organization’s information systems is catching up fast.”

  1. B
    Bhupendra
    Dec 12, 2015 at 4:25 pm
    Very nice article for cyber security. Kept up Trishneet. Tck.
    Reply

    Go to Top