CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home Information Security

Indian Govt Orders Organizations to Report Security Breaches Within 6 Hours to CERT-In

admin by admin
April 30, 2022
in Information Security
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter


India’s computer and emergency response team, CERT-In, on Thursday published new guidelines that require service providers, intermediaries, data centers, and government entities to compulsorily report cybersecurity incidents, including data breaches, within six hours.

“Any service provider, intermediary, data center, body corporate and Government organization shall mandatorily report cyber incidents […] to CERT-In within six hours of noticing such incidents or being brought to notice about such incidents,” the government said in a release.

CyberSecurity

The types of incidents that come under the ambit include, inter alia, compromise of critical systems, targeting scanning, unauthorized access to computers and social media accounts, website defacements, malware deployments, identity theft, DDoS attacks, data breaches and leaks, rogue mobile apps, and attacks against servers and network appliances like routers and IoT devices.

The government said it was taking these steps to ensure that requisite indicators of compromise (IoC) associated with the security events are readily available at hand to “carry out the analysis, investigation and coordination as per the process of law.”

The directions also instruct concerned organizations to synchronize ICT system clocks to the Network Time Protocol (NTP) Server of the National Informatics Centre (NIC) or National Physical Laboratory (NPL), maintain logs of ICT systems for a rolling period of 180 days, and require VPN service providers to retain information like names, addresses, phone numbers, emails, and IP addresses of subscribers for a minimum of five years.

CyberSecurity

Additionally, the rules, which will take effect in 60 days’ time, call for virtual asset service, exchange, and custodian wallet providers to keep records on Know Your Customer (KYC) and financial transactions for a period of five years.

“These directions shall enhance overall cyber security posture and ensure safe and trusted Internet in the country,” India’s Ministry of Electronics and Information Technology (MeitY) said in a statement.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
Previous Post

Cyberespionage APT Now Identified as Three Separate Actors

Next Post

Why the empowerment of innovation is now a universal imperative

Related Posts

Information Security

Yes, Containers Are Terrific, But Watch the Security Risks

by admin
May 24, 2022
Information Security

Zero Trust for Data Helps Enterprises Detect, Respond and Recover from Breaches

by admin
May 23, 2022
Information Security

An Interview with a White Hat Hacker

by admin
May 23, 2022
Information Security

Cisco Issues Patch for New IOS XR Zero-Day Vulnerability Exploited in the Wild

by admin
May 23, 2022
Information Security

APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack O-Days

by admin
May 22, 2022
Next Post

Why the empowerment of innovation is now a universal imperative

Leave Comment

Recommended

Japan Airlines: digitally re-imagining the air passenger experience

May 24, 2022

Yes, Containers Are Terrific, But Watch the Security Risks

May 24, 2022

Learn to work with the Office 365 unified audit log

May 23, 2022

Zero Trust for Data Helps Enterprises Detect, Respond and Recover from Breaches

May 23, 2022

An Interview with a White Hat Hacker

May 23, 2022

Q&A with Kristin Myers, EVP/CIO, Mount Sinai Health System & Dean of Digital & Technology

May 23, 2022

© 2022 CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.