Importance of Information Security in CSR

What is CSR?

The concept of Corporate Social Responsibility (CSR) was first discussed in the 1950s though it was widely acknowledged much later during the late 1990s. The core idea of CSR is to integrate business with responsibilities towards our society and environment. CSR, in this way, is considered as the most convincing way to achieve a balance between economic, environmental and social imperatives while at the same time addressing the expectations of shareholders and stakeholders. Organizations try to enhance the reputation of a company with active CSR, although the concept of CSR goes beyond that.

Read More

How-organizations-are-influenced-by-stoicism-blog

Stoicism can leave organizations vulnerable to cyber-crime

What is Stoicism?

Every human mind has different nature of thinking process. Each aspect of our life is influenced by our tendencies, habits, preference of comfort zones and … we all wish to avoid risk factors. We always tend to take up safe and easy ways for survival. The Greek philosophers originated the idea of stoicism who analyzed and explained this concept with the philosophy of the military professionals who strive in the battlefield against the enemies till their last breath. Even in adverse conditions when the opponent almost ensures the victory, a true military leader shows the path of survival by assuring that everything would be alright. The end result of the battle is secondary in this aspect, but the act of concealing the fear and danger with positive assurance is the stark reality of stoicism.

How is it relevant to IT security?

Read More

Resistance to cultural change plays spoilsport to strengthen enterprise IT security (Part – 2)

How can we overcome cultural resistance?

In our previous blog (posted on 30th August 2019) we discussed how resistance to IT cultural changes can obstruct organizations from strengthening their enterprise security posture. In this blog, we are going to discuss five ways how this crisis situation can be handled effectively by assuaging the workforce’s fear and misconceptions.

Read More

Resistance to cultural change plays spoilsport to strengthen enterprise IT security (Part – 1)

Recently, while interviewing some of the global CIOs and CISOs in an event regarding the reason of extensive privileged account compromise, we came across a very interesting point of view, which was highlighted by a few of the respondents. Work culture and employee mindset can be a big barrier in establishing a robust IT security framework in enterprises. Let us see how it can play spoilsport while strengthening enterprise IT security.

Read More

Securing Enterprise Data

Securing Enterprise Data – The Soul of any Business

In a continuously evolving technological landscape, global organizations are coming across new challenges to store and protect a huge amount of business data generated every day. While data being the core of any business, it plays the most important role in maintaining business continuity in any industry. While many organizations go all the way to protect tons of data generated every day, few are partially concerned about the security and the remaining stay least bothered about the security of their data assets.

Read More

ARCON Thought Leadership blog

ARCON Travels the World to Spread Awareness on Privileged Access Security

As the latter half of year commences, ARCON would like to take you back in the last six months in which the company has been busy with global thought leadership summits and round-table conferences.

 

ARCON  would like to recollect and highlight some glorious moments of our journey, wherein it shared in-depth knowledge of Information Security space as data security becomes the most indispensable issue for IT security and risk management teams.

Read More

Data-Security-in-Managed-Service-Environment--blog

Data Security in Managed Service Environment

Today, it is a big challenge for organizations to secure their Information assets from persistent cyber threats from both external and internal malefactors, arising mainly due to distributed nature of IT infrastructure.

Take for instance, the Managed Service Provider (MSP) model. MSP is a cost-effective alternative for organizations to ensure business continuity with limited workforce and capital. Enterprises can divert resources to other operational areas as transferring workloads to MSP provides an IT infra to store/ process data and work on a host of applications among other rudimentary computing services. In other words, it saves a huge amount of money as there is no upfront IT capital expenditure. MSP remotely manages any organization’s IT infrastructure or user systems based on a specific organizational policy.

Read More

Secure Data before it Goes Up for Sale

Secure Data before it Goes Up for Sale

Data – the lifeline of any business organization, is under grave risk today due to numerous cyber security threats. Along with the rising number of threats, the nature of attacks is also getting sophisticated day by day. The cyber crooks are adopting advanced hacking techniques to steal sensitive data. Phishing, Ransomware, DDoS (Distributed Denial of Service) attack, Insider sabotage, social engineering, Botnet, cyber espionage  etc. are some of the most common ways used by malefactors to abuse data.

Read More