Why is it crucial to segment privileged identities?

Can we think of an organization that does not have any segmentation of departments like marketing, finance, HR & Administration? The answer is probably NO – even if there is, the organization can never ensure systematic day to day activities. We don’t need to explain the importance of segregating the employees in various departments as per their roles. Similarly, an enterprise IT ecosystem requires a proper segmentation of a set of digital identities. It ensures role-based access to devices and target systems by authorized users assigned for a defined task.

Read More

Privileged Access Security in MSP environment

Privileged Security is indispensable for MSP environment

Today, organizations are managing their IT infrastructure with an increased number of challenges. They have to monitor too many privileged accounts in the vast IT network and manage the security of a huge stream of data. Thus, organizations find Managed Service Providers (MSPs) as better alternatives to handle this massive task of ensuring enterprise IT administration efficiently. Hence the demand for Managed Service Providers has shot up significantly in recent times.

Read More


Personal Data Protection Bill: A Government of India’s push to ensure data integrity

About the Bill

The Government of India has proposed and introduced the draft of the Personal Data Protection (PDP) Bill to the Joint Parliamentary Committee in the Lok Sabha recently. This bill is going to be the Government of India’s another milestone in cyber security space after “Digital India” drive a couple of years back. Previously, this bill was introduced in 2018 by SriKrishna Committee, defining the importance of personal data and its sensitivity. These data include financial data, biometric data, intersex/ transgender status and official government identifiers (like PAN card).

Read More


ARCON Predicts Top Three Security Trends for 2020

With 2020 almost at our threshold, the evolution of digital technology is expected to take a big leap this year, thanks to the influence of Cloud computing, Big Data, AI and IoT. Technology, while getting more advanced, brings sophisticated cyber threats simultaneously that can strike hard in organizations across every industry. Truly, cyber threats will continue to disrupt organizations in 2020 as well.

Read More

Secure Privileged Access: A top priority for seamless digitalization

Revolutionary technologies such as Internet of Things (IoTs) and cloud computing, AI, Big Data, et al have created enormous opportunities for global organizations. They have changed the way global corporations conduct business. While these technologies create new opportunities, they also make IT assets vulnerable. Indeed, with tons of data stored in the cloud, and critical systems with which end users interact, organizations risk data breach from malicious outsiders/ insiders.

Gartner in one of its reports namely, “Inadequate security sees surge in IoT data breaches, study shows” has confirmed that data breaches linked to IoTs have increased considerably over the last two years.

Read More

As ARCON predicted…data breach incidents are rising due to lack of Privileged Access Management

As we are preparing to bid adieu to 2019, let us see how our prediction at the beginning of the year got proved to be accurate. In one of our blogs, we discussed that managing data in shared and distributed environment, migrating data to the cloud environment, hosting data in MSP environment and compliance with regulatory standards would demand robust Privileged Access Management (PAM). Several incidents round the year showed how organizations still lack a stringent cyber security policy and safeguards to mitigate data breach threat. These incidents re-emphasize why today’s enterprises require a PAM to mitigate risks arising from malicious insiders or external malefactors.

Read More

Importance of Information Security in CSR

What is CSR?

The concept of Corporate Social Responsibility (CSR) was first discussed in the 1950s though it was widely acknowledged much later during the late 1990s. The core idea of CSR is to integrate business with responsibilities towards our society and environment. CSR, in this way, is considered as the most convincing way to achieve a balance between economic, environmental and social imperatives while at the same time addressing the expectations of shareholders and stakeholders. Organizations try to enhance the reputation of a company with active CSR, although the concept of CSR goes beyond that.

Read More


Stoicism can leave organizations vulnerable to cyber-crime

What is Stoicism?

Every human mind has different nature of thinking process. Each aspect of our life is influenced by our tendencies, habits, preference of comfort zones and … we all wish to avoid risk factors. We always tend to take up safe and easy ways for survival. The Greek philosophers originated the idea of stoicism who analyzed and explained this concept with the philosophy of the military professionals who strive in the battlefield against the enemies till their last breath. Even in adverse conditions when the opponent almost ensures the victory, a true military leader shows the path of survival by assuring that everything would be alright. The end result of the battle is secondary in this aspect, but the act of concealing the fear and danger with positive assurance is the stark reality of stoicism.

How is it relevant to IT security?

Read More

Resistance to cultural change plays spoilsport to strengthen enterprise IT security (Part – 2)

How can we overcome cultural resistance?

In our previous blog (posted on 30th August 2019) we discussed how resistance to IT cultural changes can obstruct organizations from strengthening their enterprise security posture. In this blog, we are going to discuss five ways how this crisis situation can be handled effectively by assuaging the workforce’s fear and misconceptions.

Read More